<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2026-04-14T07:00:24</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:201920794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20794</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20794" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20794" ref_url="https://www.suse.com/security/cve/CVE-2019-20794" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, and resources being permanently locked up until system reboot. This can result in resource exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20794/">CVE-2019-20794 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20794">CVE-2019-20794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171737">SUSE bug 1171737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45261</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45261" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45261" ref_url="https://www.suse.com/security/cve/CVE-2021-45261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024342.html" source="SUSE-SU"/>
    <description>
    An Invalid Pointer vulnerability exists in GNU patch 2.7 via the another_hunk function, which causes a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-17"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45261/">CVE-2021-45261 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45261">CVE-2021-45261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194037">SUSE bug 1194037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044012" comment="patch-2.7.6-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47659</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47659" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47659" ref_url="https://www.suse.com/security/cve/CVE-2021-47659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/plane: Move range check for format_count earlier

While the check for format_count &gt; 64 in __drm_universal_plane_init()
shouldn't be hit (it's a WARN_ON), in its current position it will then
leak the plane-&gt;format_types array and fail to call
drm_mode_object_unregister() leaking the modeset identifier. Move it to
the start of the function to avoid allocating those resources in the
first place.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47659/">CVE-2021-47659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47659">CVE-2021-47659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237839">SUSE bug 1237839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21698</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21698" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:2145-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
    <description>
    client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients. In client_golang prior to version 1.11.1, HTTP server is susceptible to a Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling requests with non-standard HTTP methods. In order to be affected, an instrumented software must use any of `promhttp.InstrumentHandler*` middleware except `RequestsInFlight`; not filter any specific methods (e.g GET) before middleware; pass metric with `method` label name to our middleware; and not have any firewall/LB/proxy that filters away requests with unknown `method`. client_golang version 1.11.1 contains a patch for this issue. Several workarounds are available, including removing the `method` label name from counter/gauge used in the InstrumentHandler; turning off affected promhttp handlers; adding custom middleware before promhttp handler that will sanitize the request method given by Go http.Request; and using a reverse proxy or web application firewall, configured to only allow a limited set of methods.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196338">SUSE bug 1196338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248689">SUSE bug 1248689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009699741" comment="containerized-data-importer-manifests is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28948</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28948" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28948" ref_url="https://www.suse.com/security/cve/CVE-2022-28948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02998-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02999-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03001-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0319-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JLUFKCHWHJJ2MQ6XRREF7D4OOWB23V2/" source="SUSE-SU"/>
    <description>
    An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28948/">CVE-2022-28948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28948">CVE-2022-28948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199772">SUSE bug 1199772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009670552" comment="conmon is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009699741" comment="containerized-data-importer-manifests is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339480" comment="helm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009683669" comment="helm-bash-completion is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962708" comment="ignition is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009699742" comment="kubevirt-manifests is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009699743" comment="kubevirt-virtctl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009343329" comment="podman is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958376" comment="podman-docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871694" comment="podman-remote is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958377" comment="podmansh is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659876" comment="skopeo is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015151" comment="suseconnect-ng is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36648</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36648" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36648" ref_url="https://www.suse.com/security/cve/CVE-2022-36648" source="SUSE CVE"/>
    <description>
    The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7.0.0 and earlier, allows remote attackers to crash the host qemu and potentially execute code on the host via execute a malformed program in the guest OS. Note: This has been disputed by multiple third parties as not a valid vulnerability due to the rocker device not falling within the virtualization use case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-36648/">CVE-2022-36648 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36648">CVE-2022-36648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214551">SUSE bug 1214551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673318" comment="qemu-SLOF is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654021" comment="qemu-audio-spice is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335211" comment="qemu-block-iscsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335212" comment="qemu-block-ssh is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654023" comment="qemu-chardev-spice is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335213" comment="qemu-guest-agent is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654024" comment="qemu-hw-display-qxl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654025" comment="qemu-hw-display-virtio-gpu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654026" comment="qemu-hw-display-virtio-gpu-pci is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654027" comment="qemu-hw-display-virtio-vga is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654028" comment="qemu-hw-s390x-virtio-gpu-ccw is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009683071" comment="qemu-hw-usb-host is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654029" comment="qemu-hw-usb-redirect is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859131" comment="qemu-img is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654030" comment="qemu-ksm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335215" comment="qemu-lang is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335216" comment="qemu-ppc is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859132" comment="qemu-pr-helper is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654031" comment="qemu-s390x is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654033" comment="qemu-ui-opengl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654034" comment="qemu-ui-spice-core is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986058" comment="qemu-vmsr-helper is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49086</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49086" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49086" ref_url="https://www.suse.com/security/cve/CVE-2022-49086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix leak of nested actions

While parsing user-provided actions, openvswitch module may dynamically
allocate memory and store pointers in the internal copy of the actions.
So this memory has to be freed while destroying the actions.

Currently there are only two such actions: ct() and set().  However,
there are many actions that can hold nested lists of actions and
ovs_nla_free_flow_actions() just jumps over them leaking the memory.

For example, removal of the flow with the following actions will lead
to a leak of the memory allocated by nf_ct_tmpl_alloc():

  actions:clone(ct(commit),0)

Non-freed set() action may also leak the 'dst' structure for the
tunnel info including device references.

Under certain conditions with a high rate of flow rotation that may
cause significant memory leak problem (2MB per second in reporter's
case).  The problem is also hard to mitigate, because the user doesn't
have direct control over the datapath flows generated by OVS.

Fix that by iterating over all the nested actions and freeing
everything that needs to be freed recursively.

New build time assertion should protect us from this problem if new
actions will be added in the future.

Unfortunately, openvswitch module doesn't use NLA_F_NESTED, so all
attributes has to be explicitly checked.  sample() and clone() actions
are mixing extra attributes into the user-provided action list.  That
prevents some code generalization too.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49086/">CVE-2022-49086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49086">CVE-2022-49086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238037">SUSE bug 1238037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49100</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49100" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49100" ref_url="https://www.suse.com/security/cve/CVE-2022-49100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio_console: eliminate anonymous module_init &amp; module_exit

Eliminate anonymous module_init() and module_exit(), which can lead to
confusion or ambiguity when reading System.map, crashes/oops/bugs,
or an initcall_debug log.

Give each of these init and exit functions unique driver-specific
names to eliminate the anonymous names.

Example 1: (System.map)
 ffffffff832fc78c t init
 ffffffff832fc79e t init
 ffffffff832fc8f8 t init

Example 2: (initcall_debug log)
 calling  init+0x0/0x12 @ 1
 initcall init+0x0/0x12 returned 0 after 15 usecs
 calling  init+0x0/0x60 @ 1
 initcall init+0x0/0x60 returned 0 after 2 usecs
 calling  init+0x0/0x9a @ 1
 initcall init+0x0/0x9a returned 0 after 74 usecs
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49100/">CVE-2022-49100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49100">CVE-2022-49100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237735">SUSE bug 1237735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49109</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49109" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49109" ref_url="https://www.suse.com/security/cve/CVE-2022-49109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix inode reference leakage in ceph_get_snapdir()

The ceph_get_inode() will search for or insert a new inode into the
hash for the given vino, and return a reference to it. If new is
non-NULL, its reference is consumed.

We should release the reference when in error handing cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49109/">CVE-2022-49109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49109">CVE-2022-49109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237836">SUSE bug 1237836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49138</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49138" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49138" ref_url="https://www.suse.com/security/cve/CVE-2022-49138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_event: Ignore multiple conn complete events

When one of the three connection complete events is received multiple
times for the same handle, the device is registered multiple times which
leads to memory corruptions. Therefore, consequent events for a single
connection are ignored.

The conn-&gt;state can hold different values, therefore HCI_CONN_HANDLE_UNSET
is introduced to identify new connections. To make sure the events do not
contain this or another invalid handle HCI_CONN_HANDLE_MAX and checks
are introduced.

Buglink: https://bugzilla.kernel.org/show_bug.cgi?id=215497
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49138/">CVE-2022-49138 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49138">CVE-2022-49138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238160">SUSE bug 1238160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49164</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49164" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49164" ref_url="https://www.suse.com/security/cve/CVE-2022-49164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/tm: Fix more userspace r13 corruption

Commit cf13435b730a ("powerpc/tm: Fix userspace r13 corruption") fixes a
problem in treclaim where a SLB miss can occur on the
thread_struct-&gt;ckpt_regs while SCRATCH0 is live with the saved user r13
value, clobbering it with the kernel r13 and ultimately resulting in
kernel r13 being stored in ckpt_regs.

There is an equivalent problem in trechkpt where the user r13 value is
loaded into r13 from chkpt_regs to be recheckpointed, but a SLB miss
could occur on ckpt_regs accesses after that, which will result in r13
being clobbered with a kernel value and that will get recheckpointed and
then restored to user registers.

The same memory page is accessed right before this critical window where
a SLB miss could cause corruption, so hitting the bug requires the SLB
entry be removed within a small window of instructions, which is
possible if a SLB related MCE hits there. PAPR also permits the
hypervisor to discard this SLB entry (because slb_shadow-&gt;persistent is
only set to SLB_NUM_BOLTED) although it's not known whether any
implementations would do this (KVM does not). So this is an extremely
unlikely bug, only found by inspection.

Fix this by also storing user r13 in a temporary location on the kernel
stack and don't change the r13 register from kernel r13 until the RI=0
critical section that does not fault.

The SCRATCH0 change is not strictly part of the fix, it's only used in
the RI=0 section so it does not have the same problem as the previous
SCRATCH0 bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49164/">CVE-2022-49164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49164">CVE-2022-49164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238108">SUSE bug 1238108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49296</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49296" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49296" ref_url="https://www.suse.com/security/cve/CVE-2022-49296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix possible deadlock when holding Fwb to get inline_data

1, mount with wsync.
2, create a file with O_RDWR, and the request was sent to mds.0:

   ceph_atomic_open()--&gt;
     ceph_mdsc_do_request(openc)
     finish_open(file, dentry, ceph_open)--&gt;
       ceph_open()--&gt;
         ceph_init_file()--&gt;
           ceph_init_file_info()--&gt;
             ceph_uninline_data()--&gt;
             {
               ...
               if (inline_version == 1 || /* initial version, no data */
                   inline_version == CEPH_INLINE_NONE)
                     goto out_unlock;
               ...
             }

The inline_version will be 1, which is the initial version for the
new create file. And here the ci-&gt;i_inline_version will keep with 1,
it's buggy.

3, buffer write to the file immediately:

   ceph_write_iter()--&gt;
     ceph_get_caps(file, need=Fw, want=Fb, ...);
     generic_perform_write()--&gt;
       a_ops-&gt;write_begin()--&gt;
         ceph_write_begin()--&gt;
           netfs_write_begin()--&gt;
             netfs_begin_read()--&gt;
               netfs_rreq_submit_slice()--&gt;
                 netfs_read_from_server()--&gt;
                   rreq-&gt;netfs_ops-&gt;issue_read()--&gt;
                     ceph_netfs_issue_read()--&gt;
                     {
                       ...
                       if (ci-&gt;i_inline_version != CEPH_INLINE_NONE &amp;&amp;
                           ceph_netfs_issue_op_inline(subreq))
                         return;
                       ...
                     }
     ceph_put_cap_refs(ci, Fwb);

The ceph_netfs_issue_op_inline() will send a getattr(Fsr) request to
mds.1.

4, then the mds.1 will request the rd lock for CInode::filelock from
the auth mds.0, the mds.0 will do the CInode::filelock state transation
from excl --&gt; sync, but it need to revoke the Fxwb caps back from the
clients.

While the kernel client has aleady held the Fwb caps and waiting for
the getattr(Fsr).

It's deadlock!

URL: https://tracker.ceph.com/issues/55377
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49296/">CVE-2022-49296 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49296">CVE-2022-49296 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238187">SUSE bug 1238187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49331</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49331" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49331" ref_url="https://www.suse.com/security/cve/CVE-2022-49331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling

Error paths do not free previously allocated memory. Add devm_kfree() to
those failure paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49331/">CVE-2022-49331 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49331">CVE-2022-49331 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237813">SUSE bug 1237813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49345</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49345" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49345" ref_url="https://www.suse.com/security/cve/CVE-2022-49345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: xfrm: unexport __init-annotated xfrm4_protocol_init()

EXPORT_SYMBOL and __init is a bad combination because the .init.text
section is freed up after the initialization. Hence, modules cannot
use symbols annotated __init. The access to a freed symbol may end up
with kernel panic.

modpost used to detect it, but it has been broken for a decade.

Recently, I fixed modpost so it started to warn it again, then this
showed up in linux-next builds.

There are two ways to fix it:

  - Remove __init
  - Remove EXPORT_SYMBOL

I chose the latter for this case because the only in-tree call-site,
net/ipv4/xfrm4_policy.c is never compiled as modular.
(CONFIG_XFRM is boolean)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49345/">CVE-2022-49345 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49345">CVE-2022-49345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238238">SUSE bug 1238238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49351</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49351" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49351" ref_url="https://www.suse.com/security/cve/CVE-2022-49351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: altera: Fix refcount leak in altera_tse_mdio_create

Every iteration of for_each_child_of_node() decrements
the reference count of the previous node.
When break from a for_each_child_of_node() loop,
we need to explicitly call of_node_put() on the child node when
not need anymore.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49351/">CVE-2022-49351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49351">CVE-2022-49351 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237939">SUSE bug 1237939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49376</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49376" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49376" ref_url="https://www.suse.com/security/cve/CVE-2022-49376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: sd: Fix potential NULL pointer dereference

If sd_probe() sees an early error before sdkp-&gt;device is initialized,
sd_zbc_release_disk() is called. This causes a NULL pointer dereference
when sd_is_zoned() is called inside that function. Avoid this by removing
the call to sd_zbc_release_disk() in sd_probe() error path.

This change is safe and does not result in zone information memory leakage
because the zone information for a zoned disk is allocated only when
sd_revalidate_disk() is called, at which point sdkp-&gt;disk_dev is fully set,
resulting in sd_disk_release() being called when needed to cleanup a disk
zone information using sd_zbc_release_disk().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49376/">CVE-2022-49376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49376">CVE-2022-49376 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238103">SUSE bug 1238103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49382</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49382" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49382" ref_url="https://www.suse.com/security/cve/CVE-2022-49382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: rockchip: Fix refcount leak in rockchip_grf_init

of_find_matching_node_and_match returns a node pointer with refcount
incremented, we should use of_node_put() on it when done.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49382/">CVE-2022-49382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49382">CVE-2022-49382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238306">SUSE bug 1238306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49491</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49491" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49491" ref_url="https://www.suse.com/security/cve/CVE-2022-49491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/rockchip: vop: fix possible null-ptr-deref in vop_bind()

It will cause null-ptr-deref in resource_size(), if platform_get_resource()
returns NULL, move calling resource_size() after devm_ioremap_resource() that
will check 'res' to avoid null-ptr-deref.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49491/">CVE-2022-49491 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49491">CVE-2022-49491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238539">SUSE bug 1238539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49668</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49668" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49668" ref_url="https://www.suse.com/security/cve/CVE-2022-49668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM / devfreq: exynos-ppmu: Fix refcount leak in of_get_devfreq_events

of_get_child_by_name() returns a node pointer with refcount
incremented, we should use of_node_put() on it when done.
This function only calls of_node_put() in normal path,
missing it in error paths.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49668/">CVE-2022-49668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49668">CVE-2022-49668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237957">SUSE bug 1237957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49700</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49700" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49700" ref_url="https://www.suse.com/security/cve/CVE-2022-49700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/slub: add missing TID updates on slab deactivation

The fastpath in slab_alloc_node() assumes that c-&gt;slab is stable as long as
the TID stays the same. However, two places in __slab_alloc() currently
don't update the TID when deactivating the CPU slab.

If multiple operations race the right way, this could lead to an object
getting lost; or, in an even more unlikely situation, it could even lead to
an object being freed onto the wrong slab's freelist, messing up the
`inuse` counter and eventually causing a page to be freed to the page
allocator while it still contains slab objects.

(I haven't actually tested these cases though, this is just based on
looking at the code. Writing testcases for this stuff seems like it'd be
a pain...)

The race leading to state inconsistency is (all operations on the same CPU
and kmem_cache):

 - task A: begin do_slab_free():
    - read TID
    - read pcpu freelist (==NULL)
    - check `slab == c-&gt;slab` (true)
 - [PREEMPT A-&gt;B]
 - task B: begin slab_alloc_node():
    - fastpath fails (`c-&gt;freelist` is NULL)
    - enter __slab_alloc()
    - slub_get_cpu_ptr() (disables preemption)
    - enter ___slab_alloc()
    - take local_lock_irqsave()
    - read c-&gt;freelist as NULL
    - get_freelist() returns NULL
    - write `c-&gt;slab = NULL`
    - drop local_unlock_irqrestore()
    - goto new_slab
    - slub_percpu_partial() is NULL
    - get_partial() returns NULL
    - slub_put_cpu_ptr() (enables preemption)
 - [PREEMPT B-&gt;A]
 - task A: finish do_slab_free():
    - this_cpu_cmpxchg_double() succeeds()
    - [CORRUPT STATE: c-&gt;slab==NULL, c-&gt;freelist!=NULL]

From there, the object on c-&gt;freelist will get lost if task B is allowed to
continue from here: It will proceed to the retry_load_slab label,
set c-&gt;slab, then jump to load_freelist, which clobbers c-&gt;freelist.

But if we instead continue as follows, we get worse corruption:

 - task A: run __slab_free() on object from other struct slab:
    - CPU_PARTIAL_FREE case (slab was on no list, is now on pcpu partial)
 - task A: run slab_alloc_node() with NUMA node constraint:
    - fastpath fails (c-&gt;slab is NULL)
    - call __slab_alloc()
    - slub_get_cpu_ptr() (disables preemption)
    - enter ___slab_alloc()
    - c-&gt;slab is NULL: goto new_slab
    - slub_percpu_partial() is non-NULL
    - set c-&gt;slab to slub_percpu_partial(c)
    - [CORRUPT STATE: c-&gt;slab points to slab-1, c-&gt;freelist has objects
      from slab-2]
    - goto redo
    - node_match() fails
    - goto deactivate_slab
    - existing c-&gt;freelist is passed into deactivate_slab()
    - inuse count of slab-1 is decremented to account for object from
      slab-2

At this point, the inuse count of slab-1 is 1 lower than it should be.
This means that if we free all allocated objects in slab-1 except for one,
SLUB will think that slab-1 is completely unused, and may free its page,
leading to use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49700/">CVE-2022-49700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49700">CVE-2022-49700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238249">SUSE bug 1238249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49720</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49720" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49720" ref_url="https://www.suse.com/security/cve/CVE-2022-49720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: Fix handling of offline queues in blk_mq_alloc_request_hctx()

This patch prevents that test nvme/004 triggers the following:

UBSAN: array-index-out-of-bounds in block/blk-mq.h:135:9
index 512 is out of range for type 'long unsigned int [512]'
Call Trace:
 show_stack+0x52/0x58
 dump_stack_lvl+0x49/0x5e
 dump_stack+0x10/0x12
 ubsan_epilogue+0x9/0x3b
 __ubsan_handle_out_of_bounds.cold+0x44/0x49
 blk_mq_alloc_request_hctx+0x304/0x310
 __nvme_submit_sync_cmd+0x70/0x200 [nvme_core]
 nvmf_connect_io_queue+0x23e/0x2a0 [nvme_fabrics]
 nvme_loop_connect_io_queues+0x8d/0xb0 [nvme_loop]
 nvme_loop_create_ctrl+0x58e/0x7d0 [nvme_loop]
 nvmf_create_ctrl+0x1d7/0x4d0 [nvme_fabrics]
 nvmf_dev_write+0xae/0x111 [nvme_fabrics]
 vfs_write+0x144/0x560
 ksys_write+0xb7/0x140
 __x64_sys_write+0x42/0x50
 do_syscall_64+0x35/0x80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49720/">CVE-2022-49720 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49720">CVE-2022-49720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238281">SUSE bug 1238281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49932</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49932" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49932" ref_url="https://www.suse.com/security/cve/CVE-2022-49932" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: VMX: Do _all_ initialization before exposing /dev/kvm to userspace

Call kvm_init() only after _all_ setup is complete, as kvm_init() exposes
/dev/kvm to userspace and thus allows userspace to create VMs (and call
other ioctls).  E.g. KVM will encounter a NULL pointer when attempting to
add a vCPU to the per-CPU loaded_vmcss_on_cpu list if userspace is able to
create a VM before vmx_init() configures said list.

 BUG: kernel NULL pointer dereference, address: 0000000000000008
 #PF: supervisor write access in kernel mode
 #PF: error_code(0x0002) - not-present page
 PGD 0 P4D 0
 Oops: 0002 [#1] SMP
 CPU: 6 PID: 1143 Comm: stable Not tainted 6.0.0-rc7+ #988
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
 RIP: 0010:vmx_vcpu_load_vmcs+0x68/0x230 [kvm_intel]
  &lt;TASK&gt;
  vmx_vcpu_load+0x16/0x60 [kvm_intel]
  kvm_arch_vcpu_load+0x32/0x1f0 [kvm]
  vcpu_load+0x2f/0x40 [kvm]
  kvm_arch_vcpu_create+0x231/0x310 [kvm]
  kvm_vm_ioctl+0x79f/0xe10 [kvm]
  ? handle_mm_fault+0xb1/0x220
  __x64_sys_ioctl+0x80/0xb0
  do_syscall_64+0x2b/0x50
  entry_SYSCALL_64_after_hwframe+0x46/0xb0
 RIP: 0033:0x7f5a6b05743b
  &lt;/TASK&gt;
 Modules linked in: vhost_net vhost vhost_iotlb tap kvm_intel(+) kvm irqbypass
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49932/">CVE-2022-49932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49932">CVE-2022-49932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242737">SUSE bug 1242737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49975</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49975" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49975" ref_url="https://www.suse.com/security/cve/CVE-2022-49975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Don't redirect packets with invalid pkt_len

Syzbot found an issue [1]: fq_codel_drop() try to drop a flow whitout any
skbs, that is, the flow-&gt;head is null.
The root cause, as the [2] says, is because that bpf_prog_test_run_skb()
run a bpf prog which redirects empty skbs.
So we should determine whether the length of the packet modified by bpf
prog or others like bpf_prog_test is valid before forwarding it directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49975/">CVE-2022-49975 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49975">CVE-2022-49975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245196">SUSE bug 1245196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49980</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49980" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49980" ref_url="https://www.suse.com/security/cve/CVE-2022-49980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: gadget: Fix use-after-free Read in usb_udc_uevent()

The syzbot fuzzer found a race between uevent callbacks and gadget
driver unregistration that can cause a use-after-free bug:

---------------------------------------------------------------
BUG: KASAN: use-after-free in usb_udc_uevent+0x11f/0x130
drivers/usb/gadget/udc/core.c:1732
Read of size 8 at addr ffff888078ce2050 by task udevd/2968

CPU: 1 PID: 2968 Comm: udevd Not tainted 5.19.0-rc4-next-20220628-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google
06/29/2022
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:317 [inline]
 print_report.cold+0x2ba/0x719 mm/kasan/report.c:433
 kasan_report+0xbe/0x1f0 mm/kasan/report.c:495
 usb_udc_uevent+0x11f/0x130 drivers/usb/gadget/udc/core.c:1732
 dev_uevent+0x290/0x770 drivers/base/core.c:2424
---------------------------------------------------------------

The bug occurs because usb_udc_uevent() dereferences udc-&gt;driver but
does so without acquiring the udc_lock mutex, which protects this
field.  If the gadget driver is unbound from the udc concurrently with
uevent processing, the driver structure may be accessed after it has
been deallocated.

To prevent the race, we make sure that the routine holds the mutex
around the racing accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49980/">CVE-2022-49980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49980">CVE-2022-49980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245110">SUSE bug 1245110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245111">SUSE bug 1245111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49981</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49981" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49981" ref_url="https://www.suse.com/security/cve/CVE-2022-49981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: hidraw: fix memory leak in hidraw_release()

Free the buffered reports before deleting the list entry.

BUG: memory leak
unreferenced object 0xffff88810e72f180 (size 32):
  comm "softirq", pid 0, jiffies 4294945143 (age 16.080s)
  hex dump (first 32 bytes):
    64 f3 c6 6a d1 88 07 04 00 00 00 00 00 00 00 00  d..j............
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffff814ac6c3&gt;] kmemdup+0x23/0x50 mm/util.c:128
    [&lt;ffffffff8357c1d2&gt;] kmemdup include/linux/fortify-string.h:440 [inline]
    [&lt;ffffffff8357c1d2&gt;] hidraw_report_event+0xa2/0x150 drivers/hid/hidraw.c:521
    [&lt;ffffffff8356ddad&gt;] hid_report_raw_event+0x27d/0x740 drivers/hid/hid-core.c:1992
    [&lt;ffffffff8356e41e&gt;] hid_input_report+0x1ae/0x270 drivers/hid/hid-core.c:2065
    [&lt;ffffffff835f0d3f&gt;] hid_irq_in+0x1ff/0x250 drivers/hid/usbhid/hid-core.c:284
    [&lt;ffffffff82d3c7f9&gt;] __usb_hcd_giveback_urb+0xf9/0x230 drivers/usb/core/hcd.c:1670
    [&lt;ffffffff82d3cc26&gt;] usb_hcd_giveback_urb+0x1b6/0x1d0 drivers/usb/core/hcd.c:1747
    [&lt;ffffffff82ef1e14&gt;] dummy_timer+0x8e4/0x14c0 drivers/usb/gadget/udc/dummy_hcd.c:1988
    [&lt;ffffffff812f50a8&gt;] call_timer_fn+0x38/0x200 kernel/time/timer.c:1474
    [&lt;ffffffff812f5586&gt;] expire_timers kernel/time/timer.c:1519 [inline]
    [&lt;ffffffff812f5586&gt;] __run_timers.part.0+0x316/0x430 kernel/time/timer.c:1790
    [&lt;ffffffff812f56e4&gt;] __run_timers kernel/time/timer.c:1768 [inline]
    [&lt;ffffffff812f56e4&gt;] run_timer_softirq+0x44/0x90 kernel/time/timer.c:1803
    [&lt;ffffffff848000e6&gt;] __do_softirq+0xe6/0x2ea kernel/softirq.c:571
    [&lt;ffffffff81246db0&gt;] invoke_softirq kernel/softirq.c:445 [inline]
    [&lt;ffffffff81246db0&gt;] __irq_exit_rcu kernel/softirq.c:650 [inline]
    [&lt;ffffffff81246db0&gt;] irq_exit_rcu+0xc0/0x110 kernel/softirq.c:662
    [&lt;ffffffff84574f02&gt;] sysvec_apic_timer_interrupt+0xa2/0xd0 arch/x86/kernel/apic/apic.c:1106
    [&lt;ffffffff84600c8b&gt;] asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
    [&lt;ffffffff8458a070&gt;] native_safe_halt arch/x86/include/asm/irqflags.h:51 [inline]
    [&lt;ffffffff8458a070&gt;] arch_safe_halt arch/x86/include/asm/irqflags.h:89 [inline]
    [&lt;ffffffff8458a070&gt;] acpi_safe_halt drivers/acpi/processor_idle.c:111 [inline]
    [&lt;ffffffff8458a070&gt;] acpi_idle_do_entry+0xc0/0xd0 drivers/acpi/processor_idle.c:554
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49981/">CVE-2022-49981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49981">CVE-2022-49981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245072">SUSE bug 1245072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49987</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49987" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49987" ref_url="https://www.suse.com/security/cve/CVE-2022-49987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: call __md_stop_writes in md_stop

From the link [1], we can see raid1d was running even after the path
raid_dtr -&gt; md_stop -&gt; __md_stop.

Let's stop write first in destructor to align with normal md-raid to
fix the KASAN issue.

[1]. https://lore.kernel.org/linux-raid/CAPhsuW5gc4AakdGNdF8ubpezAuDLFOYUO_sfMZcec6hQFm8nhg@mail.gmail.com/T/#m7f12bf90481c02c6d2da68c64aeed4779b7df74a
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49987/">CVE-2022-49987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49987">CVE-2022-49987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245024">SUSE bug 1245024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50007</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50007" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50007" ref_url="https://www.suse.com/security/cve/CVE-2022-50007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: fix refcount leak in __xfrm_policy_check()

The issue happens on an error path in __xfrm_policy_check(). When the
fetching process of the object `pols[1]` fails, the function simply
returns 0, forgetting to decrement the reference count of `pols[0]`,
which is incremented earlier by either xfrm_sk_policy_lookup() or
xfrm_policy_lookup(). This may result in memory leaks.

Fix it by decreasing the reference count of `pols[0]` in that path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50007/">CVE-2022-50007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50007">CVE-2022-50007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245016">SUSE bug 1245016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50022</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50022" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50022" ref_url="https://www.suse.com/security/cve/CVE-2022-50022" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers:md:fix a potential use-after-free bug

In line 2884, "raid5_release_stripe(sh);" drops the reference to sh and
may cause sh to be released. However, sh is subsequently used in lines
2886 "if (sh-&gt;batch_head &amp;&amp; sh != sh-&gt;batch_head)". This may result in an
use-after-free bug.

It can be fixed by moving "raid5_release_stripe(sh);" to the bottom of
the function.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50022/">CVE-2022-50022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50022">CVE-2022-50022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245131">SUSE bug 1245131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50092</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50092" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50092" ref_url="https://www.suse.com/security/cve/CVE-2022-50092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm thin: fix use-after-free crash in dm_sm_register_threshold_callback

Fault inject on pool metadata device reports:
  BUG: KASAN: use-after-free in dm_pool_register_metadata_threshold+0x40/0x80
  Read of size 8 at addr ffff8881b9d50068 by task dmsetup/950

  CPU: 7 PID: 950 Comm: dmsetup Tainted: G        W         5.19.0-rc6 #1
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 04/01/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x34/0x44
   print_address_description.constprop.0.cold+0xeb/0x3f4
   kasan_report.cold+0xe6/0x147
   dm_pool_register_metadata_threshold+0x40/0x80
   pool_ctr+0xa0a/0x1150
   dm_table_add_target+0x2c8/0x640
   table_load+0x1fd/0x430
   ctl_ioctl+0x2c4/0x5a0
   dm_ctl_ioctl+0xa/0x10
   __x64_sys_ioctl+0xb3/0xd0
   do_syscall_64+0x35/0x80
   entry_SYSCALL_64_after_hwframe+0x46/0xb0

This can be easily reproduced using:
  echo offline &gt; /sys/block/sda/device/state
  dd if=/dev/zero of=/dev/mapper/thin bs=4k count=10
  dmsetup load pool --table "0 20971520 thin-pool /dev/sda /dev/sdb 128 0 0"

If a metadata commit fails, the transaction will be aborted and the
metadata space maps will be destroyed. If a DM table reload then
happens for this failed thin-pool, a use-after-free will occur in
dm_sm_register_threshold_callback (called from
dm_pool_register_metadata_threshold).

Fix this by in dm_pool_register_metadata_threshold() by returning the
-EINVAL error if the thin-pool is in fail mode. Also fail pool_ctr()
with a new error message: "Error registering metadata threshold".
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50092/">CVE-2022-50092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50092">CVE-2022-50092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244848">SUSE bug 1244848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50093</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50093" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50093" ref_url="https://www.suse.com/security/cve/CVE-2022-50093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE)

KASAN reports:

[ 4.668325][ T0] BUG: KASAN: wild-memory-access in dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497)
[    4.676149][    T0] Read of size 8 at addr 1fffffff85115558 by task swapper/0/0
[    4.683454][    T0]
[    4.685638][    T0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.19.0-rc3-00004-g0e862838f290 #1
[    4.694331][    T0] Hardware name: Supermicro SYS-5018D-FN4T/X10SDV-8C-TLN4F, BIOS 1.1 03/02/2016
[    4.703196][    T0] Call Trace:
[    4.706334][    T0]  &lt;TASK&gt;
[ 4.709133][ T0] ? dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497)

after converting the type of the first argument (@nr, bit number)
of arch_test_bit() from `long` to `unsigned long`[0].

Under certain conditions (for example, when ACPI NUMA is disabled
via command line), pxm_to_node() can return %NUMA_NO_NODE (-1).
It is valid 'magic' number of NUMA node, but not valid bit number
to use in bitops.
node_online() eventually descends to test_bit() without checking
for the input, assuming it's on caller side (which might be good
for perf-critical tasks). There, -1 becomes %ULONG_MAX which leads
to an insane array index when calculating bit position in memory.

For now, add an explicit check for @node being not %NUMA_NO_NODE
before calling test_bit(). The actual logics didn't change here
at all.

[0] https://github.com/norov/linux/commit/0e862838f290147ea9c16db852d8d494b552d38d
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50093/">CVE-2022-50093 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50093">CVE-2022-50093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244849">SUSE bug 1244849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50127</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50127" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50127" ref_url="https://www.suse.com/security/cve/CVE-2022-50127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix error unwind in rxe_create_qp()

In the function rxe_create_qp(), rxe_qp_from_init() is called to
initialize qp, internally things like the spin locks are not setup until
rxe_qp_init_req().

If an error occures before this point then the unwind will call
rxe_cleanup() and eventually to rxe_qp_do_cleanup()/rxe_cleanup_task()
which will oops when trying to access the uninitialized spinlock.

Move the spinlock initializations earlier before any failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50127/">CVE-2022-50127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50127">CVE-2022-50127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244815">SUSE bug 1244815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50138</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50138" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50138" ref_url="https://www.suse.com/security/cve/CVE-2022-50138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/qedr: Fix potential memory leak in __qedr_alloc_mr()

__qedr_alloc_mr() allocates a memory chunk for "mr-&gt;info.pbl_table" with
init_mr_info(). When rdma_alloc_tid() and rdma_register_tid() fail, "mr"
is released while "mr-&gt;info.pbl_table" is not released, which will lead
to a memory leak.

We should release the "mr-&gt;info.pbl_table" with qedr_free_pbl() when error
occurs to fix the memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50138/">CVE-2022-50138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50138">CVE-2022-50138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244797">SUSE bug 1244797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50162</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50162" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50162" ref_url="https://www.suse.com/security/cve/CVE-2022-50162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: libertas: Fix possible refcount leak in if_usb_probe()

usb_get_dev will be called before lbs_get_firmware_async which means that
usb_put_dev need to be called when lbs_get_firmware_async fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50162/">CVE-2022-50162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50162">CVE-2022-50162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244773">SUSE bug 1244773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50166</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50166" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50166" ref_url="https://www.suse.com/security/cve/CVE-2022-50166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: When HCI work queue is drained, only queue chained work

The HCI command, event, and data packet processing workqueue is drained
to avoid deadlock in commit
76727c02c1e1 ("Bluetooth: Call drain_workqueue() before resetting state").

There is another delayed work, which will queue command to this drained
workqueue. Which results in the following error report:

Bluetooth: hci2: command 0x040f tx timeout
WARNING: CPU: 1 PID: 18374 at kernel/workqueue.c:1438 __queue_work+0xdad/0x1140
Workqueue: events hci_cmd_timeout
RIP: 0010:__queue_work+0xdad/0x1140
RSP: 0000:ffffc90002cffc60 EFLAGS: 00010093
RAX: 0000000000000000 RBX: ffff8880b9d3ec00 RCX: 0000000000000000
RDX: ffff888024ba0000 RSI: ffffffff814e048d RDI: ffff8880b9d3ec08
RBP: 0000000000000008 R08: 0000000000000000 R09: 00000000b9d39700
R10: ffffffff814f73c6 R11: 0000000000000000 R12: ffff88807cce4c60
R13: 0000000000000000 R14: ffff8880796d8800 R15: ffff8880796d8800
FS:  0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c0174b4000 CR3: 000000007cae9000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? queue_work_on+0xcb/0x110
 ? lockdep_hardirqs_off+0x90/0xd0
 queue_work_on+0xee/0x110
 process_one_work+0x996/0x1610
 ? pwq_dec_nr_in_flight+0x2a0/0x2a0
 ? rwlock_bug.part.0+0x90/0x90
 ? _raw_spin_lock_irq+0x41/0x50
 worker_thread+0x665/0x1080
 ? process_one_work+0x1610/0x1610
 kthread+0x2e9/0x3a0
 ? kthread_complete_and_exit+0x40/0x40
 ret_from_fork+0x1f/0x30
 &lt;/TASK&gt;

To fix this, we can add a new HCI_DRAIN_WQ flag, and don't queue the
timeout workqueue while command workqueue is draining.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50166/">CVE-2022-50166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50166">CVE-2022-50166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244772">SUSE bug 1244772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50181</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50181" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50181" ref_url="https://www.suse.com/security/cve/CVE-2022-50181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-gpu: fix a missing check to avoid NULL dereference

'cache_ent' could be set NULL inside virtio_gpu_cmd_get_capset()
and it will lead to a NULL dereference by a lately use of it
(i.e., ptr = cache_ent-&gt;caps_cache). Fix it with a NULL check.


[ kraxel: minor codestyle fixup ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50181/">CVE-2022-50181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50181">CVE-2022-50181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244901">SUSE bug 1244901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50185</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50185" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50185" ref_url="https://www.suse.com/security/cve/CVE-2022-50185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers()

The last case label can write two buffers 'mc_reg_address[j]' and
'mc_data[j]' with 'j' offset equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE
since there are no checks for this value in both case labels after the
last 'j++'.

Instead of changing '&gt;' to '&gt;=' there, add the bounds check at the start
of the second 'case' (the first one already has it).

Also, remove redundant last checks for 'j' index bigger than array size.
The expression is always false. Moreover, before or after the patch
'table-&gt;last' can be equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE and it
seems it can be a valid value.

Detected using the static analysis tool - Svace.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50185/">CVE-2022-50185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50185">CVE-2022-50185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244887">SUSE bug 1244887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50215</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50215" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50215" ref_url="https://www.suse.com/security/cve/CVE-2022-50215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: sg: Allow waiting for commands to complete on removed device

When a SCSI device is removed while in active use, currently sg will
immediately return -ENODEV on any attempt to wait for active commands that
were sent before the removal.  This is problematic for commands that use
SG_FLAG_DIRECT_IO since the data buffer may still be in use by the kernel
when userspace frees or reuses it after getting ENODEV, leading to
corrupted userspace memory (in the case of READ-type commands) or corrupted
data being sent to the device (in the case of WRITE-type commands).  This
has been seen in practice when logging out of a iscsi_tcp session, where
the iSCSI driver may still be processing commands after the device has been
marked for removal.

Change the policy to allow userspace to wait for active sg commands even
when the device is being removed.  Return -ENODEV only when there are no
more responses to read.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50215/">CVE-2022-50215 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50215">CVE-2022-50215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245138">SUSE bug 1245138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50220</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50220" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50220" ref_url="https://www.suse.com/security/cve/CVE-2022-50220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usbnet: Fix linkwatch use-after-free on disconnect

usbnet uses the work usbnet_deferred_kevent() to perform tasks which may
sleep.  On disconnect, completion of the work was originally awaited in
-&gt;ndo_stop().  But in 2003, that was moved to -&gt;disconnect() by historic
commit "[PATCH] USB: usbnet, prevent exotic rtnl deadlock":

  https://git.kernel.org/tglx/history/c/0f138bbfd83c

The change was made because back then, the kernel's workqueue
implementation did not allow waiting for a single work.  One had to wait
for completion of *all* work by calling flush_scheduled_work(), and that
could deadlock when waiting for usbnet_deferred_kevent() with rtnl_mutex
held in -&gt;ndo_stop().

The commit solved one problem but created another:  It causes a
use-after-free in USB Ethernet drivers aqc111.c, asix_devices.c,
ax88179_178a.c, ch9200.c and smsc75xx.c:

* If the drivers receive a link change interrupt immediately before
  disconnect, they raise EVENT_LINK_RESET in their (non-sleepable)
  -&gt;status() callback and schedule usbnet_deferred_kevent().
* usbnet_deferred_kevent() invokes the driver's -&gt;link_reset() callback,
  which calls netif_carrier_{on,off}().
* That in turn schedules the work linkwatch_event().

Because usbnet_deferred_kevent() is awaited after unregister_netdev(),
netif_carrier_{on,off}() may operate on an unregistered netdev and
linkwatch_event() may run after free_netdev(), causing a use-after-free.

In 2010, usbnet was changed to only wait for a single instance of
usbnet_deferred_kevent() instead of *all* work by commit 23f333a2bfaf
("drivers/net: don't use flush_scheduled_work()").

Unfortunately the commit neglected to move the wait back to
-&gt;ndo_stop().  Rectify that omission at long last.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50220/">CVE-2022-50220 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50220">CVE-2022-50220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245348">SUSE bug 1245348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50228</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50228" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50228" ref_url="https://www.suse.com/security/cve/CVE-2022-50228" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17797" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0

Don't BUG/WARN on interrupt injection due to GIF being cleared,
since it's trivial for userspace to force the situation via
KVM_SET_VCPU_EVENTS (even if having at least a WARN there would be correct
for KVM internally generated injections).

  kernel BUG at arch/x86/kvm/svm/svm.c:3386!
  invalid opcode: 0000 [#1] SMP
  CPU: 15 PID: 926 Comm: smm_test Not tainted 5.17.0-rc3+ #264
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  RIP: 0010:svm_inject_irq+0xab/0xb0 [kvm_amd]
  Code: &lt;0f&gt; 0b 0f 1f 00 0f 1f 44 00 00 80 3d ac b3 01 00 00 55 48 89 f5 53
  RSP: 0018:ffffc90000b37d88 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: ffff88810a234ac0 RCX: 0000000000000006
  RDX: 0000000000000000 RSI: ffffc90000b37df7 RDI: ffff88810a234ac0
  RBP: ffffc90000b37df7 R08: ffff88810a1fa410 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
  R13: ffff888109571000 R14: ffff88810a234ac0 R15: 0000000000000000
  FS:  0000000001821380(0000) GS:ffff88846fdc0000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f74fc550008 CR3: 000000010a6fe000 CR4: 0000000000350ea0
  Call Trace:
   &lt;TASK&gt;
   inject_pending_event+0x2f7/0x4c0 [kvm]
   kvm_arch_vcpu_ioctl_run+0x791/0x17a0 [kvm]
   kvm_vcpu_ioctl+0x26d/0x650 [kvm]
   __x64_sys_ioctl+0x82/0xb0
   do_syscall_64+0x3b/0xc0
   entry_SYSCALL_64_after_hwframe+0x44/0xae
   &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50228/">CVE-2022-50228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50228">CVE-2022-50228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244854">SUSE bug 1244854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50241</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50241" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50241" ref_url="https://www.suse.com/security/cve/CVE-2022-50241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: fix use-after-free on source server when doing inter-server copy

Use-after-free occurred when the laundromat tried to free expired
cpntf_state entry on the s2s_cp_stateids list after inter-server
copy completed. The sc_cp_list that the expired copy state was
inserted on was already freed.

When COPY completes, the Linux client normally sends LOCKU(lock_state x),
FREE_STATEID(lock_state x) and CLOSE(open_state y) to the source server.
The nfs4_put_stid call from nfsd4_free_stateid cleans up the copy state
from the s2s_cp_stateids list before freeing the lock state's stid.

However, sometimes the CLOSE was sent before the FREE_STATEID request.
When this happens, the nfsd4_close_open_stateid call from nfsd4_close
frees all lock states on its st_locks list without cleaning up the copy
state on the sc_cp_list list. When the time the FREE_STATEID arrives the
server returns BAD_STATEID since the lock state was freed. This causes
the use-after-free error to occur when the laundromat tries to free
the expired cpntf_state.

This patch adds a call to nfs4_free_cpntf_statelist in
nfsd4_close_open_stateid to clean up the copy state before calling
free_ol_stateid_reaplist to free the lock state's stid on the reaplist.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50241/">CVE-2022-50241 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50241">CVE-2022-50241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249691">SUSE bug 1249691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50242</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50242" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50242" ref_url="https://www.suse.com/security/cve/CVE-2022-50242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers: net: qlcnic: Fix potential memory leak in qlcnic_sriov_init()

If vp alloc failed in qlcnic_sriov_init(), all previously allocated vp
needs to be freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50242/">CVE-2022-50242 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50242">CVE-2022-50242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249696">SUSE bug 1249696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50248</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50248" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50248" ref_url="https://www.suse.com/security/cve/CVE-2022-50248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023258.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: fix double free on tx path.

We see kernel crashes and lockups and KASAN errors related to ax210
firmware crashes.  One of the KASAN dumps pointed at the tx path,
and it appears there is indeed a way to double-free an skb.

If iwl_mvm_tx_skb_sta returns non-zero, then the 'skb' sent into the
method will be freed.  But, in case where we build TSO skb buffer,
the skb may also be freed in error case.  So, return 0 in that particular
error case and do cleanup manually.

BUG: KASAN: use-after-free in __list_del_entry_valid+0x12/0x90
iwlwifi 0000:06:00.0: 0x00000000 | tsf hi
Read of size 8 at addr ffff88813cfa4ba0 by task btserver/9650

CPU: 4 PID: 9650 Comm: btserver Tainted: G        W         5.19.8+ #5
iwlwifi 0000:06:00.0: 0x00000000 | time gp1
Hardware name: Default string Default string/SKYBAY, BIOS 5.12 02/19/2019
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x55/0x6d
 print_report.cold.12+0xf2/0x684
iwlwifi 0000:06:00.0: 0x1D0915A8 | time gp2
 ? __list_del_entry_valid+0x12/0x90
 kasan_report+0x8b/0x180
iwlwifi 0000:06:00.0: 0x00000001 | uCode revision type
 ? __list_del_entry_valid+0x12/0x90
 __list_del_entry_valid+0x12/0x90
iwlwifi 0000:06:00.0: 0x00000048 | uCode version major
 tcp_update_skb_after_send+0x5d/0x170
 __tcp_transmit_skb+0xb61/0x15c0
iwlwifi 0000:06:00.0: 0xDAA05125 | uCode version minor
 ? __tcp_select_window+0x490/0x490
iwlwifi 0000:06:00.0: 0x00000420 | hw version
 ? trace_kmalloc_node+0x29/0xd0
 ? __kmalloc_node_track_caller+0x12a/0x260
 ? memset+0x1f/0x40
 ? __build_skb_around+0x125/0x150
 ? __alloc_skb+0x1d4/0x220
 ? skb_zerocopy_clone+0x55/0x230
iwlwifi 0000:06:00.0: 0x00489002 | board version
 ? kmalloc_reserve+0x80/0x80
 ? rcu_read_lock_bh_held+0x60/0xb0
 tcp_write_xmit+0x3f1/0x24d0
iwlwifi 0000:06:00.0: 0x034E001C | hcmd
 ? __check_object_size+0x180/0x350
iwlwifi 0000:06:00.0: 0x24020000 | isr0
 tcp_sendmsg_locked+0x8a9/0x1520
iwlwifi 0000:06:00.0: 0x01400000 | isr1
 ? tcp_sendpage+0x50/0x50
iwlwifi 0000:06:00.0: 0x48F0000A | isr2
 ? lock_release+0xb9/0x400
 ? tcp_sendmsg+0x14/0x40
iwlwifi 0000:06:00.0: 0x00C3080C | isr3
 ? lock_downgrade+0x390/0x390
 ? do_raw_spin_lock+0x114/0x1d0
iwlwifi 0000:06:00.0: 0x00200000 | isr4
 ? rwlock_bug.part.2+0x50/0x50
iwlwifi 0000:06:00.0: 0x034A001C | last cmd Id
 ? rwlock_bug.part.2+0x50/0x50
 ? lockdep_hardirqs_on_prepare+0xe/0x200
iwlwifi 0000:06:00.0: 0x0000C2F0 | wait_event
 ? __local_bh_enable_ip+0x87/0xe0
 ? inet_send_prepare+0x220/0x220
iwlwifi 0000:06:00.0: 0x000000C4 | l2p_control
 tcp_sendmsg+0x22/0x40
 sock_sendmsg+0x5f/0x70
iwlwifi 0000:06:00.0: 0x00010034 | l2p_duration
 __sys_sendto+0x19d/0x250
iwlwifi 0000:06:00.0: 0x00000007 | l2p_mhvalid
 ? __ia32_sys_getpeername+0x40/0x40
iwlwifi 0000:06:00.0: 0x00000000 | l2p_addr_match
 ? rcu_read_lock_held_common+0x12/0x50
 ? rcu_read_lock_sched_held+0x5a/0xd0
 ? rcu_read_lock_bh_held+0xb0/0xb0
 ? rcu_read_lock_sched_held+0x5a/0xd0
 ? rcu_read_lock_sched_held+0x5a/0xd0
 ? lock_release+0xb9/0x400
 ? lock_downgrade+0x390/0x390
 ? ktime_get+0x64/0x130
 ? ktime_get+0x8d/0x130
 ? rcu_read_lock_held_common+0x12/0x50
 ? rcu_read_lock_sched_held+0x5a/0xd0
 ? rcu_read_lock_held_common+0x12/0x50
 ? rcu_read_lock_sched_held+0x5a/0xd0
 ? rcu_read_lock_bh_held+0xb0/0xb0
 ? rcu_read_lock_bh_held+0xb0/0xb0
 __x64_sys_sendto+0x6f/0x80
 do_syscall_64+0x34/0xb0
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f1d126e4531
Code: 00 00 00 00 0f 1f 44 00 00 f3 0f 1e fa 48 8d 05 35 80 0c 00 41 89 ca 8b 00 85 c0 75 1c 45 31 c9 45 31 c0 b8 2c 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 67 c3 66 0f 1f 44 00 00 55 48 83 ec 20 48 89
RSP: 002b:00007ffe21a679d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 000000000000ffdc RCX: 00007f1d126e4531
RDX: 0000000000010000 RSI: 000000000374acf0 RDI: 0000000000000014
RBP: 00007ffe21a67ac0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50248/">CVE-2022-50248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50248">CVE-2022-50248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249840">SUSE bug 1249840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249841">SUSE bug 1249841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50253</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50253" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50253" ref_url="https://www.suse.com/security/cve/CVE-2022-50253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: make sure skb-&gt;len != 0 when redirecting to a tunneling device

syzkaller managed to trigger another case where skb-&gt;len == 0
when we enter __dev_queue_xmit:

WARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]
WARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295

Call Trace:
 dev_queue_xmit+0x17/0x20 net/core/dev.c:4406
 __bpf_tx_skb net/core/filter.c:2115 [inline]
 __bpf_redirect_no_mac net/core/filter.c:2140 [inline]
 __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163
 ____bpf_clone_redirect net/core/filter.c:2447 [inline]
 bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419
 bpf_prog_48159a89cb4a9a16+0x59/0x5e
 bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]
 __bpf_prog_run include/linux/filter.h:596 [inline]
 bpf_prog_run include/linux/filter.h:603 [inline]
 bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402
 bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170
 bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648
 __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005
 __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]
 __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089
 do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48
 entry_SYSCALL_64_after_hwframe+0x61/0xc6

The reproducer doesn't really reproduce outside of syzkaller
environment, so I'm taking a guess here. It looks like we
do generate correct ETH_HLEN-sized packet, but we redirect
the packet to the tunneling device. Before we do so, we
__skb_pull l2 header and arrive again at skb-&gt;len == 0.
Doesn't seem like we can do anything better than having
an explicit check after __skb_pull?
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50253/">CVE-2022-50253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50253">CVE-2022-50253 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249912">SUSE bug 1249912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50272</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50272" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50272" ref_url="https://www.suse.com/security/cve/CVE-2022-50272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()

Wei Chen reports a kernel bug as blew:

general protection fault, probably for non-canonical address
KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]
...
Call Trace:
&lt;TASK&gt;
__i2c_transfer+0x77e/0x1930 drivers/i2c/i2c-core-base.c:2109
i2c_transfer+0x1d5/0x3d0 drivers/i2c/i2c-core-base.c:2170
i2cdev_ioctl_rdwr+0x393/0x660 drivers/i2c/i2c-dev.c:297
i2cdev_ioctl+0x75d/0x9f0 drivers/i2c/i2c-dev.c:458
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:870 [inline]
__se_sys_ioctl+0xfb/0x170 fs/ioctl.c:856
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3d/0x90 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fd834a8bded

In az6027_i2c_xfer(), if msg[i].addr is 0x99,
a null-ptr-deref will caused when accessing msg[i].buf.
For msg[i].len is 0 and msg[i].buf is null.

Fix this by checking msg[i].len in az6027_i2c_xfer().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50272/">CVE-2022-50272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50272">CVE-2022-50272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249808">SUSE bug 1249808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50278</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50278" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50278" ref_url="https://www.suse.com/security/cve/CVE-2022-50278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PNP: fix name memory leak in pnp_alloc_dev()

After commit 1fa5ae857bb1 ("driver core: get rid of struct device's
bus_id string array"), the name of device is allocated dynamically,
move dev_set_name() after pnp_add_id() to avoid memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50278/">CVE-2022-50278 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50278">CVE-2022-50278 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249715">SUSE bug 1249715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50280</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50280" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50280" ref_url="https://www.suse.com/security/cve/CVE-2022-50280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023685.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pnode: terminate at peers of source

The propagate_mnt() function handles mount propagation when creating
mounts and propagates the source mount tree @source_mnt to all
applicable nodes of the destination propagation mount tree headed by
@dest_mnt.

Unfortunately it contains a bug where it fails to terminate at peers of
@source_mnt when looking up copies of the source mount that become
masters for copies of the source mount tree mounted on top of slaves in
the destination propagation tree causing a NULL dereference.

Once the mechanics of the bug are understood it's easy to trigger.
Because of unprivileged user namespaces it is available to unprivileged
users.

While fixing this bug we've gotten confused multiple times due to
unclear terminology or missing concepts. So let's start this with some
clarifications:

* The terms "master" or "peer" denote a shared mount. A shared mount
  belongs to a peer group.

* A peer group is a set of shared mounts that propagate to each other.
  They are identified by a peer group id. The peer group id is available
  in @shared_mnt-&gt;mnt_group_id.
  Shared mounts within the same peer group have the same peer group id.
  The peers in a peer group can be reached via @shared_mnt-&gt;mnt_share.

* The terms "slave mount" or "dependent mount" denote a mount that
  receives propagation from a peer in a peer group. IOW, shared mounts
  may have slave mounts and slave mounts have shared mounts as their
  master. Slave mounts of a given peer in a peer group are listed on
  that peers slave list available at @shared_mnt-&gt;mnt_slave_list.

* The term "master mount" denotes a mount in a peer group. IOW, it
  denotes a shared mount or a peer mount in a peer group. The term
  "master mount" - or "master" for short - is mostly used when talking
  in the context of slave mounts that receive propagation from a master
  mount. A master mount of a slave identifies the closest peer group a
  slave mount receives propagation from. The master mount of a slave can
  be identified via @slave_mount-&gt;mnt_master. Different slaves may point
  to different masters in the same peer group.

* Multiple peers in a peer group can have non-empty -&gt;mnt_slave_lists.
  Non-empty -&gt;mnt_slave_lists of peers don't intersect. Consequently, to
  ensure all slave mounts of a peer group are visited the
  -&gt;mnt_slave_lists of all peers in a peer group have to be walked.

* Slave mounts point to a peer in the closest peer group they receive
  propagation from via @slave_mnt-&gt;mnt_master (see above). Together with
  these peers they form a propagation group (see below). The closest
  peer group can thus be identified through the peer group id
  @slave_mnt-&gt;mnt_master-&gt;mnt_group_id of the peer/master that a slave
  mount receives propagation from.

* A shared-slave mount is a slave mount to a peer group pg1 while also
  a peer in another peer group pg2. IOW, a peer group may receive
  propagation from another peer group.

  If a peer group pg1 is a slave to another peer group pg2 then all
  peers in peer group pg1 point to the same peer in peer group pg2 via
  -&gt;mnt_master. IOW, all peers in peer group pg1 appear on the same
  -&gt;mnt_slave_list. IOW, they cannot be slaves to different peer groups.

* A pure slave mount is a slave mount that is a slave to a peer group
  but is not a peer in another peer group.

* A propagation group denotes the set of mounts consisting of a single
  peer group pg1 and all slave mounts and shared-slave mounts that point
  to a peer in that peer group via -&gt;mnt_master. IOW, all slave mounts
  such that @slave_mnt-&gt;mnt_master-&gt;mnt_group_id is equal to
  @shared_mnt-&gt;mnt_group_id.

  The concept of a propagation group makes it easier to talk about a
  single propagation level in a propagation tree.

  For example, in propagate_mnt() the immediate peers of @dest_mnt and
  all slaves of @dest_mnt's peer group form a propagation group pr
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50280/">CVE-2022-50280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50280">CVE-2022-50280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249806">SUSE bug 1249806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50282</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50282" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50282" ref_url="https://www.suse.com/security/cve/CVE-2022-50282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

chardev: fix error handling in cdev_device_add()

While doing fault injection test, I got the following report:

------------[ cut here ]------------
kobject: '(null)' (0000000039956980): is not initialized, yet kobject_put() is being called.
WARNING: CPU: 3 PID: 6306 at kobject_put+0x23d/0x4e0
CPU: 3 PID: 6306 Comm: 283 Tainted: G        W          6.1.0-rc2-00005-g307c1086d7c9 #1253
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
RIP: 0010:kobject_put+0x23d/0x4e0
Call Trace:
 &lt;TASK&gt;
 cdev_device_add+0x15e/0x1b0
 __iio_device_register+0x13b4/0x1af0 [industrialio]
 __devm_iio_device_register+0x22/0x90 [industrialio]
 max517_probe+0x3d8/0x6b4 [max517]
 i2c_device_probe+0xa81/0xc00

When device_add() is injected fault and returns error, if dev-&gt;devt is not set,
cdev_add() is not called, cdev_del() is not needed. Fix this by checking dev-&gt;devt
in error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50282/">CVE-2022-50282 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50282">CVE-2022-50282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249739">SUSE bug 1249739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249764">SUSE bug 1249764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50285</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50285" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50285" ref_url="https://www.suse.com/security/cve/CVE-2022-50285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm,hugetlb: take hugetlb_lock before decrementing h-&gt;resv_huge_pages

The h-&gt;*_huge_pages counters are protected by the hugetlb_lock, but
alloc_huge_page has a corner case where it can decrement the counter
outside of the lock.

This could lead to a corrupted value of h-&gt;resv_huge_pages, which we have
observed on our systems.

Take the hugetlb_lock before decrementing h-&gt;resv_huge_pages to avoid a
potential race.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50285/">CVE-2022-50285 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50285">CVE-2022-50285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249803">SUSE bug 1249803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50294</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50294" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50294" ref_url="https://www.suse.com/security/cve/CVE-2022-50294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: libertas: fix memory leak in lbs_init_adapter()

When kfifo_alloc() failed in lbs_init_adapter(), cmd buffer is not
released. Add free memory to processing error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50294/">CVE-2022-50294 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50294">CVE-2022-50294 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249799">SUSE bug 1249799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50297</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50297" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50297" ref_url="https://www.suse.com/security/cve/CVE-2022-50297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: verify the expected usb_endpoints are present

The bug arises when a USB device claims to be an ATH9K but doesn't
have the expected endpoints. (In this case there was an interrupt
endpoint where the driver expected a bulk endpoint.) The kernel
needs to be able to handle such devices without getting an internal error.

usb 1-1: BOGUS urb xfer, pipe 3 != type 1
WARNING: CPU: 3 PID: 500 at drivers/usb/core/urb.c:493 usb_submit_urb+0xce2/0x1430 drivers/usb/core/urb.c:493
Modules linked in:
CPU: 3 PID: 500 Comm: kworker/3:2 Not tainted 5.10.135-syzkaller #0
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Workqueue: events request_firmware_work_func
RIP: 0010:usb_submit_urb+0xce2/0x1430 drivers/usb/core/urb.c:493
Call Trace:
 ath9k_hif_usb_alloc_rx_urbs drivers/net/wireless/ath/ath9k/hif_usb.c:908 [inline]
 ath9k_hif_usb_alloc_urbs+0x75e/0x1010 drivers/net/wireless/ath/ath9k/hif_usb.c:1019
 ath9k_hif_usb_dev_init drivers/net/wireless/ath/ath9k/hif_usb.c:1109 [inline]
 ath9k_hif_usb_firmware_cb+0x142/0x530 drivers/net/wireless/ath/ath9k/hif_usb.c:1242
 request_firmware_work_func+0x12e/0x240 drivers/base/firmware_loader/main.c:1097
 process_one_work+0x9af/0x1600 kernel/workqueue.c:2279
 worker_thread+0x61d/0x12f0 kernel/workqueue.c:2425
 kthread+0x3b4/0x4a0 kernel/kthread.c:313
 ret_from_fork+0x22/0x30 arch/x86/entry/entry_64.S:299

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50297/">CVE-2022-50297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50297">CVE-2022-50297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250250">SUSE bug 1250250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50303</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50303" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50303" ref_url="https://www.suse.com/security/cve/CVE-2022-50303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix double release compute pasid

If kfd_process_device_init_vm returns failure after vm is converted to
compute vm and vm-&gt;pasid set to compute pasid, KFD will not take
pdd-&gt;drm_file reference. As a result, drm close file handler maybe
called to release the compute pasid before KFD process destroy worker to
release the same pasid and set vm-&gt;pasid to zero, this generates below
WARNING backtrace and NULL pointer access.

Add helper amdgpu_amdkfd_gpuvm_set_vm_pasid and call it at the last step
of kfd_process_device_init_vm, to ensure vm pasid is the original pasid
if acquiring vm failed or is the compute pasid with pdd-&gt;drm_file
reference taken to avoid double release same pasid.

 amdgpu: Failed to create process VM object
 ida_free called for id=32770 which is not allocated.
 WARNING: CPU: 57 PID: 72542 at ../lib/idr.c:522 ida_free+0x96/0x140
 RIP: 0010:ida_free+0x96/0x140
 Call Trace:
  amdgpu_pasid_free_delayed+0xe1/0x2a0 [amdgpu]
  amdgpu_driver_postclose_kms+0x2d8/0x340 [amdgpu]
  drm_file_free.part.13+0x216/0x270 [drm]
  drm_close_helper.isra.14+0x60/0x70 [drm]
  drm_release+0x6e/0xf0 [drm]
  __fput+0xcc/0x280
  ____fput+0xe/0x20
  task_work_run+0x96/0xc0
  do_exit+0x3d0/0xc10

 BUG: kernel NULL pointer dereference, address: 0000000000000000
 RIP: 0010:ida_free+0x76/0x140
 Call Trace:
  amdgpu_pasid_free_delayed+0xe1/0x2a0 [amdgpu]
  amdgpu_driver_postclose_kms+0x2d8/0x340 [amdgpu]
  drm_file_free.part.13+0x216/0x270 [drm]
  drm_close_helper.isra.14+0x60/0x70 [drm]
  drm_release+0x6e/0xf0 [drm]
  __fput+0xcc/0x280
  ____fput+0xe/0x20
  task_work_run+0x96/0xc0
  do_exit+0x3d0/0xc10
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50303/">CVE-2022-50303 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50303">CVE-2022-50303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249884">SUSE bug 1249884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50312</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50312" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50312" ref_url="https://www.suse.com/security/cve/CVE-2022-50312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers: serial: jsm: fix some leaks in probe

This error path needs to unwind instead of just returning directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50312/">CVE-2022-50312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50312">CVE-2022-50312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249716">SUSE bug 1249716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50327</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50327" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50327" ref_url="https://www.suse.com/security/cve/CVE-2022-50327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023844.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value

The return value of acpi_fetch_acpi_dev() could be NULL, which would
cause a NULL pointer dereference to occur in acpi_device_hid().

[ rjw: Subject and changelog edits, added empty line after if () ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50327/">CVE-2022-50327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50327">CVE-2022-50327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249859">SUSE bug 1249859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254451">SUSE bug 1254451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50344</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50344" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50344" ref_url="https://www.suse.com/security/cve/CVE-2022-50344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix null-ptr-deref in ext4_write_info

I caught a null-ptr-deref bug as follows:
==================================================================
KASAN: null-ptr-deref in range [0x0000000000000068-0x000000000000006f]
CPU: 1 PID: 1589 Comm: umount Not tainted 5.10.0-02219-dirty #339
RIP: 0010:ext4_write_info+0x53/0x1b0
[...]
Call Trace:
 dquot_writeback_dquots+0x341/0x9a0
 ext4_sync_fs+0x19e/0x800
 __sync_filesystem+0x83/0x100
 sync_filesystem+0x89/0xf0
 generic_shutdown_super+0x79/0x3e0
 kill_block_super+0xa1/0x110
 deactivate_locked_super+0xac/0x130
 deactivate_super+0xb6/0xd0
 cleanup_mnt+0x289/0x400
 __cleanup_mnt+0x16/0x20
 task_work_run+0x11c/0x1c0
 exit_to_user_mode_prepare+0x203/0x210
 syscall_exit_to_user_mode+0x5b/0x3a0
 do_syscall_64+0x59/0x70
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
 ==================================================================

Above issue may happen as follows:
-------------------------------------
exit_to_user_mode_prepare
 task_work_run
  __cleanup_mnt
   cleanup_mnt
    deactivate_super
     deactivate_locked_super
      kill_block_super
       generic_shutdown_super
        shrink_dcache_for_umount
         dentry = sb-&gt;s_root
         sb-&gt;s_root = NULL              &lt;--- Here set NULL
        sync_filesystem
         __sync_filesystem
          sb-&gt;s_op-&gt;sync_fs &gt; ext4_sync_fs
           dquot_writeback_dquots
            sb-&gt;dq_op-&gt;write_info &gt; ext4_write_info
             ext4_journal_start(d_inode(sb-&gt;s_root), EXT4_HT_QUOTA, 2)
              d_inode(sb-&gt;s_root)
               s_root-&gt;d_inode          &lt;--- Null pointer dereference

To solve this problem, we use ext4_journal_start_sb directly
to avoid s_root being used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50344/">CVE-2022-50344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50344">CVE-2022-50344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250014">SUSE bug 1250014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50346</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50346" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50346" ref_url="https://www.suse.com/security/cve/CVE-2022-50346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: init quota for 'old.inode' in 'ext4_rename'

Syzbot found the following issue:
ext4_parse_param: s_want_extra_isize=128
ext4_inode_info_init: s_want_extra_isize=32
ext4_rename: old.inode=ffff88823869a2c8 old.dir=ffff888238699828 new.inode=ffff88823869d7e8 new.dir=ffff888238699828
__ext4_mark_inode_dirty: inode=ffff888238699828 ea_isize=32 want_ea_size=128
__ext4_mark_inode_dirty: inode=ffff88823869a2c8 ea_isize=32 want_ea_size=128
ext4_xattr_block_set: inode=ffff88823869a2c8
------------[ cut here ]------------
WARNING: CPU: 13 PID: 2234 at fs/ext4/xattr.c:2070 ext4_xattr_block_set.cold+0x22/0x980
Modules linked in:
RIP: 0010:ext4_xattr_block_set.cold+0x22/0x980
RSP: 0018:ffff888227d3f3b0 EFLAGS: 00010202
RAX: 0000000000000001 RBX: ffff88823007a000 RCX: 0000000000000000
RDX: 0000000000000a03 RSI: 0000000000000040 RDI: ffff888230078178
RBP: 0000000000000000 R08: 000000000000002c R09: ffffed1075c7df8e
R10: ffff8883ae3efc6b R11: ffffed1075c7df8d R12: 0000000000000000
R13: ffff88823869a2c8 R14: ffff8881012e0460 R15: dffffc0000000000
FS:  00007f350ac1f740(0000) GS:ffff8883ae200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f350a6ed6a0 CR3: 0000000237456000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? ext4_xattr_set_entry+0x3b7/0x2320
 ? ext4_xattr_block_set+0x0/0x2020
 ? ext4_xattr_set_entry+0x0/0x2320
 ? ext4_xattr_check_entries+0x77/0x310
 ? ext4_xattr_ibody_set+0x23b/0x340
 ext4_xattr_move_to_block+0x594/0x720
 ext4_expand_extra_isize_ea+0x59a/0x10f0
 __ext4_expand_extra_isize+0x278/0x3f0
 __ext4_mark_inode_dirty.cold+0x347/0x410
 ext4_rename+0xed3/0x174f
 vfs_rename+0x13a7/0x2510
 do_renameat2+0x55d/0x920
 __x64_sys_rename+0x7d/0xb0
 do_syscall_64+0x3b/0xa0
 entry_SYSCALL_64_after_hwframe+0x72/0xdc

As 'ext4_rename' will modify 'old.inode' ctime and mark inode dirty,
which may trigger expand 'extra_isize' and allocate block. If inode
didn't init quota will lead to warning.  To solve above issue, init
'old.inode' firstly in 'ext4_rename'.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50346/">CVE-2022-50346 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50346">CVE-2022-50346 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250044">SUSE bug 1250044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50347</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50347" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50347" ref_url="https://www.suse.com/security/cve/CVE-2022-50347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: rtsx_usb_sdmmc: fix return value check of mmc_add_host()

mmc_add_host() may return error, if we ignore its return value, the memory
that allocated in mmc_alloc_host() will be leaked and it will lead a kernel
crash because of deleting not added device in the remove path.

So fix this by checking the return value and calling mmc_free_host() in the
error path, besides, led_classdev_unregister() and pm_runtime_disable() also
need be called.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50347/">CVE-2022-50347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50347">CVE-2022-50347 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249928">SUSE bug 1249928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50349</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50349" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50349" ref_url="https://www.suse.com/security/cve/CVE-2022-50349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: tifm: fix possible memory leak in tifm_7xx1_switch_media()

If device_register() returns error in tifm_7xx1_switch_media(),
name of kobject which is allocated in dev_set_name() called in device_add()
is leaked.

Never directly free @dev after calling device_register(), even
if it returned an error! Always use put_device() to give up the
reference initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50349/">CVE-2022-50349 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50349">CVE-2022-50349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249920">SUSE bug 1249920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50350</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50350" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50350" ref_url="https://www.suse.com/security/cve/CVE-2022-50350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: iscsi: Fix a race condition between login_work and the login thread

In case a malicious initiator sends some random data immediately after a
login PDU; the iscsi_target_sk_data_ready() callback will schedule the
login_work and, at the same time, the negotiation may end without clearing
the LOGIN_FLAGS_INITIAL_PDU flag (because no additional PDU exchanges are
required to complete the login).

The login has been completed but the login_work function will find the
LOGIN_FLAGS_INITIAL_PDU flag set and will never stop from rescheduling
itself; at this point, if the initiator drops the connection, the
iscsit_conn structure will be freed, login_work will dereference a released
socket structure and the kernel crashes.

BUG: kernel NULL pointer dereference, address: 0000000000000230
PF: supervisor write access in kernel mode
PF: error_code(0x0002) - not-present page
Workqueue: events iscsi_target_do_login_rx [iscsi_target_mod]
RIP: 0010:_raw_read_lock_bh+0x15/0x30
Call trace:
 iscsi_target_do_login_rx+0x75/0x3f0 [iscsi_target_mod]
 process_one_work+0x1e8/0x3c0

Fix this bug by forcing login_work to stop after the login has been
completed and the socket callbacks have been restored.

Add a comment to clearify the return values of iscsi_target_do_login()
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50350/">CVE-2022-50350 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50350">CVE-2022-50350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250261">SUSE bug 1250261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50353</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50353" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50353" ref_url="https://www.suse.com/security/cve/CVE-2022-50353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: wmt-sdmmc: fix return value check of mmc_add_host()

mmc_add_host() may return error, if we ignore its return value, the memory
that allocated in mmc_alloc_host() will be leaked and it will lead a kernel
crash because of deleting not added device in the remove path.

So fix this by checking the return value and goto error path which will call
mmc_free_host(), besides, clk_disable_unprepare() also needs be called.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50353/">CVE-2022-50353 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50353">CVE-2022-50353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250047">SUSE bug 1250047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50356</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50356" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50356" ref_url="https://www.suse.com/security/cve/CVE-2022-50356" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: sfb: fix null pointer access issue when sfb_init() fails

When the default qdisc is sfb, if the qdisc of dev_queue fails to be
inited during mqprio_init(), sfb_reset() is invoked to clear resources.
In this case, the q-&gt;qdisc is NULL, and it will cause gpf issue.

The process is as follows:
qdisc_create_dflt()
	sfb_init()
		tcf_block_get()          ---&gt;failed, q-&gt;qdisc is NULL
	...
	qdisc_put()
		...
		sfb_reset()
			qdisc_reset(q-&gt;qdisc)    ---&gt;q-&gt;qdisc is NULL
				ops = qdisc-&gt;ops

The following is the Call Trace information:
general protection fault, probably for non-canonical address
0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
RIP: 0010:qdisc_reset+0x2b/0x6f0
Call Trace:
&lt;TASK&gt;
sfb_reset+0x37/0xd0
qdisc_reset+0xed/0x6f0
qdisc_destroy+0x82/0x4c0
qdisc_put+0x9e/0xb0
qdisc_create_dflt+0x2c3/0x4a0
mqprio_init+0xa71/0x1760
qdisc_create+0x3eb/0x1000
tc_modify_qdisc+0x408/0x1720
rtnetlink_rcv_msg+0x38e/0xac0
netlink_rcv_skb+0x12d/0x3a0
netlink_unicast+0x4a2/0x740
netlink_sendmsg+0x826/0xcc0
sock_sendmsg+0xc5/0x100
____sys_sendmsg+0x583/0x690
___sys_sendmsg+0xe8/0x160
__sys_sendmsg+0xbf/0x160
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f2164122d04
&lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50356/">CVE-2022-50356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50356">CVE-2022-50356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250040">SUSE bug 1250040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50359</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50359" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50359" ref_url="https://www.suse.com/security/cve/CVE-2022-50359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: cx88: Fix a null-ptr-deref bug in buffer_prepare()

When the driver calls cx88_risc_buffer() to prepare the buffer, the
function call may fail, resulting in a empty buffer and null-ptr-deref
later in buffer_queue().

The following log can reveal it:

[   41.822762] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI
[   41.824488] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
[   41.828027] RIP: 0010:buffer_queue+0xc2/0x500
[   41.836311] Call Trace:
[   41.836945]  __enqueue_in_driver+0x141/0x360
[   41.837262]  vb2_start_streaming+0x62/0x4a0
[   41.838216]  vb2_core_streamon+0x1da/0x2c0
[   41.838516]  __vb2_init_fileio+0x981/0xbc0
[   41.839141]  __vb2_perform_fileio+0xbf9/0x1120
[   41.840072]  vb2_fop_read+0x20e/0x400
[   41.840346]  v4l2_read+0x215/0x290
[   41.840603]  vfs_read+0x162/0x4c0

Fix this by checking the return value of cx88_risc_buffer()

[hverkuil: fix coding style issues]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50359/">CVE-2022-50359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50359">CVE-2022-50359 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250269">SUSE bug 1250269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50364</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50364" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50364" ref_url="https://www.suse.com/security/cve/CVE-2022-50364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: mux: reg: check return value after calling platform_get_resource()

It will cause null-ptr-deref in resource_size(), if platform_get_resource()
returns NULL, move calling resource_size() after devm_ioremap_resource() that
will check 'res' to avoid null-ptr-deref.
And use devm_platform_get_and_ioremap_resource() to simplify code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50364/">CVE-2022-50364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50364">CVE-2022-50364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250083">SUSE bug 1250083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50385</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50385" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50385" ref_url="https://www.suse.com/security/cve/CVE-2022-50385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix an Oops in nfs_d_automount()

When mounting from a NFSv4 referral, path-&gt;dentry can end up being a
negative dentry, so derive the struct nfs_server from the dentry
itself instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50385/">CVE-2022-50385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50385">CVE-2022-50385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250131">SUSE bug 1250131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50393</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50393" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50393" ref_url="https://www.suse.com/security/cve/CVE-2022-50393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: SDMA update use unlocked iterator

SDMA update page table may be called from unlocked context, this
generate below warning. Use unlocked iterator to handle this case.

WARNING: CPU: 0 PID: 1475 at
drivers/dma-buf/dma-resv.c:483 dma_resv_iter_next
Call Trace:
 dma_resv_iter_first+0x43/0xa0
 amdgpu_vm_sdma_update+0x69/0x2d0 [amdgpu]
 amdgpu_vm_ptes_update+0x29c/0x870 [amdgpu]
 amdgpu_vm_update_range+0x2f6/0x6c0 [amdgpu]
 svm_range_unmap_from_gpus+0x115/0x300 [amdgpu]
 svm_range_cpu_invalidate_pagetables+0x510/0x5e0 [amdgpu]
 __mmu_notifier_invalidate_range_start+0x1d3/0x230
 unmap_vmas+0x140/0x150
 unmap_region+0xa8/0x110
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50393/">CVE-2022-50393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50393">CVE-2022-50393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250278">SUSE bug 1250278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50394</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50394" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50394" ref_url="https://www.suse.com/security/cve/CVE-2022-50394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: ismt: Fix an out-of-bounds bug in ismt_access()

When the driver does not check the data from the user, the variable
'data-&gt;block[0]' may be very large to cause an out-of-bounds bug.

The following log can reveal it:

[   33.995542] i2c i2c-1: ioctl, cmd=0x720, arg=0x7ffcb3dc3a20
[   33.995978] ismt_smbus 0000:00:05.0: I2C_SMBUS_BLOCK_DATA:  WRITE
[   33.996475] ==================================================================
[   33.996995] BUG: KASAN: out-of-bounds in ismt_access.cold+0x374/0x214b
[   33.997473] Read of size 18446744073709551615 at addr ffff88810efcfdb1 by task ismt_poc/485
[   33.999450] Call Trace:
[   34.001849]  memcpy+0x20/0x60
[   34.002077]  ismt_access.cold+0x374/0x214b
[   34.003382]  __i2c_smbus_xfer+0x44f/0xfb0
[   34.004007]  i2c_smbus_xfer+0x10a/0x390
[   34.004291]  i2cdev_ioctl_smbus+0x2c8/0x710
[   34.005196]  i2cdev_ioctl+0x5ec/0x74c

Fix this bug by checking the size of 'data-&gt;block[0]' first.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50394/">CVE-2022-50394 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50394">CVE-2022-50394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250107">SUSE bug 1250107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50405</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50405" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50405" ref_url="https://www.suse.com/security/cve/CVE-2022-50405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/tunnel: wait until all sk_user_data reader finish before releasing the sock

There is a race condition in vxlan that when deleting a vxlan device
during receiving packets, there is a possibility that the sock is
released after getting vxlan_sock vs from sk_user_data. Then in
later vxlan_ecn_decapsulate(), vxlan_get_sk_family() we will got
NULL pointer dereference. e.g.

   #0 [ffffa25ec6978a38] machine_kexec at ffffffff8c669757
   #1 [ffffa25ec6978a90] __crash_kexec at ffffffff8c7c0a4d
   #2 [ffffa25ec6978b58] crash_kexec at ffffffff8c7c1c48
   #3 [ffffa25ec6978b60] oops_end at ffffffff8c627f2b
   #4 [ffffa25ec6978b80] page_fault_oops at ffffffff8c678fcb
   #5 [ffffa25ec6978bd8] exc_page_fault at ffffffff8d109542
   #6 [ffffa25ec6978c00] asm_exc_page_fault at ffffffff8d200b62
      [exception RIP: vxlan_ecn_decapsulate+0x3b]
      RIP: ffffffffc1014e7b  RSP: ffffa25ec6978cb0  RFLAGS: 00010246
      RAX: 0000000000000008  RBX: ffff8aa000888000  RCX: 0000000000000000
      RDX: 000000000000000e  RSI: ffff8a9fc7ab803e  RDI: ffff8a9fd1168700
      RBP: ffff8a9fc7ab803e   R8: 0000000000700000   R9: 00000000000010ae
      R10: ffff8a9fcb748980  R11: 0000000000000000  R12: ffff8a9fd1168700
      R13: ffff8aa000888000  R14: 00000000002a0000  R15: 00000000000010ae
      ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
   #7 [ffffa25ec6978ce8] vxlan_rcv at ffffffffc10189cd [vxlan]
   #8 [ffffa25ec6978d90] udp_queue_rcv_one_skb at ffffffff8cfb6507
   #9 [ffffa25ec6978dc0] udp_unicast_rcv_skb at ffffffff8cfb6e45
  #10 [ffffa25ec6978dc8] __udp4_lib_rcv at ffffffff8cfb8807
  #11 [ffffa25ec6978e20] ip_protocol_deliver_rcu at ffffffff8cf76951
  #12 [ffffa25ec6978e48] ip_local_deliver at ffffffff8cf76bde
  #13 [ffffa25ec6978ea0] __netif_receive_skb_one_core at ffffffff8cecde9b
  #14 [ffffa25ec6978ec8] process_backlog at ffffffff8cece139
  #15 [ffffa25ec6978f00] __napi_poll at ffffffff8ceced1a
  #16 [ffffa25ec6978f28] net_rx_action at ffffffff8cecf1f3
  #17 [ffffa25ec6978fa0] __softirqentry_text_start at ffffffff8d4000ca
  #18 [ffffa25ec6978ff0] do_softirq at ffffffff8c6fbdc3

Reproducer: https://github.com/Mellanox/ovs-tests/blob/master/test-ovs-vxlan-remove-tunnel-during-traffic.sh

Fix this by waiting for all sk_user_data reader to finish before
releasing the sock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50405/">CVE-2022-50405 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50405">CVE-2022-50405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250155">SUSE bug 1250155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50406</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50406" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50406" ref_url="https://www.suse.com/security/cve/CVE-2022-50406" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iomap: iomap: fix memory corruption when recording errors during writeback

Every now and then I see this crash on arm64:

Unable to handle kernel NULL pointer dereference at virtual address 00000000000000f8
Buffer I/O error on dev dm-0, logical block 8733687, async page read
Mem abort info:
  ESR = 0x0000000096000006
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x06: level 2 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000006
  CM = 0, WnR = 0
user pgtable: 64k pages, 42-bit VAs, pgdp=0000000139750000
[00000000000000f8] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000, pmd=0000000000000000
Internal error: Oops: 96000006 [#1] PREEMPT SMP
Buffer I/O error on dev dm-0, logical block 8733688, async page read
Dumping ftrace buffer:
Buffer I/O error on dev dm-0, logical block 8733689, async page read
   (ftrace buffer empty)
XFS (dm-0): log I/O error -5
Modules linked in: dm_thin_pool dm_persistent_data
XFS (dm-0): Metadata I/O Error (0x1) detected at xfs_trans_read_buf_map+0x1ec/0x590 [xfs] (fs/xfs/xfs_trans_buf.c:296).
 dm_bio_prison
XFS (dm-0): Please unmount the filesystem and rectify the problem(s)
XFS (dm-0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -5, agno 0
 dm_bufio dm_log_writes xfs nft_chain_nat xt_REDIRECT nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip6t_REJECT
potentially unexpected fatal signal 6.
 nf_reject_ipv6
potentially unexpected fatal signal 6.
 ipt_REJECT nf_reject_ipv4
CPU: 1 PID: 122166 Comm: fsstress Tainted: G        W          6.0.0-rc5-djwa #rc5 3004c9f1de887ebae86015f2677638ce51ee7
 rpcsec_gss_krb5 auth_rpcgss xt_tcpudp ip_set_hash_ip ip_set_hash_net xt_set nft_compat ip_set_hash_mac ip_set nf_tables
Hardware name: QEMU KVM Virtual Machine, BIOS 1.5.1 06/16/2021
pstate: 60001000 (nZCv daif -PAN -UAO -TCO -DIT +SSBS BTYPE=--)
 ip_tables
pc : 000003fd6d7df200
 x_tables
lr : 000003fd6d7df1ec
 overlay nfsv4
CPU: 0 PID: 54031 Comm: u4:3 Tainted: G        W          6.0.0-rc5-djwa #rc5 3004c9f1de887ebae86015f2677638ce51ee7405
Hardware name: QEMU KVM Virtual Machine, BIOS 1.5.1 06/16/2021
Workqueue: writeback wb_workfn
sp : 000003ffd9522fd0
 (flush-253:0)
pstate: 60401005 (nZCv daif +PAN -UAO -TCO -DIT +SSBS BTYPE=--)
pc : errseq_set+0x1c/0x100
x29: 000003ffd9522fd0 x28: 0000000000000023 x27: 000002acefeb6780
x26: 0000000000000005 x25: 0000000000000001 x24: 0000000000000000
x23: 00000000ffffffff x22: 0000000000000005
lr : __filemap_set_wb_err+0x24/0xe0
 x21: 0000000000000006
sp : fffffe000f80f760
x29: fffffe000f80f760 x28: 0000000000000003 x27: fffffe000f80f9f8
x26: 0000000002523000 x25: 00000000fffffffb x24: fffffe000f80f868
x23: fffffe000f80fbb0 x22: fffffc0180c26a78 x21: 0000000002530000
x20: 0000000000000000 x19: 0000000000000000 x18: 0000000000000000

x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
x14: 0000000000000001 x13: 0000000000470af3 x12: fffffc0058f70000
x11: 0000000000000040 x10: 0000000000001b20 x9 : fffffe000836b288
x8 : fffffc00eb9fd480 x7 : 0000000000f83659 x6 : 0000000000000000
x5 : 0000000000000869 x4 : 0000000000000005 x3 : 00000000000000f8
x20: 000003fd6d740020 x19: 000000000001dd36 x18: 0000000000000001
x17: 000003fd6d78704c x16: 0000000000000001 x15: 000002acfac87668
x2 : 0000000000000ffa x1 : 00000000fffffffb x0 : 00000000000000f8
Call trace:
 errseq_set+0x1c/0x100
 __filemap_set_wb_err+0x24/0xe0
 iomap_do_writepage+0x5e4/0xd5c
 write_cache_pages+0x208/0x674
 iomap_writepages+0x34/0x60
 xfs_vm_writepages+0x8c/0xcc [xfs 7a861f39c43631f15d3a5884246ba5035d4ca78b]
x14: 0000000000000000 x13: 2064656e72757465 x12: 0000000000002180
x11: 000003fd6d8a82d0 x10: 0000000000000000 x9 : 000003fd6d8ae288
x8 : 0000000000000083 x7 : 00000000ffffffff x6 : 00000000ffffffee
x5 : 00000000fbad2887 x4 : 000003fd6d9abb58 x3 : 000003fd6d740020
x2 : 0000000000000006 x1 : 000000000001dd36 x0 : 0000000000000000
CPU: 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50406/">CVE-2022-50406 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50406">CVE-2022-50406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250165">SUSE bug 1250165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50408</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50408" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50408" ref_url="https://www.suse.com/security/cve/CVE-2022-50408" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002461.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22910" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()

&gt; ret = brcmf_proto_tx_queue_data(drvr, ifp-&gt;ifidx, skb);

may be schedule, and then complete before the line

&gt; ndev-&gt;stats.tx_bytes += skb-&gt;len;

[   46.912801] ==================================================================
[   46.920552] BUG: KASAN: use-after-free in brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]
[   46.928673] Read of size 4 at addr ffffff803f5882e8 by task systemd-resolve/328
[   46.935991]
[   46.937514] CPU: 1 PID: 328 Comm: systemd-resolve Tainted: G           O      5.4.199-[REDACTED] #1
[   46.947255] Hardware name: [REDACTED]
[   46.954568] Call trace:
[   46.957037]  dump_backtrace+0x0/0x2b8
[   46.960719]  show_stack+0x24/0x30
[   46.964052]  dump_stack+0x128/0x194
[   46.967557]  print_address_description.isra.0+0x64/0x380
[   46.972877]  __kasan_report+0x1d4/0x240
[   46.976723]  kasan_report+0xc/0x18
[   46.980138]  __asan_report_load4_noabort+0x18/0x20
[   46.985027]  brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]
[   46.990613]  dev_hard_start_xmit+0x1bc/0xda0
[   46.994894]  sch_direct_xmit+0x198/0xd08
[   46.998827]  __qdisc_run+0x37c/0x1dc0
[   47.002500]  __dev_queue_xmit+0x1528/0x21f8
[   47.006692]  dev_queue_xmit+0x24/0x30
[   47.010366]  neigh_resolve_output+0x37c/0x678
[   47.014734]  ip_finish_output2+0x598/0x2458
[   47.018927]  __ip_finish_output+0x300/0x730
[   47.023118]  ip_output+0x2e0/0x430
[   47.026530]  ip_local_out+0x90/0x140
[   47.030117]  igmpv3_sendpack+0x14c/0x228
[   47.034049]  igmpv3_send_cr+0x384/0x6b8
[   47.037895]  igmp_ifc_timer_expire+0x4c/0x118
[   47.042262]  call_timer_fn+0x1cc/0xbe8
[   47.046021]  __run_timers+0x4d8/0xb28
[   47.049693]  run_timer_softirq+0x24/0x40
[   47.053626]  __do_softirq+0x2c0/0x117c
[   47.057387]  irq_exit+0x2dc/0x388
[   47.060715]  __handle_domain_irq+0xb4/0x158
[   47.064908]  gic_handle_irq+0x58/0xb0
[   47.068581]  el0_irq_naked+0x50/0x5c
[   47.072162]
[   47.073665] Allocated by task 328:
[   47.077083]  save_stack+0x24/0xb0
[   47.080410]  __kasan_kmalloc.isra.0+0xc0/0xe0
[   47.084776]  kasan_slab_alloc+0x14/0x20
[   47.088622]  kmem_cache_alloc+0x15c/0x468
[   47.092643]  __alloc_skb+0xa4/0x498
[   47.096142]  igmpv3_newpack+0x158/0xd78
[   47.099987]  add_grhead+0x210/0x288
[   47.103485]  add_grec+0x6b0/0xb70
[   47.106811]  igmpv3_send_cr+0x2e0/0x6b8
[   47.110657]  igmp_ifc_timer_expire+0x4c/0x118
[   47.115027]  call_timer_fn+0x1cc/0xbe8
[   47.118785]  __run_timers+0x4d8/0xb28
[   47.122457]  run_timer_softirq+0x24/0x40
[   47.126389]  __do_softirq+0x2c0/0x117c
[   47.130142]
[   47.131643] Freed by task 180:
[   47.134712]  save_stack+0x24/0xb0
[   47.138041]  __kasan_slab_free+0x108/0x180
[   47.142146]  kasan_slab_free+0x10/0x18
[   47.145904]  slab_free_freelist_hook+0xa4/0x1b0
[   47.150444]  kmem_cache_free+0x8c/0x528
[   47.154292]  kfree_skbmem+0x94/0x108
[   47.157880]  consume_skb+0x10c/0x5a8
[   47.161466]  __dev_kfree_skb_any+0x88/0xa0
[   47.165598]  brcmu_pkt_buf_free_skb+0x44/0x68 [brcmutil]
[   47.171023]  brcmf_txfinalize+0xec/0x190 [brcmfmac]
[   47.176016]  brcmf_proto_bcdc_txcomplete+0x1c0/0x210 [brcmfmac]
[   47.182056]  brcmf_sdio_sendfromq+0x8dc/0x1e80 [brcmfmac]
[   47.187568]  brcmf_sdio_dpc+0xb48/0x2108 [brcmfmac]
[   47.192529]  brcmf_sdio_dataworker+0xc8/0x238 [brcmfmac]
[   47.197859]  process_one_work+0x7fc/0x1a80
[   47.201965]  worker_thread+0x31c/0xc40
[   47.205726]  kthread+0x2d8/0x370
[   47.208967]  ret_from_fork+0x10/0x18
[   47.212546]
[   47.214051] The buggy address belongs to the object at ffffff803f588280
[   47.214051]  which belongs to the cache skbuff_head_cache of size 208
[   47.227086] The buggy address is located 104 bytes inside of
[   47.227086]  208-byte region [ffffff803f588280, ffffff803f588350)
[   47.238814] The buggy address belongs to the page:
[   47.243618] page:ffffffff00dd6200 refcount:1 mapcou
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50408/">CVE-2022-50408 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50408">CVE-2022-50408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250391">SUSE bug 1250391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250419">SUSE bug 1250419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50411</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50411" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50411" ref_url="https://www.suse.com/security/cve/CVE-2022-50411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPICA: Fix error code path in acpi_ds_call_control_method()

A use-after-free in acpi_ps_parse_aml() after a failing invocaion of
acpi_ds_call_control_method() is reported by KASAN [1] and code
inspection reveals that next_walk_state pushed to the thread by
acpi_ds_create_walk_state() is freed on errors, but it is not popped
from the thread beforehand.  Thus acpi_ds_get_current_walk_state()
called by acpi_ps_parse_aml() subsequently returns it as the new
walk state which is incorrect.

To address this, make acpi_ds_call_control_method() call
acpi_ds_pop_walk_state() to pop next_walk_state from the thread before
returning an error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50411/">CVE-2022-50411 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50411">CVE-2022-50411 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250393">SUSE bug 1250393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50419</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50419" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50419" ref_url="https://www.suse.com/security/cve/CVE-2022-50419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times

device_add shall not be called multiple times as stated in its
documentation:

 'Do not call this routine or device_register() more than once for
 any device structure'

Syzkaller reports a bug as follows [1]:
------------[ cut here ]------------
kernel BUG at lib/list_debug.c:33!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
[...]
Call Trace:
 &lt;TASK&gt;
 __list_add include/linux/list.h:69 [inline]
 list_add_tail include/linux/list.h:102 [inline]
 kobj_kset_join lib/kobject.c:164 [inline]
 kobject_add_internal+0x18f/0x8f0 lib/kobject.c:214
 kobject_add_varg lib/kobject.c:358 [inline]
 kobject_add+0x150/0x1c0 lib/kobject.c:410
 device_add+0x368/0x1e90 drivers/base/core.c:3452
 hci_conn_add_sysfs+0x9b/0x1b0 net/bluetooth/hci_sysfs.c:53
 hci_le_cis_estabilished_evt+0x57c/0xae0 net/bluetooth/hci_event.c:6799
 hci_le_meta_evt+0x2b8/0x510 net/bluetooth/hci_event.c:7110
 hci_event_func net/bluetooth/hci_event.c:7440 [inline]
 hci_event_packet+0x63d/0xfd0 net/bluetooth/hci_event.c:7495
 hci_rx_work+0xae7/0x1230 net/bluetooth/hci_core.c:4007
 process_one_work+0x991/0x1610 kernel/workqueue.c:2289
 worker_thread+0x665/0x1080 kernel/workqueue.c:2436
 kthread+0x2e4/0x3a0 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50419/">CVE-2022-50419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50419">CVE-2022-50419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250394">SUSE bug 1250394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50422</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50422" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50422" ref_url="https://www.suse.com/security/cve/CVE-2022-50422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: libsas: Fix use-after-free bug in smp_execute_task_sg()

When executing SMP task failed, the smp_execute_task_sg() calls del_timer()
to delete "slow_task-&gt;timer". However, if the timer handler
sas_task_internal_timedout() is running, the del_timer() in
smp_execute_task_sg() will not stop it and a UAF will happen. The process
is shown below:

      (thread 1)               |        (thread 2)
smp_execute_task_sg()          | sas_task_internal_timedout()
 ...                           |
 del_timer()                   |
 ...                           |  ...
 sas_free_task(task)           |
  kfree(task-&gt;slow_task) //FREE|
                               |  task-&gt;slow_task-&gt;... //USE

Fix by calling del_timer_sync() in smp_execute_task_sg(), which makes sure
the timer handler have finished before the "task-&gt;slow_task" is
deallocated.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50422/">CVE-2022-50422 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50422">CVE-2022-50422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250774">SUSE bug 1250774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50423</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50423" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50423" ref_url="https://www.suse.com/security/cve/CVE-2022-50423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage()

There is an use-after-free reported by KASAN:

  BUG: KASAN: use-after-free in acpi_ut_remove_reference+0x3b/0x82
  Read of size 1 at addr ffff888112afc460 by task modprobe/2111
  CPU: 0 PID: 2111 Comm: modprobe Not tainted 6.1.0-rc7-dirty
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
  Call Trace:
   &lt;TASK&gt;
   kasan_report+0xae/0xe0
   acpi_ut_remove_reference+0x3b/0x82
   acpi_ut_copy_iobject_to_iobject+0x3be/0x3d5
   acpi_ds_store_object_to_local+0x15d/0x3a0
   acpi_ex_store+0x78d/0x7fd
   acpi_ex_opcode_1A_1T_1R+0xbe4/0xf9b
   acpi_ps_parse_aml+0x217/0x8d5
   ...
   &lt;/TASK&gt;

The root cause of the problem is that the acpi_operand_object
is freed when acpi_ut_walk_package_tree() fails in
acpi_ut_copy_ipackage_to_ipackage(), lead to repeated release in
acpi_ut_copy_iobject_to_iobject(). The problem was introduced
by "8aa5e56eeb61" commit, this commit is to fix memory leak in
acpi_ut_copy_iobject_to_iobject(), repeatedly adding remove
operation, lead to "acpi_operand_object" used after free.

Fix it by removing acpi_ut_remove_reference() in
acpi_ut_copy_ipackage_to_ipackage(). acpi_ut_copy_ipackage_to_ipackage()
is called to copy an internal package object into another internal
package object, when it fails, the memory of acpi_operand_object
should be freed by the caller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50423/">CVE-2022-50423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50423">CVE-2022-50423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250784">SUSE bug 1250784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250785">SUSE bug 1250785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50432</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50432" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50432" ref_url="https://www.suse.com/security/cve/CVE-2022-50432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023421.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kernfs: fix use-after-free in __kernfs_remove

Syzkaller managed to trigger concurrent calls to
kernfs_remove_by_name_ns() for the same file resulting in
a KASAN detected use-after-free. The race occurs when the root
node is freed during kernfs_drain().

To prevent this acquire an additional reference for the root
of the tree that is removed before calling __kernfs_remove().

Found by syzkaller with the following reproducer (slab_nomerge is
required):

syz_mount_image$ext4(0x0, &amp;(0x7f0000000100)='./file0\x00', 0x100000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &amp;(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
close(r0)
pipe2(&amp;(0x7f0000000140)={0xffffffffffffffff, &lt;r1=&gt;0xffffffffffffffff}, 0x800)
mount$9p_fd(0x0, &amp;(0x7f0000000040)='./file0\x00', &amp;(0x7f00000000c0), 0x408, &amp;(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_loose}, {@mmap}, {@loose}, {@loose}, {@mmap}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}, {@dont_hash}]}})

Sample report:

==================================================================
BUG: KASAN: use-after-free in kernfs_type include/linux/kernfs.h:335 [inline]
BUG: KASAN: use-after-free in kernfs_leftmost_descendant fs/kernfs/dir.c:1261 [inline]
BUG: KASAN: use-after-free in __kernfs_remove.part.0+0x843/0x960 fs/kernfs/dir.c:1369
Read of size 2 at addr ffff8880088807f0 by task syz-executor.2/857

CPU: 0 PID: 857 Comm: syz-executor.2 Not tainted 6.0.0-rc3-00363-g7726d4c3e60b #5
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x6e/0x91 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:317 [inline]
 print_report.cold+0x5e/0x5e5 mm/kasan/report.c:433
 kasan_report+0xa3/0x130 mm/kasan/report.c:495
 kernfs_type include/linux/kernfs.h:335 [inline]
 kernfs_leftmost_descendant fs/kernfs/dir.c:1261 [inline]
 __kernfs_remove.part.0+0x843/0x960 fs/kernfs/dir.c:1369
 __kernfs_remove fs/kernfs/dir.c:1356 [inline]
 kernfs_remove_by_name_ns+0x108/0x190 fs/kernfs/dir.c:1589
 sysfs_slab_add+0x133/0x1e0 mm/slub.c:5943
 __kmem_cache_create+0x3e0/0x550 mm/slub.c:4899
 create_cache mm/slab_common.c:229 [inline]
 kmem_cache_create_usercopy+0x167/0x2a0 mm/slab_common.c:335
 p9_client_create+0xd4d/0x1190 net/9p/client.c:993
 v9fs_session_init+0x1e6/0x13c0 fs/9p/v9fs.c:408
 v9fs_mount+0xb9/0xbd0 fs/9p/vfs_super.c:126
 legacy_get_tree+0xf1/0x200 fs/fs_context.c:610
 vfs_get_tree+0x85/0x2e0 fs/super.c:1530
 do_new_mount fs/namespace.c:3040 [inline]
 path_mount+0x675/0x1d00 fs/namespace.c:3370
 do_mount fs/namespace.c:3383 [inline]
 __do_sys_mount fs/namespace.c:3591 [inline]
 __se_sys_mount fs/namespace.c:3568 [inline]
 __x64_sys_mount+0x282/0x300 fs/namespace.c:3568
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x38/0x90 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f725f983aed
Code: 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f725f0f7028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007f725faa3f80 RCX: 00007f725f983aed
RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000
RBP: 00007f725f9f419c R08: 0000000020000280 R09: 0000000000000000
R10: 0000000000000408 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000006 R14: 00007f725faa3f80 R15: 00007f725f0d7000
 &lt;/TASK&gt;

Allocated by task 855:
 kasan_save_stack+0x1e/0x40 mm/kasan/common.c:38
 kasan_set_track mm/kasan/common.c:45 [inline]
 set_alloc_info mm/kasan/common.c:437 [inline]
 __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:470
 kasan_slab_alloc include/linux/kasan.h:224 [inline]
 slab_post_alloc_hook mm/slab.h:7
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50432/">CVE-2022-50432 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50432">CVE-2022-50432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250851">SUSE bug 1250851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251228">SUSE bug 1251228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50435</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50435" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50435" ref_url="https://www.suse.com/security/cve/CVE-2022-50435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid crash when inline data creation follows DIO write

When inode is created and written to using direct IO, there is nothing
to clear the EXT4_STATE_MAY_INLINE_DATA flag. Thus when inode gets
truncated later to say 1 byte and written using normal write, we will
try to store the data as inline data. This confuses the code later
because the inode now has both normal block and inline data allocated
and the confusion manifests for example as:

kernel BUG at fs/ext4/inode.c:2721!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 359 Comm: repro Not tainted 5.19.0-rc8-00001-g31ba1e3b8305-dirty #15
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-1.fc36 04/01/2014
RIP: 0010:ext4_writepages+0x363d/0x3660
RSP: 0018:ffffc90000ccf260 EFLAGS: 00010293
RAX: ffffffff81e1abcd RBX: 0000008000000000 RCX: ffff88810842a180
RDX: 0000000000000000 RSI: 0000008000000000 RDI: 0000000000000000
RBP: ffffc90000ccf650 R08: ffffffff81e17d58 R09: ffffed10222c680b
R10: dfffe910222c680c R11: 1ffff110222c680a R12: ffff888111634128
R13: ffffc90000ccf880 R14: 0000008410000000 R15: 0000000000000001
FS:  00007f72635d2640(0000) GS:ffff88811b000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000565243379180 CR3: 000000010aa74000 CR4: 0000000000150eb0
Call Trace:
 &lt;TASK&gt;
 do_writepages+0x397/0x640
 filemap_fdatawrite_wbc+0x151/0x1b0
 file_write_and_wait_range+0x1c9/0x2b0
 ext4_sync_file+0x19e/0xa00
 vfs_fsync_range+0x17b/0x190
 ext4_buffered_write_iter+0x488/0x530
 ext4_file_write_iter+0x449/0x1b90
 vfs_write+0xbcd/0xf40
 ksys_write+0x198/0x2c0
 __x64_sys_write+0x7b/0x90
 do_syscall_64+0x3d/0x90
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
 &lt;/TASK&gt;

Fix the problem by clearing EXT4_STATE_MAY_INLINE_DATA when we are doing
direct IO write to a file.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50435/">CVE-2022-50435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50435">CVE-2022-50435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250799">SUSE bug 1250799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50453</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50453" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50453" ref_url="https://www.suse.com/security/cve/CVE-2022-50453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpiolib: cdev: fix NULL-pointer dereferences

There are several places where we can crash the kernel by requesting
lines, unbinding the GPIO device, then calling any of the system calls
relevant to the GPIO character device's annonymous file descriptors:
ioctl(), read(), poll().

While I observed it with the GPIO simulator, it will also happen for any
of the GPIO devices that can be hot-unplugged - for instance any HID GPIO
expander (e.g. CP2112).

This affects both v1 and v2 uAPI.

This fixes it partially by checking if gdev-&gt;chip is not NULL but it
doesn't entirely remedy the situation as we still have a race condition
in which another thread can remove the device after the check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50453/">CVE-2022-50453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50453">CVE-2022-50453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250887">SUSE bug 1250887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50456</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50456" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50456" ref_url="https://www.suse.com/security/cve/CVE-2022-50456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix resolving backrefs for inline extent followed by prealloc

If a file consists of an inline extent followed by a regular or prealloc
extent, then a legitimate attempt to resolve a logical address in the
non-inline region will result in add_all_parents reading the invalid
offset field of the inline extent. If the inline extent item is placed
in the leaf eb s.t. it is the first item, attempting to access the
offset field will not only be meaningless, it will go past the end of
the eb and cause this panic:

  [17.626048] BTRFS warning (device dm-2): bad eb member end: ptr 0x3fd4 start 30834688 member offset 16377 size 8
  [17.631693] general protection fault, probably for non-canonical address 0x5088000000000: 0000 [#1] SMP PTI
  [17.635041] CPU: 2 PID: 1267 Comm: btrfs Not tainted 5.12.0-07246-g75175d5adc74-dirty #199
  [17.637969] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
  [17.641995] RIP: 0010:btrfs_get_64+0xe7/0x110
  [17.649890] RSP: 0018:ffffc90001f73a08 EFLAGS: 00010202
  [17.651652] RAX: 0000000000000001 RBX: ffff88810c42d000 RCX: 0000000000000000
  [17.653921] RDX: 0005088000000000 RSI: ffffc90001f73a0f RDI: 0000000000000001
  [17.656174] RBP: 0000000000000ff9 R08: 0000000000000007 R09: c0000000fffeffff
  [17.658441] R10: ffffc90001f73790 R11: ffffc90001f73788 R12: ffff888106afe918
  [17.661070] R13: 0000000000003fd4 R14: 0000000000003f6f R15: cdcdcdcdcdcdcdcd
  [17.663617] FS:  00007f64e7627d80(0000) GS:ffff888237c80000(0000) knlGS:0000000000000000
  [17.666525] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [17.668664] CR2: 000055d4a39152e8 CR3: 000000010c596002 CR4: 0000000000770ee0
  [17.671253] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  [17.673634] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  [17.676034] PKRU: 55555554
  [17.677004] Call Trace:
  [17.677877]  add_all_parents+0x276/0x480
  [17.679325]  find_parent_nodes+0xfae/0x1590
  [17.680771]  btrfs_find_all_leafs+0x5e/0xa0
  [17.682217]  iterate_extent_inodes+0xce/0x260
  [17.683809]  ? btrfs_inode_flags_to_xflags+0x50/0x50
  [17.685597]  ? iterate_inodes_from_logical+0xa1/0xd0
  [17.687404]  iterate_inodes_from_logical+0xa1/0xd0
  [17.689121]  ? btrfs_inode_flags_to_xflags+0x50/0x50
  [17.691010]  btrfs_ioctl_logical_to_ino+0x131/0x190
  [17.692946]  btrfs_ioctl+0x104a/0x2f60
  [17.694384]  ? selinux_file_ioctl+0x182/0x220
  [17.695995]  ? __x64_sys_ioctl+0x84/0xc0
  [17.697394]  __x64_sys_ioctl+0x84/0xc0
  [17.698697]  do_syscall_64+0x33/0x40
  [17.700017]  entry_SYSCALL_64_after_hwframe+0x44/0xae
  [17.701753] RIP: 0033:0x7f64e72761b7
  [17.709355] RSP: 002b:00007ffefb067f58 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
  [17.712088] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f64e72761b7
  [17.714667] RDX: 00007ffefb067fb0 RSI: 00000000c0389424 RDI: 0000000000000003
  [17.717386] RBP: 00007ffefb06d188 R08: 000055d4a390d2b0 R09: 00007f64e7340a60
  [17.719938] R10: 0000000000000231 R11: 0000000000000246 R12: 0000000000000001
  [17.722383] R13: 0000000000000000 R14: 00000000c0389424 R15: 000055d4a38fd2a0
  [17.724839] Modules linked in:

Fix the bug by detecting the inline extent item in add_all_parents and
skipping to the next extent item.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50456/">CVE-2022-50456 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50456">CVE-2022-50456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250856">SUSE bug 1250856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50471</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50471" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50471" ref_url="https://www.suse.com/security/cve/CVE-2022-50471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen/gntdev: Accommodate VMA splitting

Prior to this commit, the gntdev driver code did not handle the
following scenario correctly with paravirtualized (PV) Xen domains:

* User process sets up a gntdev mapping composed of two grant mappings
  (i.e., two pages shared by another Xen domain).
* User process munmap()s one of the pages.
* User process munmap()s the remaining page.
* User process exits.

In the scenario above, the user process would cause the kernel to log
the following messages in dmesg for the first munmap(), and the second
munmap() call would result in similar log messages:

  BUG: Bad page map in process doublemap.test  pte:... pmd:...
  page:0000000057c97bff refcount:1 mapcount:-1 \
    mapping:0000000000000000 index:0x0 pfn:...
  ...
  page dumped because: bad pte
  ...
  file:gntdev fault:0x0 mmap:gntdev_mmap [xen_gntdev] readpage:0x0
  ...
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x46/0x5e
   print_bad_pte.cold+0x66/0xb6
   unmap_page_range+0x7e5/0xdc0
   unmap_vmas+0x78/0xf0
   unmap_region+0xa8/0x110
   __do_munmap+0x1ea/0x4e0
   __vm_munmap+0x75/0x120
   __x64_sys_munmap+0x28/0x40
   do_syscall_64+0x38/0x90
   entry_SYSCALL_64_after_hwframe+0x61/0xcb
   ...

For each munmap() call, the Xen hypervisor (if built with CONFIG_DEBUG)
would print out the following and trigger a general protection fault in
the affected Xen PV domain:

  (XEN) d0v... Attempt to implicitly unmap d0's grant PTE ...
  (XEN) d0v... Attempt to implicitly unmap d0's grant PTE ...

As of this writing, gntdev_grant_map structure's vma field (referred to
as map-&gt;vma below) is mainly used for checking the start and end
addresses of mappings. However, with split VMAs, these may change, and
there could be more than one VMA associated with a gntdev mapping.
Hence, remove the use of map-&gt;vma and rely on map-&gt;pages_vm_start for
the original start address and on (map-&gt;count &lt;&lt; PAGE_SHIFT) for the
original mapping size. Let the invalidate() and find_special_page()
hooks use these.

Also, given that there can be multiple VMAs associated with a gntdev
mapping, move the "mmu_interval_notifier_remove(&amp;map-&gt;notifier)" call to
the end of gntdev_put_map, so that the MMU notifier is only removed
after the closing of the last remaining VMA.

Finally, use an atomic to prevent inadvertent gntdev mapping re-use,
instead of using the map-&gt;live_grants atomic counter and/or the map-&gt;vma
pointer (the latter of which is now removed). This prevents the
userspace from mmap()'ing (with MAP_FIXED) a gntdev mapping over the
same address range as a previously set up gntdev mapping. This scenario
can be summarized with the following call-trace, which was valid prior
to this commit:

  mmap
    gntdev_mmap
  mmap (repeat mmap with MAP_FIXED over the same address range)
    gntdev_invalidate
      unmap_grant_pages (sets 'being_removed' entries to true)
        gnttab_unmap_refs_async
    unmap_single_vma
    gntdev_mmap (maps the shared pages again)
  munmap
    gntdev_invalidate
      unmap_grant_pages
        (no-op because 'being_removed' entries are true)
    unmap_single_vma (For PV domains, Xen reports that a granted page
      is being unmapped and triggers a general protection fault in the
      affected domain, if Xen was built with CONFIG_DEBUG)

The fix for this last scenario could be worth its own commit, but we
opted for a single commit, because removing the gntdev_grant_map
structure's vma field requires guarding the entry to gntdev_mmap(), and
the live_grants atomic counter is not sufficient on its own to prevent
the mmap() over a pre-existing mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50471/">CVE-2022-50471 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50471">CVE-2022-50471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251110">SUSE bug 1251110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50494</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50494" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50494" ref_url="https://www.suse.com/security/cve/CVE-2022-50494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash

When CPU 0 is offline and intel_powerclamp is used to inject
idle, it generates kernel BUG:

BUG: using smp_processor_id() in preemptible [00000000] code: bash/15687
caller is debug_smp_processor_id+0x17/0x20
CPU: 4 PID: 15687 Comm: bash Not tainted 5.19.0-rc7+ #57
Call Trace:
&lt;TASK&gt;
dump_stack_lvl+0x49/0x63
dump_stack+0x10/0x16
check_preemption_disabled+0xdd/0xe0
debug_smp_processor_id+0x17/0x20
powerclamp_set_cur_state+0x7f/0xf9 [intel_powerclamp]
...
...

Here CPU 0 is the control CPU by default and changed to the current CPU,
if CPU 0 offlined. This check has to be performed under cpus_read_lock(),
hence the above warning.

Use get_cpu() instead of smp_processor_id() to avoid this BUG.

[ rjw: Subject edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50494/">CVE-2022-50494 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50494">CVE-2022-50494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251173">SUSE bug 1251173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50496</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50496" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50496" ref_url="https://www.suse.com/security/cve/CVE-2022-50496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm cache: Fix UAF in destroy()

Dm_cache also has the same UAF problem when dm_resume()
and dm_destroy() are concurrent.

Therefore, cancelling timer again in destroy().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50496/">CVE-2022-50496 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50496">CVE-2022-50496 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251091">SUSE bug 1251091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50501</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50501" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50501" ref_url="https://www.suse.com/security/cve/CVE-2022-50501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: coda: Add check for dcoda_iram_alloc

As the coda_iram_alloc may return NULL pointer,
it should be better to check the return value
in order to avoid NULL poineter dereference,
same as the others.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50501/">CVE-2022-50501 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50501">CVE-2022-50501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251099">SUSE bug 1251099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50509</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50509" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50509" ref_url="https://www.suse.com/security/cve/CVE-2022-50509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: coda: Add check for kmalloc

As the kmalloc may return NULL pointer,
it should be better to check the return value
in order to avoid NULL poineter dereference,
same as the others.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50509/">CVE-2022-50509 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50509">CVE-2022-50509 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251522">SUSE bug 1251522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50511</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50511" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50511" ref_url="https://www.suse.com/security/cve/CVE-2022-50511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib/fonts: fix undefined behavior in bit shift for get_default_font

Shifting signed 32-bit value by 31 bits is undefined, so changing
significant bit to unsigned.  The UBSAN warning calltrace like below:

UBSAN: shift-out-of-bounds in lib/fonts/fonts.c:139:20
left shift of 1 by 31 places cannot be represented in type 'int'
 &lt;TASK&gt;
 dump_stack_lvl+0x7d/0xa5
 dump_stack+0x15/0x1b
 ubsan_epilogue+0xe/0x4e
 __ubsan_handle_shift_out_of_bounds+0x1e7/0x20c
 get_default_font+0x1c7/0x1f0
 fbcon_startup+0x347/0x3a0
 do_take_over_console+0xce/0x270
 do_fbcon_takeover+0xa1/0x170
 do_fb_registered+0x2a8/0x340
 fbcon_fb_registered+0x47/0xe0
 register_framebuffer+0x294/0x4a0
 __drm_fb_helper_initial_config_and_unlock+0x43c/0x880 [drm_kms_helper]
 drm_fb_helper_initial_config+0x52/0x80 [drm_kms_helper]
 drm_fbdev_client_hotplug+0x156/0x1b0 [drm_kms_helper]
 drm_fbdev_generic_setup+0xfc/0x290 [drm_kms_helper]
 bochs_pci_probe+0x6ca/0x772 [bochs]
 local_pci_probe+0x4d/0xb0
 pci_device_probe+0x119/0x320
 really_probe+0x181/0x550
 __driver_probe_device+0xc6/0x220
 driver_probe_device+0x32/0x100
 __driver_attach+0x195/0x200
 bus_for_each_dev+0xbb/0x120
 driver_attach+0x27/0x30
 bus_add_driver+0x22e/0x2f0
 driver_register+0xa9/0x190
 __pci_register_driver+0x90/0xa0
 bochs_pci_driver_init+0x52/0x1000 [bochs]
 do_one_initcall+0x76/0x430
 do_init_module+0x61/0x28a
 load_module+0x1f82/0x2e50
 __do_sys_finit_module+0xf8/0x190
 __x64_sys_finit_module+0x23/0x30
 do_syscall_64+0x58/0x80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50511/">CVE-2022-50511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50511">CVE-2022-50511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251527">SUSE bug 1251527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50516</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50516" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50516" ref_url="https://www.suse.com/security/cve/CVE-2022-50516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: dlm: fix invalid derefence of sb_lvbptr

I experience issues when putting a lkbsb on the stack and have sb_lvbptr
field to a dangled pointer while not using DLM_LKF_VALBLK. It will crash
with the following kernel message, the dangled pointer is here
0xdeadbeef as example:

[  102.749317] BUG: unable to handle page fault for address: 00000000deadbeef
[  102.749320] #PF: supervisor read access in kernel mode
[  102.749323] #PF: error_code(0x0000) - not-present page
[  102.749325] PGD 0 P4D 0
[  102.749332] Oops: 0000 [#1] PREEMPT SMP PTI
[  102.749336] CPU: 0 PID: 1567 Comm: lock_torture_wr Tainted: G        W         5.19.0-rc3+ #1565
[  102.749343] Hardware name: Red Hat KVM/RHEL-AV, BIOS 1.16.0-2.module+el8.7.0+15506+033991b0 04/01/2014
[  102.749344] RIP: 0010:memcpy_erms+0x6/0x10
[  102.749353] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 &lt;f3&gt; a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe
[  102.749355] RSP: 0018:ffff97a58145fd08 EFLAGS: 00010202
[  102.749358] RAX: ffff901778b77070 RBX: 0000000000000000 RCX: 0000000000000040
[  102.749360] RDX: 0000000000000040 RSI: 00000000deadbeef RDI: ffff901778b77070
[  102.749362] RBP: ffff97a58145fd10 R08: ffff901760b67a70 R09: 0000000000000001
[  102.749364] R10: ffff9017008e2cb8 R11: 0000000000000001 R12: ffff901760b67a70
[  102.749366] R13: ffff901760b78f00 R14: 0000000000000003 R15: 0000000000000001
[  102.749368] FS:  0000000000000000(0000) GS:ffff901876e00000(0000) knlGS:0000000000000000
[  102.749372] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  102.749374] CR2: 00000000deadbeef CR3: 000000017c49a004 CR4: 0000000000770ef0
[  102.749376] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  102.749378] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  102.749379] PKRU: 55555554
[  102.749381] Call Trace:
[  102.749382]  &lt;TASK&gt;
[  102.749383]  ? send_args+0xb2/0xd0
[  102.749389]  send_common+0xb7/0xd0
[  102.749395]  _unlock_lock+0x2c/0x90
[  102.749400]  unlock_lock.isra.56+0x62/0xa0
[  102.749405]  dlm_unlock+0x21e/0x330
[  102.749411]  ? lock_torture_stats+0x80/0x80 [dlm_locktorture]
[  102.749416]  torture_unlock+0x5a/0x90 [dlm_locktorture]
[  102.749419]  ? preempt_count_sub+0xba/0x100
[  102.749427]  lock_torture_writer+0xbd/0x150 [dlm_locktorture]
[  102.786186]  kthread+0x10a/0x130
[  102.786581]  ? kthread_complete_and_exit+0x20/0x20
[  102.787156]  ret_from_fork+0x22/0x30
[  102.787588]  &lt;/TASK&gt;
[  102.787855] Modules linked in: dlm_locktorture torture rpcsec_gss_krb5 intel_rapl_msr intel_rapl_common kvm_intel iTCO_wdt iTCO_vendor_support kvm vmw_vsock_virtio_transport qxl irqbypass vmw_vsock_virtio_transport_common drm_ttm_helper crc32_pclmul joydev crc32c_intel ttm vsock virtio_scsi virtio_balloon snd_pcm drm_kms_helper virtio_console snd_timer snd drm soundcore syscopyarea i2c_i801 sysfillrect sysimgblt i2c_smbus pcspkr fb_sys_fops lpc_ich serio_raw
[  102.792536] CR2: 00000000deadbeef
[  102.792930] ---[ end trace 0000000000000000 ]---

This patch fixes the issue by checking also on DLM_LKF_VALBLK on exflags
is set when copying the lvbptr array instead of if it's just null which
fixes for me the issue.

I think this patch can fix other dlm users as well, depending how they
handle the init, freeing memory handling of sb_lvbptr and don't set
DLM_LKF_VALBLK for some dlm_lock() calls. It might a there could be a
hidden issue all the time. However with checking on DLM_LKF_VALBLK the
user always need to provide a sb_lvbptr non-null value. There might be
more intelligent handling between per ls lvblen, DLM_LKF_VALBLK and
non-null to report the user the way how DLM API is used is wrong but can
be added for later, this will only fix the current behaviour.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50516/">CVE-2022-50516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50516">CVE-2022-50516 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251741">SUSE bug 1251741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50527</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50527" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50527" ref_url="https://www.suse.com/security/cve/CVE-2022-50527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix size validation for non-exclusive domains (v4)

Fix amdgpu_bo_validate_size() to check whether the TTM domain manager for the
requested memory exists, else we get a kernel oops when dereferencing "man".

v2: Make the patch standalone, i.e. not dependent on local patches.
v3: Preserve old behaviour and just check that the manager pointer is not
    NULL.
v4: Complain if GTT domain requested and it is uninitialized--most likely a
    bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50527/">CVE-2022-50527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50527">CVE-2022-50527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251738">SUSE bug 1251738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50532</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50532" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50532" ref_url="https://www.suse.com/security/cve/CVE-2022-50532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Fix possible resource leaks in mpt3sas_transport_port_add()

In mpt3sas_transport_port_add(), if sas_rphy_add() returns error,
sas_rphy_free() needs be called to free the resource allocated in
sas_end_device_alloc(). Otherwise a kernel crash will happen:

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000108
CPU: 45 PID: 37020 Comm: bash Kdump: loaded Tainted: G        W          6.1.0-rc1+ #189
pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : device_del+0x54/0x3d0
lr : device_del+0x37c/0x3d0
Call trace:
 device_del+0x54/0x3d0
 attribute_container_class_device_del+0x28/0x38
 transport_remove_classdev+0x6c/0x80
 attribute_container_device_trigger+0x108/0x110
 transport_remove_device+0x28/0x38
 sas_rphy_remove+0x50/0x78 [scsi_transport_sas]
 sas_port_delete+0x30/0x148 [scsi_transport_sas]
 do_sas_phy_delete+0x78/0x80 [scsi_transport_sas]
 device_for_each_child+0x68/0xb0
 sas_remove_children+0x30/0x50 [scsi_transport_sas]
 sas_rphy_remove+0x38/0x78 [scsi_transport_sas]
 sas_port_delete+0x30/0x148 [scsi_transport_sas]
 do_sas_phy_delete+0x78/0x80 [scsi_transport_sas]
 device_for_each_child+0x68/0xb0
 sas_remove_children+0x30/0x50 [scsi_transport_sas]
 sas_remove_host+0x20/0x38 [scsi_transport_sas]
 scsih_remove+0xd8/0x420 [mpt3sas]

Because transport_add_device() is not called when sas_rphy_add() fails, the
device is not added. When sas_rphy_remove() is subsequently called to
remove the device in the remove() path, a NULL pointer dereference happens.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-23"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50532/">CVE-2022-50532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50532">CVE-2022-50532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251300">SUSE bug 1251300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50534</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50534" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50534" ref_url="https://www.suse.com/security/cve/CVE-2022-50534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm thin: Use last transaction's pmd-&gt;root when commit failed

Recently we found a softlock up problem in dm thin pool btree lookup
code due to corrupted metadata:

 Kernel panic - not syncing: softlockup: hung tasks
 CPU: 7 PID: 2669225 Comm: kworker/u16:3
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
 Workqueue: dm-thin do_worker [dm_thin_pool]
 Call Trace:
   &lt;IRQ&gt;
   dump_stack+0x9c/0xd3
   panic+0x35d/0x6b9
   watchdog_timer_fn.cold+0x16/0x25
   __run_hrtimer+0xa2/0x2d0
   &lt;/IRQ&gt;
   RIP: 0010:__relink_lru+0x102/0x220 [dm_bufio]
   __bufio_new+0x11f/0x4f0 [dm_bufio]
   new_read+0xa3/0x1e0 [dm_bufio]
   dm_bm_read_lock+0x33/0xd0 [dm_persistent_data]
   ro_step+0x63/0x100 [dm_persistent_data]
   btree_lookup_raw.constprop.0+0x44/0x220 [dm_persistent_data]
   dm_btree_lookup+0x16f/0x210 [dm_persistent_data]
   dm_thin_find_block+0x12c/0x210 [dm_thin_pool]
   __process_bio_read_only+0xc5/0x400 [dm_thin_pool]
   process_thin_deferred_bios+0x1a4/0x4a0 [dm_thin_pool]
   process_one_work+0x3c5/0x730

Following process may generate a broken btree mixed with fresh and
stale btree nodes, which could get dm thin trapped in an infinite loop
while looking up data block:
 Transaction 1: pmd-&gt;root = A, A-&gt;B-&gt;C   // One path in btree
                pmd-&gt;root = X, X-&gt;Y-&gt;Z   // Copy-up
 Transaction 2: X,Z is updated on disk, Y write failed.
                // Commit failed, dm thin becomes read-only.
                process_bio_read_only
		 dm_thin_find_block
		  __find_block
		   dm_btree_lookup(pmd-&gt;root)
The pmd-&gt;root points to a broken btree, Y may contain stale node
pointing to any block, for example X, which gets dm thin trapped into
a dead loop while looking up Z.

Fix this by setting pmd-&gt;root in __open_metadata(), so that dm thin
will use the last transaction's pmd-&gt;root if commit failed.

Fetch a reproducer in [Link].

Linke: https://bugzilla.kernel.org/show_bug.cgi?id=216790
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50534/">CVE-2022-50534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50534">CVE-2022-50534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251292">SUSE bug 1251292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50544</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50544" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50544" ref_url="https://www.suse.com/security/cve/CVE-2022-50544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info()

xhci_alloc_stream_info() allocates stream context array for stream_info
-&gt;stream_ctx_array with xhci_alloc_stream_ctx(). When some error occurs,
stream_info-&gt;stream_ctx_array is not released, which will lead to a
memory leak.

We can fix it by releasing the stream_info-&gt;stream_ctx_array with
xhci_free_stream_ctx() on the error path to avoid the potential memory
leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50544/">CVE-2022-50544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50544">CVE-2022-50544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251725">SUSE bug 1251725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50545</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50545" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50545" ref_url="https://www.suse.com/security/cve/CVE-2022-50545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

r6040: Fix kmemleak in probe and remove

There is a memory leaks reported by kmemleak:

  unreferenced object 0xffff888116111000 (size 2048):
    comm "modprobe", pid 817, jiffies 4294759745 (age 76.502s)
    hex dump (first 32 bytes):
      00 c4 0a 04 81 88 ff ff 08 10 11 16 81 88 ff ff  ................
      08 10 11 16 81 88 ff ff 00 00 00 00 00 00 00 00  ................
    backtrace:
      [&lt;ffffffff815bcd82&gt;] kmalloc_trace+0x22/0x60
      [&lt;ffffffff827e20ee&gt;] phy_device_create+0x4e/0x90
      [&lt;ffffffff827e6072&gt;] get_phy_device+0xd2/0x220
      [&lt;ffffffff827e7844&gt;] mdiobus_scan+0xa4/0x2e0
      [&lt;ffffffff827e8be2&gt;] __mdiobus_register+0x482/0x8b0
      [&lt;ffffffffa01f5d24&gt;] r6040_init_one+0x714/0xd2c [r6040]
      ...

The problem occurs in probe process as follows:
  r6040_init_one:
    mdiobus_register
      mdiobus_scan    &lt;- alloc and register phy_device,
                         the reference count of phy_device is 3
    r6040_mii_probe
      phy_connect     &lt;- connect to the first phy_device,
                         so the reference count of the first
                         phy_device is 4, others are 3
    register_netdev   &lt;- fault inject succeeded, goto error handling path

    // error handling path
    err_out_mdio_unregister:
      mdiobus_unregister(lp-&gt;mii_bus);
    err_out_mdio:
      mdiobus_free(lp-&gt;mii_bus);    &lt;- the reference count of the first
                                       phy_device is 1, it is not released
                                       and other phy_devices are released
  // similarly, the remove process also has the same problem

The root cause is traced to the phy_device is not disconnected when
removes one r6040 device in r6040_remove_one() or on error handling path
after r6040_mii probed successfully. In r6040_mii_probe(), a net ethernet
device is connected to the first PHY device of mii_bus, in order to
notify the connected driver when the link status changes, which is the
default behavior of the PHY infrastructure to handle everything.
Therefore the phy_device should be disconnected when removes one r6040
device or on error handling path.

Fix it by adding phy_disconnect() when removes one r6040 device or on
error handling path after r6040_mii probed successfully.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50545/">CVE-2022-50545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50545">CVE-2022-50545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251285">SUSE bug 1251285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50549</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50549" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50549" ref_url="https://www.suse.com/security/cve/CVE-2022-50549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm thin: Fix ABBA deadlock between shrink_slab and dm_pool_abort_metadata

Following concurrent processes:

          P1(drop cache)                P2(kworker)
drop_caches_sysctl_handler
 drop_slab
  shrink_slab
   down_read(&amp;shrinker_rwsem)  - LOCK A
   do_shrink_slab
    super_cache_scan
     prune_icache_sb
      dispose_list
       evict
        ext4_evict_inode
	 ext4_clear_inode
	  ext4_discard_preallocations
	   ext4_mb_load_buddy_gfp
	    ext4_mb_init_cache
	     ext4_read_block_bitmap_nowait
	      ext4_read_bh_nowait
	       submit_bh
	        dm_submit_bio
		                 do_worker
				  process_deferred_bios
				   commit
				    metadata_operation_failed
				     dm_pool_abort_metadata
				      down_write(&amp;pmd-&gt;root_lock) - LOCK B
		                      __destroy_persistent_data_objects
				       dm_block_manager_destroy
				        dm_bufio_client_destroy
				         unregister_shrinker
					  down_write(&amp;shrinker_rwsem)
		 thin_map                            |
		  dm_thin_find_block                 v
		   down_read(&amp;pmd-&gt;root_lock) --&gt; ABBA deadlock

, which triggers hung task:

[   76.974820] INFO: task kworker/u4:3:63 blocked for more than 15 seconds.
[   76.976019]       Not tainted 6.1.0-rc4-00011-g8f17dd350364-dirty #910
[   76.978521] task:kworker/u4:3    state:D stack:0     pid:63    ppid:2
[   76.978534] Workqueue: dm-thin do_worker
[   76.978552] Call Trace:
[   76.978564]  __schedule+0x6ba/0x10f0
[   76.978582]  schedule+0x9d/0x1e0
[   76.978588]  rwsem_down_write_slowpath+0x587/0xdf0
[   76.978600]  down_write+0xec/0x110
[   76.978607]  unregister_shrinker+0x2c/0xf0
[   76.978616]  dm_bufio_client_destroy+0x116/0x3d0
[   76.978625]  dm_block_manager_destroy+0x19/0x40
[   76.978629]  __destroy_persistent_data_objects+0x5e/0x70
[   76.978636]  dm_pool_abort_metadata+0x8e/0x100
[   76.978643]  metadata_operation_failed+0x86/0x110
[   76.978649]  commit+0x6a/0x230
[   76.978655]  do_worker+0xc6e/0xd90
[   76.978702]  process_one_work+0x269/0x630
[   76.978714]  worker_thread+0x266/0x630
[   76.978730]  kthread+0x151/0x1b0
[   76.978772] INFO: task test.sh:2646 blocked for more than 15 seconds.
[   76.979756]       Not tainted 6.1.0-rc4-00011-g8f17dd350364-dirty #910
[   76.982111] task:test.sh         state:D stack:0     pid:2646  ppid:2459
[   76.982128] Call Trace:
[   76.982139]  __schedule+0x6ba/0x10f0
[   76.982155]  schedule+0x9d/0x1e0
[   76.982159]  rwsem_down_read_slowpath+0x4f4/0x910
[   76.982173]  down_read+0x84/0x170
[   76.982177]  dm_thin_find_block+0x4c/0xd0
[   76.982183]  thin_map+0x201/0x3d0
[   76.982188]  __map_bio+0x5b/0x350
[   76.982195]  dm_submit_bio+0x2b6/0x930
[   76.982202]  __submit_bio+0x123/0x2d0
[   76.982209]  submit_bio_noacct_nocheck+0x101/0x3e0
[   76.982222]  submit_bio_noacct+0x389/0x770
[   76.982227]  submit_bio+0x50/0xc0
[   76.982232]  submit_bh_wbc+0x15e/0x230
[   76.982238]  submit_bh+0x14/0x20
[   76.982241]  ext4_read_bh_nowait+0xc5/0x130
[   76.982247]  ext4_read_block_bitmap_nowait+0x340/0xc60
[   76.982254]  ext4_mb_init_cache+0x1ce/0xdc0
[   76.982259]  ext4_mb_load_buddy_gfp+0x987/0xfa0
[   76.982263]  ext4_discard_preallocations+0x45d/0x830
[   76.982274]  ext4_clear_inode+0x48/0xf0
[   76.982280]  ext4_evict_inode+0xcf/0xc70
[   76.982285]  evict+0x119/0x2b0
[   76.982290]  dispose_list+0x43/0xa0
[   76.982294]  prune_icache_sb+0x64/0x90
[   76.982298]  super_cache_scan+0x155/0x210
[   76.982303]  do_shrink_slab+0x19e/0x4e0
[   76.982310]  shrink_slab+0x2bd/0x450
[   76.982317]  drop_slab+0xcc/0x1a0
[   76.982323]  drop_caches_sysctl_handler+0xb7/0xe0
[   76.982327]  proc_sys_call_handler+0x1bc/0x300
[   76.982331]  proc_sys_write+0x17/0x20
[   76.982334]  vfs_write+0x3d3/0x570
[   76.982342]  ksys_write+0x73/0x160
[   76.982347]  __x64_sys_write+0x1e/0x30
[   76.982352]  do_syscall_64+0x35/0x80
[   76.982357]  entry_SYSCALL_64_after_hwframe+0x63/0xcd

Funct
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50549/">CVE-2022-50549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50549">CVE-2022-50549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251550">SUSE bug 1251550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50551</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50551" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50551" ref_url="https://www.suse.com/security/cve/CVE-2022-50551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: Fix potential shift-out-of-bounds in brcmf_fw_alloc_request()

This patch fixes a shift-out-of-bounds in brcmfmac that occurs in
BIT(chiprev) when a 'chiprev' provided by the device is too large.
It should also not be equal to or greater than BITS_PER_TYPE(u32)
as we do bitwise AND with a u32 variable and BIT(chiprev). The patch
adds a check that makes the function return NULL if that is the case.
Note that the NULL case is later handled by the bus-specific caller,
brcmf_usb_probe_cb() or brcmf_usb_reset_resume(), for example.

Found by a modified version of syzkaller.

UBSAN: shift-out-of-bounds in drivers/net/wireless/broadcom/brcm80211/brcmfmac/firmware.c
shift exponent 151055786 is too large for 64-bit type 'long unsigned int'
CPU: 0 PID: 1885 Comm: kworker/0:2 Tainted: G           O      5.14.0+ #132
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014
Workqueue: usb_hub_wq hub_event
Call Trace:
 dump_stack_lvl+0x57/0x7d
 ubsan_epilogue+0x5/0x40
 __ubsan_handle_shift_out_of_bounds.cold+0x53/0xdb
 ? lock_chain_count+0x20/0x20
 brcmf_fw_alloc_request.cold+0x19/0x3ea
 ? brcmf_fw_get_firmwares+0x250/0x250
 ? brcmf_usb_ioctl_resp_wait+0x1a7/0x1f0
 brcmf_usb_get_fwname+0x114/0x1a0
 ? brcmf_usb_reset_resume+0x120/0x120
 ? number+0x6c4/0x9a0
 brcmf_c_process_clm_blob+0x168/0x590
 ? put_dec+0x90/0x90
 ? enable_ptr_key_workfn+0x20/0x20
 ? brcmf_common_pd_remove+0x50/0x50
 ? rcu_read_lock_sched_held+0xa1/0xd0
 brcmf_c_preinit_dcmds+0x673/0xc40
 ? brcmf_c_set_joinpref_default+0x100/0x100
 ? rcu_read_lock_sched_held+0xa1/0xd0
 ? rcu_read_lock_bh_held+0xb0/0xb0
 ? lock_acquire+0x19d/0x4e0
 ? find_held_lock+0x2d/0x110
 ? brcmf_usb_deq+0x1cc/0x260
 ? mark_held_locks+0x9f/0xe0
 ? lockdep_hardirqs_on_prepare+0x273/0x3e0
 ? _raw_spin_unlock_irqrestore+0x47/0x50
 ? trace_hardirqs_on+0x1c/0x120
 ? brcmf_usb_deq+0x1a7/0x260
 ? brcmf_usb_rx_fill_all+0x5a/0xf0
 brcmf_attach+0x246/0xd40
 ? wiphy_new_nm+0x1476/0x1d50
 ? kmemdup+0x30/0x40
 brcmf_usb_probe+0x12de/0x1690
 ? brcmf_usbdev_qinit.constprop.0+0x470/0x470
 usb_probe_interface+0x25f/0x710
 really_probe+0x1be/0xa90
 __driver_probe_device+0x2ab/0x460
 ? usb_match_id.part.0+0x88/0xc0
 driver_probe_device+0x49/0x120
 __device_attach_driver+0x18a/0x250
 ? driver_allows_async_probing+0x120/0x120
 bus_for_each_drv+0x123/0x1a0
 ? bus_rescan_devices+0x20/0x20
 ? lockdep_hardirqs_on_prepare+0x273/0x3e0
 ? trace_hardirqs_on+0x1c/0x120
 __device_attach+0x207/0x330
 ? device_bind_driver+0xb0/0xb0
 ? kobject_uevent_env+0x230/0x12c0
 bus_probe_device+0x1a2/0x260
 device_add+0xa61/0x1ce0
 ? __mutex_unlock_slowpath+0xe7/0x660
 ? __fw_devlink_link_to_suppliers+0x550/0x550
 usb_set_configuration+0x984/0x1770
 ? kernfs_create_link+0x175/0x230
 usb_generic_driver_probe+0x69/0x90
 usb_probe_device+0x9c/0x220
 really_probe+0x1be/0xa90
 __driver_probe_device+0x2ab/0x460
 driver_probe_device+0x49/0x120
 __device_attach_driver+0x18a/0x250
 ? driver_allows_async_probing+0x120/0x120
 bus_for_each_drv+0x123/0x1a0
 ? bus_rescan_devices+0x20/0x20
 ? lockdep_hardirqs_on_prepare+0x273/0x3e0
 ? trace_hardirqs_on+0x1c/0x120
 __device_attach+0x207/0x330
 ? device_bind_driver+0xb0/0xb0
 ? kobject_uevent_env+0x230/0x12c0
 bus_probe_device+0x1a2/0x260
 device_add+0xa61/0x1ce0
 ? __fw_devlink_link_to_suppliers+0x550/0x550
 usb_new_device.cold+0x463/0xf66
 ? hub_disconnect+0x400/0x400
 ? _raw_spin_unlock_irq+0x24/0x30
 hub_event+0x10d5/0x3330
 ? hub_port_debounce+0x280/0x280
 ? __lock_acquire+0x1671/0x5790
 ? wq_calc_node_cpumask+0x170/0x2a0
 ? lock_release+0x640/0x640
 ? rcu_read_lock_sched_held+0xa1/0xd0
 ? rcu_read_lock_bh_held+0xb0/0xb0
 ? lockdep_hardirqs_on_prepare+0x273/0x3e0
 process_one_work+0x873/0x13e0
 ? lock_release+0x640/0x640
 ? pwq_dec_nr_in_flight+0x320/0x320
 ? rwlock_bug.part.0+0x90/0x90
 worker_thread+0x8b/0xd10
 ? __kthread_parkme+0xd9/0x1d0
 ? pr
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50551/">CVE-2022-50551 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50551">CVE-2022-50551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251322">SUSE bug 1251322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50583</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50583" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50583" ref_url="https://www.suse.com/security/cve/CVE-2022-50583" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid0, raid10: Don't set discard sectors for request queue

It should use disk_stack_limits to get a proper max_discard_sectors
rather than setting a value by stack drivers.

And there is a bug. If all member disks are rotational devices,
raid0/raid10 set max_discard_sectors. So the member devices are
not ssd/nvme, but raid0/raid10 export the wrong value. It reports
warning messages in function __blkdev_issue_discard when mkfs.xfs
like this:

[ 4616.022599] ------------[ cut here ]------------
[ 4616.027779] WARNING: CPU: 4 PID: 99634 at block/blk-lib.c:50 __blkdev_issue_discard+0x16a/0x1a0
[ 4616.140663] RIP: 0010:__blkdev_issue_discard+0x16a/0x1a0
[ 4616.146601] Code: 24 4c 89 20 31 c0 e9 fe fe ff ff c1 e8 09 8d 48 ff 4c 89 f0 4c 09 e8 48 85 c1 0f 84 55 ff ff ff b8 ea ff ff ff e9 df fe ff ff &lt;0f&gt; 0b 48 8d 74 24 08 e8 ea d6 00 00 48 c7 c6 20 1e 89 ab 48 c7 c7
[ 4616.167567] RSP: 0018:ffffaab88cbffca8 EFLAGS: 00010246
[ 4616.173406] RAX: ffff9ba1f9e44678 RBX: 0000000000000000 RCX: ffff9ba1c9792080
[ 4616.181376] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff9ba1c9792080
[ 4616.189345] RBP: 0000000000000cc0 R08: ffffaab88cbffd10 R09: 0000000000000000
[ 4616.197317] R10: 0000000000000012 R11: 0000000000000000 R12: 0000000000000000
[ 4616.205288] R13: 0000000000400000 R14: 0000000000000cc0 R15: ffff9ba1c9792080
[ 4616.213259] FS:  00007f9a5534e980(0000) GS:ffff9ba1b7c80000(0000) knlGS:0000000000000000
[ 4616.222298] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 4616.228719] CR2: 000055a390a4c518 CR3: 0000000123e40006 CR4: 00000000001706e0
[ 4616.236689] Call Trace:
[ 4616.239428]  blkdev_issue_discard+0x52/0xb0
[ 4616.244108]  blkdev_common_ioctl+0x43c/0xa00
[ 4616.248883]  blkdev_ioctl+0x116/0x280
[ 4616.252977]  __x64_sys_ioctl+0x8a/0xc0
[ 4616.257163]  do_syscall_64+0x5c/0x90
[ 4616.261164]  ? handle_mm_fault+0xc5/0x2a0
[ 4616.265652]  ? do_user_addr_fault+0x1d8/0x690
[ 4616.270527]  ? do_syscall_64+0x69/0x90
[ 4616.274717]  ? exc_page_fault+0x62/0x150
[ 4616.279097]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 4616.284748] RIP: 0033:0x7f9a55398c6b
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-50583/">CVE-2022-50583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50583">CVE-2022-50583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254806">SUSE bug 1254806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50618</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50618" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50618" ref_url="https://www.suse.com/security/cve/CVE-2022-50618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: meson-gx: fix return value check of mmc_add_host()

mmc_add_host() may return error, if we ignore its return value,
it will lead two issues:
1. The memory that allocated in mmc_alloc_host() is leaked.
2. In the remove() path, mmc_remove_host() will be called to
   delete device, but it's not added yet, it will lead a kernel
   crash because of null-ptr-deref in device_del().

Fix this by checking the return value and goto error path which
will call mmc_free_host().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50618/">CVE-2022-50618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50618">CVE-2022-50618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254788">SUSE bug 1254788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50624</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50624" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50624" ref_url="https://www.suse.com/security/cve/CVE-2022-50624" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: netsec: fix error handling in netsec_register_mdio()

If phy_device_register() fails, phy_device_free() need be called to
put refcount, so memory of phy device and device name can be freed
in callback function.

If get_phy_device() fails, mdiobus_unregister() need be called,
or it will cause warning in mdiobus_free() and kobject is leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50624/">CVE-2022-50624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50624">CVE-2022-50624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254784">SUSE bug 1254784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50630</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50630" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50630" ref_url="https://www.suse.com/security/cve/CVE-2022-50630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: hugetlb: fix UAF in hugetlb_handle_userfault

The vma_lock and hugetlb_fault_mutex are dropped before handling userfault
and reacquire them again after handle_userfault(), but reacquire the
vma_lock could lead to UAF[1,2] due to the following race,

hugetlb_fault
  hugetlb_no_page
    /*unlock vma_lock */
    hugetlb_handle_userfault
      handle_userfault
        /* unlock mm-&gt;mmap_lock*/
                                           vm_mmap_pgoff
                                             do_mmap
                                               mmap_region
                                                 munmap_vma_range
                                                   /* clean old vma */
        /* lock vma_lock again  &lt;--- UAF */
    /* unlock vma_lock */

Since the vma_lock will unlock immediately after
hugetlb_handle_userfault(), let's drop the unneeded lock and unlock in
hugetlb_handle_userfault() to fix the issue.

[1] https://lore.kernel.org/linux-mm/000000000000d5e00a05e834962e@google.com/
[2] https://lore.kernel.org/linux-mm/20220921014457.1668-1-liuzixian4@huawei.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50630/">CVE-2022-50630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50630">CVE-2022-50630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254785">SUSE bug 1254785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50638</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50638" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50638" ref_url="https://www.suse.com/security/cve/CVE-2022-50638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix bug_on in __es_tree_search caused by bad boot loader inode

We got a issue as fllows:
==================================================================
 kernel BUG at fs/ext4/extents_status.c:203!
 invalid opcode: 0000 [#1] PREEMPT SMP
 CPU: 1 PID: 945 Comm: cat Not tainted 6.0.0-next-20221007-dirty #349
 RIP: 0010:ext4_es_end.isra.0+0x34/0x42
 RSP: 0018:ffffc9000143b768 EFLAGS: 00010203
 RAX: 0000000000000000 RBX: ffff8881769cd0b8 RCX: 0000000000000000
 RDX: 0000000000000000 RSI: ffffffff8fc27cf7 RDI: 00000000ffffffff
 RBP: ffff8881769cd0bc R08: 0000000000000000 R09: ffffc9000143b5f8
 R10: 0000000000000001 R11: 0000000000000001 R12: ffff8881769cd0a0
 R13: ffff8881768e5668 R14: 00000000768e52f0 R15: 0000000000000000
 FS: 00007f359f7f05c0(0000)GS:ffff88842fd00000(0000)knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007f359f5a2000 CR3: 000000017130c000 CR4: 00000000000006e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;TASK&gt;
  __es_tree_search.isra.0+0x6d/0xf5
  ext4_es_cache_extent+0xfa/0x230
  ext4_cache_extents+0xd2/0x110
  ext4_find_extent+0x5d5/0x8c0
  ext4_ext_map_blocks+0x9c/0x1d30
  ext4_map_blocks+0x431/0xa50
  ext4_mpage_readpages+0x48e/0xe40
  ext4_readahead+0x47/0x50
  read_pages+0x82/0x530
  page_cache_ra_unbounded+0x199/0x2a0
  do_page_cache_ra+0x47/0x70
  page_cache_ra_order+0x242/0x400
  ondemand_readahead+0x1e8/0x4b0
  page_cache_sync_ra+0xf4/0x110
  filemap_get_pages+0x131/0xb20
  filemap_read+0xda/0x4b0
  generic_file_read_iter+0x13a/0x250
  ext4_file_read_iter+0x59/0x1d0
  vfs_read+0x28f/0x460
  ksys_read+0x73/0x160
  __x64_sys_read+0x1e/0x30
  do_syscall_64+0x35/0x80
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
  &lt;/TASK&gt;
==================================================================

In the above issue, ioctl invokes the swap_inode_boot_loader function to
swap inode&lt;5&gt; and inode&lt;12&gt;. However, inode&lt;5&gt; contain incorrect imode and
disordered extents, and i_nlink is set to 1. The extents check for inode in
the ext4_iget function can be bypassed bacause 5 is EXT4_BOOT_LOADER_INO.
While links_count is set to 1, the extents are not initialized in
swap_inode_boot_loader. After the ioctl command is executed successfully,
the extents are swapped to inode&lt;12&gt;, in this case, run the `cat` command
to view inode&lt;12&gt;. And Bug_ON is triggered due to the incorrect extents.

When the boot loader inode is not initialized, its imode can be one of the
following:
1) the imode is a bad type, which is marked as bad_inode in ext4_iget and
   set to S_IFREG.
2) the imode is good type but not S_IFREG.
3) the imode is S_IFREG.

The BUG_ON may be triggered by bypassing the check in cases 1 and 2.
Therefore, when the boot loader inode is bad_inode or its imode is not
S_IFREG, initialize the inode to avoid triggering the BUG.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-23"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50638/">CVE-2022-50638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50638">CVE-2022-50638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255469">SUSE bug 1255469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50656</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50656" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50656" ref_url="https://www.suse.com/security/cve/CVE-2022-50656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: pn533: Clear nfc_target before being used

Fix a slab-out-of-bounds read that occurs in nla_put() called from
nfc_genl_send_target() when target-&gt;sensb_res_len, which is duplicated
from an nfc_target in pn533, is too large as the nfc_target is not
properly initialized and retains garbage values. Clear nfc_targets with
memset() before they are used.

Found by a modified version of syzkaller.

BUG: KASAN: slab-out-of-bounds in nla_put
Call Trace:
 memcpy
 nla_put
 nfc_genl_dump_targets
 genl_lock_dumpit
 netlink_dump
 __netlink_dump_start
 genl_family_rcv_msg_dumpit
 genl_rcv_msg
 netlink_rcv_skb
 genl_rcv
 netlink_unicast
 netlink_sendmsg
 sock_sendmsg
 ____sys_sendmsg
 ___sys_sendmsg
 __sys_sendmsg
 do_syscall_64
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50656/">CVE-2022-50656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50656">CVE-2022-50656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254745">SUSE bug 1254745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50660</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50660" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50660" ref_url="https://www.suse.com/security/cve/CVE-2022-50660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ipw2200: fix memory leak in ipw_wdev_init()

In the error path of ipw_wdev_init(), exception value is returned, and
the memory applied for in the function is not released. Also the memory
is not released in ipw_pci_probe(). As a result, memory leakage occurs.
So memory release needs to be added to the error path of ipw_wdev_init().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50660/">CVE-2022-50660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50660">CVE-2022-50660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254676">SUSE bug 1254676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50668</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50668" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50668" ref_url="https://www.suse.com/security/cve/CVE-2022-50668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix deadlock due to mbcache entry corruption

When manipulating xattr blocks, we can deadlock infinitely looping
inside ext4_xattr_block_set() where we constantly keep finding xattr
block for reuse in mbcache but we are unable to reuse it because its
reference count is too big. This happens because cache entry for the
xattr block is marked as reusable (e_reusable set) although its
reference count is too big. When this inconsistency happens, this
inconsistent state is kept indefinitely and so ext4_xattr_block_set()
keeps retrying indefinitely.

The inconsistent state is caused by non-atomic update of e_reusable bit.
e_reusable is part of a bitfield and e_reusable update can race with
update of e_referenced bit in the same bitfield resulting in loss of one
of the updates. Fix the problem by using atomic bitops instead.

This bug has been around for many years, but it became *much* easier
to hit after commit 65f8b80053a1 ("ext4: fix race when reusing xattr
blocks").
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50668/">CVE-2022-50668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50668">CVE-2022-50668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254763">SUSE bug 1254763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50670</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50670" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50670" ref_url="https://www.suse.com/security/cve/CVE-2022-50670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: omap_hsmmc: fix return value check of mmc_add_host()

mmc_add_host() may return error, if we ignore its return value,
it will lead two issues:
1. The memory that allocated in mmc_alloc_host() is leaked.
2. In the remove() path, mmc_remove_host() will be called to
   delete device, but it's not added yet, it will lead a kernel
   crash because of null-ptr-deref in device_del().

Fix this by checking the return value and goto error path wihch
will call mmc_free_host().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50670/">CVE-2022-50670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50670">CVE-2022-50670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254699">SUSE bug 1254699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50671</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50671" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50671" ref_url="https://www.suse.com/security/cve/CVE-2022-50671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix "kernel NULL pointer dereference" error

When rxe_queue_init in the function rxe_qp_init_req fails,
both qp-&gt;req.task.func and qp-&gt;req.task.arg are not initialized.

Because of creation of qp fails, the function rxe_create_qp will
call rxe_qp_do_cleanup to handle allocated resource.

Before calling __rxe_do_task, both qp-&gt;req.task.func and
qp-&gt;req.task.arg should be checked.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50671/">CVE-2022-50671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50671">CVE-2022-50671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254711">SUSE bug 1254711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50673</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50673" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50673" ref_url="https://www.suse.com/security/cve/CVE-2022-50673" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix use-after-free in ext4_orphan_cleanup

I caught a issue as follows:
==================================================================
 BUG: KASAN: use-after-free in __list_add_valid+0x28/0x1a0
 Read of size 8 at addr ffff88814b13f378 by task mount/710

 CPU: 1 PID: 710 Comm: mount Not tainted 6.1.0-rc3-next #370
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x73/0x9f
  print_report+0x25d/0x759
  kasan_report+0xc0/0x120
  __asan_load8+0x99/0x140
  __list_add_valid+0x28/0x1a0
  ext4_orphan_cleanup+0x564/0x9d0 [ext4]
  __ext4_fill_super+0x48e2/0x5300 [ext4]
  ext4_fill_super+0x19f/0x3a0 [ext4]
  get_tree_bdev+0x27b/0x450
  ext4_get_tree+0x19/0x30 [ext4]
  vfs_get_tree+0x49/0x150
  path_mount+0xaae/0x1350
  do_mount+0xe2/0x110
  __x64_sys_mount+0xf0/0x190
  do_syscall_64+0x35/0x80
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
  &lt;/TASK&gt;
 [...]
==================================================================

Above issue may happen as follows:
-------------------------------------
ext4_fill_super
  ext4_orphan_cleanup
   --- loop1: assume last_orphan is 12 ---
    list_add(&amp;EXT4_I(inode)-&gt;i_orphan, &amp;EXT4_SB(sb)-&gt;s_orphan)
    ext4_truncate --&gt; return 0
      ext4_inode_attach_jinode --&gt; return -ENOMEM
    iput(inode) --&gt; free inode&lt;12&gt;
   --- loop2: last_orphan is still 12 ---
    list_add(&amp;EXT4_I(inode)-&gt;i_orphan, &amp;EXT4_SB(sb)-&gt;s_orphan);
    // use inode&lt;12&gt; and trigger UAF

To solve this issue, we need to propagate the return value of
ext4_inode_attach_jinode() appropriately.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-26"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50673/">CVE-2022-50673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50673">CVE-2022-50673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255521">SUSE bug 1255521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255522">SUSE bug 1255522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50676</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50676" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50676" ref_url="https://www.suse.com/security/cve/CVE-2022-50676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: rds: don't hold sock lock when cancelling work from rds_tcp_reset_callbacks()

syzbot is reporting lockdep warning at rds_tcp_reset_callbacks() [1], for
commit ac3615e7f3cffe2a ("RDS: TCP: Reduce code duplication in
rds_tcp_reset_callbacks()") added cancel_delayed_work_sync() into a section
protected by lock_sock() without realizing that rds_send_xmit() might call
lock_sock().

We don't need to protect cancel_delayed_work_sync() using lock_sock(), for
even if rds_{send,recv}_worker() re-queued this work while __flush_work()
 from cancel_delayed_work_sync() was waiting for this work to complete,
retried rds_{send,recv}_worker() is no-op due to the absence of RDS_CONN_UP
bit.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50676/">CVE-2022-50676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50676">CVE-2022-50676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254689">SUSE bug 1254689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50678</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50678" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50678" ref_url="https://www.suse.com/security/cve/CVE-2022-50678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: fix invalid address access when enabling SCAN log level

The variable i is changed when setting random MAC address and causes
invalid address access when printing the value of pi-&gt;reqs[i]-&gt;reqid.

We replace reqs index with ri to fix the issue.

[  136.726473] Unable to handle kernel access to user memory outside uaccess routines at virtual address 0000000000000000
[  136.737365] Mem abort info:
[  136.740172]   ESR = 0x96000004
[  136.743359]   Exception class = DABT (current EL), IL = 32 bits
[  136.749294]   SET = 0, FnV = 0
[  136.752481]   EA = 0, S1PTW = 0
[  136.755635] Data abort info:
[  136.758514]   ISV = 0, ISS = 0x00000004
[  136.762487]   CM = 0, WnR = 0
[  136.765522] user pgtable: 4k pages, 48-bit VAs, pgdp = 000000005c4e2577
[  136.772265] [0000000000000000] pgd=0000000000000000
[  136.777160] Internal error: Oops: 96000004 [#1] PREEMPT SMP
[  136.782732] Modules linked in: brcmfmac(O) brcmutil(O) cfg80211(O) compat(O)
[  136.789788] Process wificond (pid: 3175, stack limit = 0x00000000053048fb)
[  136.796664] CPU: 3 PID: 3175 Comm: wificond Tainted: G           O      4.19.42-00001-g531a5f5 #1
[  136.805532] Hardware name: Freescale i.MX8MQ EVK (DT)
[  136.810584] pstate: 60400005 (nZCv daif +PAN -UAO)
[  136.815429] pc : brcmf_pno_config_sched_scans+0x6cc/0xa80 [brcmfmac]
[  136.821811] lr : brcmf_pno_config_sched_scans+0x67c/0xa80 [brcmfmac]
[  136.828162] sp : ffff00000e9a3880
[  136.831475] x29: ffff00000e9a3890 x28: ffff800020543400
[  136.836786] x27: ffff8000b1008880 x26: ffff0000012bf6a0
[  136.842098] x25: ffff80002054345c x24: ffff800088d22400
[  136.847409] x23: ffff0000012bf638 x22: ffff0000012bf6d8
[  136.852721] x21: ffff8000aced8fc0 x20: ffff8000ac164400
[  136.858032] x19: ffff00000e9a3946 x18: 0000000000000000
[  136.863343] x17: 0000000000000000 x16: 0000000000000000
[  136.868655] x15: ffff0000093f3b37 x14: 0000000000000050
[  136.873966] x13: 0000000000003135 x12: 0000000000000000
[  136.879277] x11: 0000000000000000 x10: ffff000009a61888
[  136.884589] x9 : 000000000000000f x8 : 0000000000000008
[  136.889900] x7 : 303a32303d726464 x6 : ffff00000a1f957d
[  136.895211] x5 : 0000000000000000 x4 : ffff00000e9a3942
[  136.900523] x3 : 0000000000000000 x2 : ffff0000012cead8
[  136.905834] x1 : ffff0000012bf6d8 x0 : 0000000000000000
[  136.911146] Call trace:
[  136.913623]  brcmf_pno_config_sched_scans+0x6cc/0xa80 [brcmfmac]
[  136.919658]  brcmf_pno_start_sched_scan+0xa4/0x118 [brcmfmac]
[  136.925430]  brcmf_cfg80211_sched_scan_start+0x80/0xe0 [brcmfmac]
[  136.931636]  nl80211_start_sched_scan+0x140/0x308 [cfg80211]
[  136.937298]  genl_rcv_msg+0x358/0x3f4
[  136.940960]  netlink_rcv_skb+0xb4/0x118
[  136.944795]  genl_rcv+0x34/0x48
[  136.947935]  netlink_unicast+0x264/0x300
[  136.951856]  netlink_sendmsg+0x2e4/0x33c
[  136.955781]  __sys_sendto+0x120/0x19c
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50678/">CVE-2022-50678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50678">CVE-2022-50678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254902">SUSE bug 1254902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50697</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50697" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50697" ref_url="https://www.suse.com/security/cve/CVE-2022-50697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mrp: introduce active flags to prevent UAF when applicant uninit

The caller of del_timer_sync must prevent restarting of the timer, If
we have no this synchronization, there is a small probability that the
cancellation will not be successful.

And syzbot report the fellowing crash:
==================================================================
BUG: KASAN: use-after-free in hlist_add_head include/linux/list.h:929 [inline]
BUG: KASAN: use-after-free in enqueue_timer+0x18/0xa4 kernel/time/timer.c:605
Write at addr f9ff000024df6058 by task syz-fuzzer/2256
Pointer tag: [f9], memory tag: [fe]

CPU: 1 PID: 2256 Comm: syz-fuzzer Not tainted 6.1.0-rc5-syzkaller-00008-
ge01d50cbd6ee #0
Hardware name: linux,dummy-virt (DT)
Call trace:
 dump_backtrace.part.0+0xe0/0xf0 arch/arm64/kernel/stacktrace.c:156
 dump_backtrace arch/arm64/kernel/stacktrace.c:162 [inline]
 show_stack+0x18/0x40 arch/arm64/kernel/stacktrace.c:163
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x68/0x84 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:284 [inline]
 print_report+0x1a8/0x4a0 mm/kasan/report.c:395
 kasan_report+0x94/0xb4 mm/kasan/report.c:495
 __do_kernel_fault+0x164/0x1e0 arch/arm64/mm/fault.c:320
 do_bad_area arch/arm64/mm/fault.c:473 [inline]
 do_tag_check_fault+0x78/0x8c arch/arm64/mm/fault.c:749
 do_mem_abort+0x44/0x94 arch/arm64/mm/fault.c:825
 el1_abort+0x40/0x60 arch/arm64/kernel/entry-common.c:367
 el1h_64_sync_handler+0xd8/0xe4 arch/arm64/kernel/entry-common.c:427
 el1h_64_sync+0x64/0x68 arch/arm64/kernel/entry.S:576
 hlist_add_head include/linux/list.h:929 [inline]
 enqueue_timer+0x18/0xa4 kernel/time/timer.c:605
 mod_timer+0x14/0x20 kernel/time/timer.c:1161
 mrp_periodic_timer_arm net/802/mrp.c:614 [inline]
 mrp_periodic_timer+0xa0/0xc0 net/802/mrp.c:627
 call_timer_fn.constprop.0+0x24/0x80 kernel/time/timer.c:1474
 expire_timers+0x98/0xc4 kernel/time/timer.c:1519

To fix it, we can introduce a new active flags to make sure the timer will
not restart.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50697/">CVE-2022-50697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50697">CVE-2022-50697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255594">SUSE bug 1255594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255595">SUSE bug 1255595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50698</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50698" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50698" ref_url="https://www.suse.com/security/cve/CVE-2022-50698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: da7219: Fix an error handling path in da7219_register_dai_clks()

If clk_hw_register() fails, the corresponding clk should not be
unregistered.

To handle errors from loops, clean up partial iterations before doing the
goto.  So add a clk_hw_unregister().
Then use a while (--i &gt;= 0) loop in the unwind section.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50698/">CVE-2022-50698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50698">CVE-2022-50698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255608">SUSE bug 1255608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50699</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50699" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50699" ref_url="https://www.suse.com/security/cve/CVE-2022-50699" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context()

The following warning was triggered on a hardware environment:

  SELinux: Converting 162 SID table entries...
  BUG: sleeping function called from invalid context at
       __might_sleep+0x60/0x74 0x0
  in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 5943, name: tar
  CPU: 7 PID: 5943 Comm: tar Tainted: P O 5.10.0 #1
  Call trace:
   dump_backtrace+0x0/0x1c8
   show_stack+0x18/0x28
   dump_stack+0xe8/0x15c
   ___might_sleep+0x168/0x17c
   __might_sleep+0x60/0x74
   __kmalloc_track_caller+0xa0/0x7dc
   kstrdup+0x54/0xac
   convert_context+0x48/0x2e4
   sidtab_context_to_sid+0x1c4/0x36c
   security_context_to_sid_core+0x168/0x238
   security_context_to_sid_default+0x14/0x24
   inode_doinit_use_xattr+0x164/0x1e4
   inode_doinit_with_dentry+0x1c0/0x488
   selinux_d_instantiate+0x20/0x34
   security_d_instantiate+0x70/0xbc
   d_splice_alias+0x4c/0x3c0
   ext4_lookup+0x1d8/0x200 [ext4]
   __lookup_slow+0x12c/0x1e4
   walk_component+0x100/0x200
   path_lookupat+0x88/0x118
   filename_lookup+0x98/0x130
   user_path_at_empty+0x48/0x60
   vfs_statx+0x84/0x140
   vfs_fstatat+0x20/0x30
   __se_sys_newfstatat+0x30/0x74
   __arm64_sys_newfstatat+0x1c/0x2c
   el0_svc_common.constprop.0+0x100/0x184
   do_el0_svc+0x1c/0x2c
   el0_svc+0x20/0x34
   el0_sync_handler+0x80/0x17c
   el0_sync+0x13c/0x140
  SELinux: Context system_u:object_r:pssp_rsyslog_log_t:s0:c0 is
           not valid (left unmapped).

It was found that within a critical section of spin_lock_irqsave in
sidtab_context_to_sid(), convert_context() (hooked by
sidtab_convert_params.func) might cause the process to sleep via
allocating memory with GFP_KERNEL, which is problematic.

As Ondrej pointed out [1], convert_context()/sidtab_convert_params.func
has another caller sidtab_convert_tree(), which is okay with GFP_KERNEL.
Therefore, fix this problem by adding a gfp_t argument for
convert_context()/sidtab_convert_params.func and pass GFP_KERNEL/_ATOMIC
properly in individual callers.

[PM: wrap long BUG() output lines, tweak subject line]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50699/">CVE-2022-50699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50699">CVE-2022-50699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255582">SUSE bug 1255582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50700</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50700" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50700" ref_url="https://www.suse.com/security/cve/CVE-2022-50700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024509.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath10k: Delay the unmapping of the buffer

On WCN3990, we are seeing a rare scenario where copy engine hardware is
sending a copy complete interrupt to the host driver while still
processing the buffer that the driver has sent, this is leading into an
SMMU fault triggering kernel panic. This is happening on copy engine
channel 3 (CE3) where the driver normally enqueues WMI commands to the
firmware. Upon receiving a copy complete interrupt, host driver will
immediately unmap and frees the buffer presuming that hardware has
processed the buffer. In the issue case, upon receiving copy complete
interrupt, host driver will unmap and free the buffer but since hardware
is still accessing the buffer (which in this case got unmapped in
parallel), SMMU hardware will trigger an SMMU fault resulting in a
kernel panic.

In order to avoid this, as a work around, add a delay before unmapping
the copy engine source DMA buffer. This is conditionally done for
WCN3990 and only for the CE3 channel where issue is seen.

Below is the crash signature:

wifi smmu error: kernel: [ 10.120965] arm-smmu 15000000.iommu: Unhandled
context fault: fsr=0x402, iova=0x7fdfd8ac0,
fsynr=0x500003,cbfrsynra=0xc1, cb=6 arm-smmu 15000000.iommu: Unhandled
context fault:fsr=0x402, iova=0x7fe06fdc0, fsynr=0x710003,
cbfrsynra=0xc1, cb=6 qcom-q6v5-mss 4080000.remoteproc: fatal error
received: err_qdi.c:1040:EF:wlan_process:0x1:WLAN RT:0x2091:
cmnos_thread.c:3998:Asserted in copy_engine.c:AXI_ERROR_DETECTED:2149
remoteproc remoteproc0: crash detected in
4080000.remoteproc: type fatal error &lt;3&gt; remoteproc remoteproc0:
handling crash #1 in 4080000.remoteproc

pc : __arm_lpae_unmap+0x500/0x514
lr : __arm_lpae_unmap+0x4bc/0x514
sp : ffffffc011ffb530
x29: ffffffc011ffb590 x28: 0000000000000000
x27: 0000000000000000 x26: 0000000000000004
x25: 0000000000000003 x24: ffffffc011ffb890
x23: ffffffa762ef9be0 x22: ffffffa77244ef00
x21: 0000000000000009 x20: 00000007fff7c000
x19: 0000000000000003 x18: 0000000000000000
x17: 0000000000000004 x16: ffffffd7a357d9f0
x15: 0000000000000000 x14: 00fd5d4fa7ffffff
x13: 000000000000000e x12: 0000000000000000
x11: 00000000ffffffff x10: 00000000fffffe00
x9 : 000000000000017c x8 : 000000000000000c
x7 : 0000000000000000 x6 : ffffffa762ef9000
x5 : 0000000000000003 x4 : 0000000000000004
x3 : 0000000000001000 x2 : 00000007fff7c000
x1 : ffffffc011ffb890 x0 : 0000000000000000 Call trace:
__arm_lpae_unmap+0x500/0x514
__arm_lpae_unmap+0x4bc/0x514
__arm_lpae_unmap+0x4bc/0x514
arm_lpae_unmap_pages+0x78/0xa4
arm_smmu_unmap_pages+0x78/0x104
__iommu_unmap+0xc8/0x1e4
iommu_unmap_fast+0x38/0x48
__iommu_dma_unmap+0x84/0x104
iommu_dma_free+0x34/0x50
dma_free_attrs+0xa4/0xd0
ath10k_htt_rx_free+0xc4/0xf4 [ath10k_core] ath10k_core_stop+0x64/0x7c
[ath10k_core]
ath10k_halt+0x11c/0x180 [ath10k_core]
ath10k_stop+0x54/0x94 [ath10k_core]
drv_stop+0x48/0x1c8 [mac80211]
ieee80211_do_open+0x638/0x77c [mac80211] ieee80211_open+0x48/0x5c
[mac80211]
__dev_open+0xb4/0x174
__dev_change_flags+0xc4/0x1dc
dev_change_flags+0x3c/0x7c
devinet_ioctl+0x2b4/0x580
inet_ioctl+0xb0/0x1b4
sock_do_ioctl+0x4c/0x16c
compat_ifreq_ioctl+0x1cc/0x35c
compat_sock_ioctl+0x110/0x2ac
__arm64_compat_sys_ioctl+0xf4/0x3e0
el0_svc_common+0xb4/0x17c
el0_svc_compat_handler+0x2c/0x58
el0_svc_compat+0x8/0x2c

Tested-on: WCN3990 hw1.0 SNOC WLAN.HL.2.0-01387-QCAHLSWMTPLZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50700/">CVE-2022-50700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50700">CVE-2022-50700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255576">SUSE bug 1255576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255577">SUSE bug 1255577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50701</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50701" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50701" ref_url="https://www.suse.com/security/cve/CVE-2022-50701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921s: fix slab-out-of-bounds access in sdio host

SDIO may need addtional 511 bytes to align bus operation. If the tailroom
of this skb is not big enough, we would access invalid memory region.
For low level operation, increase skb size to keep valid memory access in
SDIO host.

Error message:
[69.951] BUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0xe9/0x1a0
[69.951] Read of size 64 at addr ffff88811c9cf000 by task kworker/u16:7/451
[69.951] CPU: 4 PID: 451 Comm: kworker/u16:7 Tainted: G W  OE  6.1.0-rc5 #1
[69.951] Workqueue: kvub300c vub300_cmndwork_thread [vub300]
[69.951] Call Trace:
[69.951]  &lt;TASK&gt;
[69.952]  dump_stack_lvl+0x49/0x63
[69.952]  print_report+0x171/0x4a8
[69.952]  kasan_report+0xb4/0x130
[69.952]  kasan_check_range+0x149/0x1e0
[69.952]  memcpy+0x24/0x70
[69.952]  sg_copy_buffer+0xe9/0x1a0
[69.952]  sg_copy_to_buffer+0x12/0x20
[69.952]  __command_write_data.isra.0+0x23c/0xbf0 [vub300]
[69.952]  vub300_cmndwork_thread+0x17f3/0x58b0 [vub300]
[69.952]  process_one_work+0x7ee/0x1320
[69.952]  worker_thread+0x53c/0x1240
[69.952]  kthread+0x2b8/0x370
[69.952]  ret_from_fork+0x1f/0x30
[69.952]  &lt;/TASK&gt;

[69.952] Allocated by task 854:
[69.952]  kasan_save_stack+0x26/0x50
[69.952]  kasan_set_track+0x25/0x30
[69.952]  kasan_save_alloc_info+0x1b/0x30
[69.952]  __kasan_kmalloc+0x87/0xa0
[69.952]  __kmalloc_node_track_caller+0x63/0x150
[69.952]  kmalloc_reserve+0x31/0xd0
[69.952]  __alloc_skb+0xfc/0x2b0
[69.952]  __mt76_mcu_msg_alloc+0xbf/0x230 [mt76]
[69.952]  mt76_mcu_send_and_get_msg+0xab/0x110 [mt76]
[69.952]  __mt76_mcu_send_firmware.cold+0x94/0x15d [mt76]
[69.952]  mt76_connac_mcu_send_ram_firmware+0x415/0x54d [mt76_connac_lib]
[69.952]  mt76_connac2_load_ram.cold+0x118/0x4bc [mt76_connac_lib]
[69.952]  mt7921_run_firmware.cold+0x2e9/0x405 [mt7921_common]
[69.952]  mt7921s_mcu_init+0x45/0x80 [mt7921s]
[69.953]  mt7921_init_work+0xe1/0x2a0 [mt7921_common]
[69.953]  process_one_work+0x7ee/0x1320
[69.953]  worker_thread+0x53c/0x1240
[69.953]  kthread+0x2b8/0x370
[69.953]  ret_from_fork+0x1f/0x30
[69.953] The buggy address belongs to the object at ffff88811c9ce800
             which belongs to the cache kmalloc-2k of size 2048
[69.953] The buggy address is located 0 bytes to the right of
             2048-byte region [ffff88811c9ce800, ffff88811c9cf000)

[69.953] Memory state around the buggy address:
[69.953]  ffff88811c9cef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[69.953]  ffff88811c9cef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[69.953] &gt;ffff88811c9cf000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[69.953]                    ^
[69.953]  ffff88811c9cf080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[69.953]  ffff88811c9cf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50701/">CVE-2022-50701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50701">CVE-2022-50701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255635">SUSE bug 1255635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50702</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50702" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50702" ref_url="https://www.suse.com/security/cve/CVE-2022-50702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa_sim: fix possible memory leak in vdpasim_net_init() and vdpasim_blk_init()

Inject fault while probing module, if device_register() fails in
vdpasim_net_init() or vdpasim_blk_init(), but the refcount of kobject is
not decreased to 0, the name allocated in dev_set_name() is leaked.
Fix this by calling put_device(), so that name can be freed in
callback function kobject_cleanup().

(vdpa_sim_net)
unreferenced object 0xffff88807eebc370 (size 16):
  comm "modprobe", pid 3848, jiffies 4362982860 (age 18.153s)
  hex dump (first 16 bytes):
    76 64 70 61 73 69 6d 5f 6e 65 74 00 6b 6b 6b a5  vdpasim_net.kkk.
  backtrace:
    [&lt;ffffffff8174f19e&gt;] __kmalloc_node_track_caller+0x4e/0x150
    [&lt;ffffffff81731d53&gt;] kstrdup+0x33/0x60
    [&lt;ffffffff83a5d421&gt;] kobject_set_name_vargs+0x41/0x110
    [&lt;ffffffff82d87aab&gt;] dev_set_name+0xab/0xe0
    [&lt;ffffffff82d91a23&gt;] device_add+0xe3/0x1a80
    [&lt;ffffffffa0270013&gt;] 0xffffffffa0270013
    [&lt;ffffffff81001c27&gt;] do_one_initcall+0x87/0x2e0
    [&lt;ffffffff813739cb&gt;] do_init_module+0x1ab/0x640
    [&lt;ffffffff81379d20&gt;] load_module+0x5d00/0x77f0
    [&lt;ffffffff8137bc40&gt;] __do_sys_finit_module+0x110/0x1b0
    [&lt;ffffffff83c4d505&gt;] do_syscall_64+0x35/0x80
    [&lt;ffffffff83e0006a&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0

(vdpa_sim_blk)
unreferenced object 0xffff8881070c1250 (size 16):
  comm "modprobe", pid 6844, jiffies 4364069319 (age 17.572s)
  hex dump (first 16 bytes):
    76 64 70 61 73 69 6d 5f 62 6c 6b 00 6b 6b 6b a5  vdpasim_blk.kkk.
  backtrace:
    [&lt;ffffffff8174f19e&gt;] __kmalloc_node_track_caller+0x4e/0x150
    [&lt;ffffffff81731d53&gt;] kstrdup+0x33/0x60
    [&lt;ffffffff83a5d421&gt;] kobject_set_name_vargs+0x41/0x110
    [&lt;ffffffff82d87aab&gt;] dev_set_name+0xab/0xe0
    [&lt;ffffffff82d91a23&gt;] device_add+0xe3/0x1a80
    [&lt;ffffffffa0220013&gt;] 0xffffffffa0220013
    [&lt;ffffffff81001c27&gt;] do_one_initcall+0x87/0x2e0
    [&lt;ffffffff813739cb&gt;] do_init_module+0x1ab/0x640
    [&lt;ffffffff81379d20&gt;] load_module+0x5d00/0x77f0
    [&lt;ffffffff8137bc40&gt;] __do_sys_finit_module+0x110/0x1b0
    [&lt;ffffffff83c4d505&gt;] do_syscall_64+0x35/0x80
    [&lt;ffffffff83e0006a&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50702/">CVE-2022-50702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50702">CVE-2022-50702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255624">SUSE bug 1255624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50703</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50703" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50703" ref_url="https://www.suse.com/security/cve/CVE-2022-50703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe()

There are two refcount leak bugs in qcom_smsm_probe():

(1) The 'local_node' is escaped out from for_each_child_of_node() as
the break of iteration, we should call of_node_put() for it in error
path or when it is not used anymore.
(2) The 'node' is escaped out from for_each_available_child_of_node()
as the 'goto', we should call of_node_put() for it in goto target.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50703/">CVE-2022-50703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50703">CVE-2022-50703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255607">SUSE bug 1255607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50704</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50704" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50704" ref_url="https://www.suse.com/security/cve/CVE-2022-50704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: gadget: Fix use-after-free during usb config switch

In the process of switching USB config from rndis to other config,
if the hardware does not support the -&gt;pullup callback, or the
hardware encounters a low probability fault, both of them may cause
the -&gt;pullup callback to fail, which will then cause a system panic
(use after free).

The gadget drivers sometimes need to be unloaded regardless of the
hardware's behavior.

Analysis as follows:
=======================================================================
(1) write /config/usb_gadget/g1/UDC "none"

gether_disconnect+0x2c/0x1f8
rndis_disable+0x4c/0x74
composite_disconnect+0x74/0xb0
configfs_composite_disconnect+0x60/0x7c
usb_gadget_disconnect+0x70/0x124
usb_gadget_unregister_driver+0xc8/0x1d8
gadget_dev_desc_UDC_store+0xec/0x1e4

(2) rm /config/usb_gadget/g1/configs/b.1/f1

rndis_deregister+0x28/0x54
rndis_free+0x44/0x7c
usb_put_function+0x14/0x1c
config_usb_cfg_unlink+0xc4/0xe0
configfs_unlink+0x124/0x1c8
vfs_unlink+0x114/0x1dc

(3) rmdir /config/usb_gadget/g1/functions/rndis.gs4

panic+0x1fc/0x3d0
do_page_fault+0xa8/0x46c
do_mem_abort+0x3c/0xac
el1_sync_handler+0x40/0x78
0xffffff801138f880
rndis_close+0x28/0x34
eth_stop+0x74/0x110
dev_close_many+0x48/0x194
rollback_registered_many+0x118/0x814
unregister_netdev+0x20/0x30
gether_cleanup+0x1c/0x38
rndis_attr_release+0xc/0x14
kref_put+0x74/0xb8
configfs_rmdir+0x314/0x374

If gadget-&gt;ops-&gt;pullup() return an error, function rndis_close() will be
called, then it will causes a use-after-free problem.
=======================================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50704/">CVE-2022-50704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50704">CVE-2022-50704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255623">SUSE bug 1255623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50705</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50705" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50705" ref_url="https://www.suse.com/security/cve/CVE-2022-50705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/rw: defer fsnotify calls to task context

We can't call these off the kiocb completion as that might be off
soft/hard irq context. Defer the calls to when we process the
task_work for this request. That avoids valid complaints like:

stack backtrace:
CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.0.0-rc6-syzkaller-00321-g105a36f3694e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
Call Trace:
 &lt;IRQ&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_usage_bug kernel/locking/lockdep.c:3961 [inline]
 valid_state kernel/locking/lockdep.c:3973 [inline]
 mark_lock_irq kernel/locking/lockdep.c:4176 [inline]
 mark_lock.part.0.cold+0x18/0xd8 kernel/locking/lockdep.c:4632
 mark_lock kernel/locking/lockdep.c:4596 [inline]
 mark_usage kernel/locking/lockdep.c:4527 [inline]
 __lock_acquire+0x11d9/0x56d0 kernel/locking/lockdep.c:5007
 lock_acquire kernel/locking/lockdep.c:5666 [inline]
 lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5631
 __fs_reclaim_acquire mm/page_alloc.c:4674 [inline]
 fs_reclaim_acquire+0x115/0x160 mm/page_alloc.c:4688
 might_alloc include/linux/sched/mm.h:271 [inline]
 slab_pre_alloc_hook mm/slab.h:700 [inline]
 slab_alloc mm/slab.c:3278 [inline]
 __kmem_cache_alloc_lru mm/slab.c:3471 [inline]
 kmem_cache_alloc+0x39/0x520 mm/slab.c:3491
 fanotify_alloc_fid_event fs/notify/fanotify/fanotify.c:580 [inline]
 fanotify_alloc_event fs/notify/fanotify/fanotify.c:813 [inline]
 fanotify_handle_event+0x1130/0x3f40 fs/notify/fanotify/fanotify.c:948
 send_to_group fs/notify/fsnotify.c:360 [inline]
 fsnotify+0xafb/0x1680 fs/notify/fsnotify.c:570
 __fsnotify_parent+0x62f/0xa60 fs/notify/fsnotify.c:230
 fsnotify_parent include/linux/fsnotify.h:77 [inline]
 fsnotify_file include/linux/fsnotify.h:99 [inline]
 fsnotify_access include/linux/fsnotify.h:309 [inline]
 __io_complete_rw_common+0x485/0x720 io_uring/rw.c:195
 io_complete_rw+0x1a/0x1f0 io_uring/rw.c:228
 iomap_dio_complete_work fs/iomap/direct-io.c:144 [inline]
 iomap_dio_bio_end_io+0x438/0x5e0 fs/iomap/direct-io.c:178
 bio_endio+0x5f9/0x780 block/bio.c:1564
 req_bio_endio block/blk-mq.c:695 [inline]
 blk_update_request+0x3fc/0x1300 block/blk-mq.c:825
 scsi_end_request+0x7a/0x9a0 drivers/scsi/scsi_lib.c:541
 scsi_io_completion+0x173/0x1f70 drivers/scsi/scsi_lib.c:971
 scsi_complete+0x122/0x3b0 drivers/scsi/scsi_lib.c:1438
 blk_complete_reqs+0xad/0xe0 block/blk-mq.c:1022
 __do_softirq+0x1d3/0x9c6 kernel/softirq.c:571
 invoke_softirq kernel/softirq.c:445 [inline]
 __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662
 common_interrupt+0xa9/0xc0 arch/x86/kernel/irq.c:240
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50705/">CVE-2022-50705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50705">CVE-2022-50705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255596">SUSE bug 1255596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50706</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50706" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50706" ref_url="https://www.suse.com/security/cve/CVE-2022-50706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/ieee802154: don't warn zero-sized raw_sendmsg()

syzbot is hitting skb_assert_len() warning at __dev_queue_xmit() [1],
for PF_IEEE802154 socket's zero-sized raw_sendmsg() request is hitting
__dev_queue_xmit() with skb-&gt;len == 0.

Since PF_IEEE802154 socket's zero-sized raw_sendmsg() request was
able to return 0, don't call __dev_queue_xmit() if packet length is 0.

  ----------
  #include &lt;sys/socket.h&gt;
  #include &lt;netinet/in.h&gt;

  int main(int argc, char *argv[])
  {
    struct sockaddr_in addr = { .sin_family = AF_INET, .sin_addr.s_addr = htonl(INADDR_LOOPBACK) };
    struct iovec iov = { };
    struct msghdr hdr = { .msg_name = &amp;addr, .msg_namelen = sizeof(addr), .msg_iov = &amp;iov, .msg_iovlen = 1 };
    sendmsg(socket(PF_IEEE802154, SOCK_RAW, 0), &amp;hdr, 0);
    return 0;
  }
  ----------

Note that this might be a sign that commit fd1894224407c484 ("bpf: Don't
redirect packets with invalid pkt_len") should be reverted, for
skb-&gt;len == 0 was acceptable for at least PF_IEEE802154 socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50706/">CVE-2022-50706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50706">CVE-2022-50706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255581">SUSE bug 1255581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50707</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50707" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50707" ref_url="https://www.suse.com/security/cve/CVE-2022-50707" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-crypto: fix memory leak in virtio_crypto_alg_skcipher_close_session()

'vc_ctrl_req' is alloced in virtio_crypto_alg_skcipher_close_session(),
and should be freed in the invalid ctrl_status-&gt;status error handling
case. Otherwise there is a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50707/">CVE-2022-50707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50707">CVE-2022-50707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255604">SUSE bug 1255604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50708</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50708" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50708" ref_url="https://www.suse.com/security/cve/CVE-2022-50708" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HSI: ssi_protocol: fix potential resource leak in ssip_pn_open()

ssip_pn_open() claims the HSI client's port with hsi_claim_port(). When
hsi_register_port_event() gets some error and returns a negetive value,
the HSI client's port should be released with hsi_release_port().

Fix it by calling hsi_release_port() when hsi_register_port_event() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50708/">CVE-2022-50708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50708">CVE-2022-50708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255566">SUSE bug 1255566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50709</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50709" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50709" ref_url="https://www.suse.com/security/cve/CVE-2022-50709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg()

syzbot is reporting uninit value at ath9k_htc_rx_msg() [1], for
ioctl(USB_RAW_IOCTL_EP_WRITE) can call ath9k_hif_usb_rx_stream() with
pkt_len = 0 but ath9k_hif_usb_rx_stream() uses
__dev_alloc_skb(pkt_len + 32, GFP_ATOMIC) based on an assumption that
pkt_len is valid. As a result, ath9k_hif_usb_rx_stream() allocates skb
with uninitialized memory and ath9k_htc_rx_msg() is reading from
uninitialized memory.

Since bytes accessed by ath9k_htc_rx_msg() is not known until
ath9k_htc_rx_msg() is called, it would be difficult to check minimal valid
pkt_len at "if (pkt_len &gt; 2 * MAX_RX_BUF_SIZE) {" line in
ath9k_hif_usb_rx_stream().

We have two choices. One is to workaround by adding __GFP_ZERO so that
ath9k_htc_rx_msg() sees 0 if pkt_len is invalid. The other is to let
ath9k_htc_rx_msg() validate pkt_len before accessing. This patch chose
the latter.

Note that I'm not sure threshold condition is correct, for I can't find
details on possible packet length used by this protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50709/">CVE-2022-50709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50709">CVE-2022-50709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255565">SUSE bug 1255565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50710</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50710" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50710" ref_url="https://www.suse.com/security/cve/CVE-2022-50710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: set tx_tstamps when creating new Tx rings via ethtool

When the user changes the number of queues via ethtool, the driver
allocates new rings. This allocation did not initialize tx_tstamps. This
results in the tx_tstamps field being zero (due to kcalloc allocation), and
would result in a NULL pointer dereference when attempting a transmit
timestamp on the new ring.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50710/">CVE-2022-50710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50710">CVE-2022-50710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255561">SUSE bug 1255561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50711</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50711" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50711" ref_url="https://www.suse.com/security/cve/CVE-2022-50711" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: mtk_eth_soc: fix possible memory leak in mtk_probe()

If mtk_wed_add_hw() has been called, mtk_wed_exit() needs be called
in error path or removing module to free the memory allocated in
mtk_wed_add_hw().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50711/">CVE-2022-50711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50711">CVE-2022-50711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255612">SUSE bug 1255612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50712</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50712" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50712" ref_url="https://www.suse.com/security/cve/CVE-2022-50712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

devlink: hold region lock when flushing snapshots

Netdevsim triggers a splat on reload, when it destroys regions
with snapshots pending:

  WARNING: CPU: 1 PID: 787 at net/core/devlink.c:6291 devlink_region_snapshot_del+0x12e/0x140
  CPU: 1 PID: 787 Comm: devlink Not tainted 6.1.0-07460-g7ae9888d6e1c #580
  RIP: 0010:devlink_region_snapshot_del+0x12e/0x140
  Call Trace:
   &lt;TASK&gt;
   devl_region_destroy+0x70/0x140
   nsim_dev_reload_down+0x2f/0x60 [netdevsim]
   devlink_reload+0x1f7/0x360
   devlink_nl_cmd_reload+0x6ce/0x860
   genl_family_rcv_msg_doit.isra.0+0x145/0x1c0

This is the locking assert in devlink_region_snapshot_del(),
we're supposed to be holding the region-&gt;snapshot_lock here.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-27"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50712/">CVE-2022-50712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50712">CVE-2022-50712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255745">SUSE bug 1255745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50713</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50713" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50713" ref_url="https://www.suse.com/security/cve/CVE-2022-50713" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: visconti: Fix memory leak in visconti_register_pll()

@pll-&gt;rate_table has allocated memory by kmemdup(), if clk_hw_register()
fails, it should be freed, otherwise it will cause memory leak issue,
this patch fixes it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-31"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50713/">CVE-2022-50713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50713">CVE-2022-50713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255746">SUSE bug 1255746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50714</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50714" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50714" ref_url="https://www.suse.com/security/cve/CVE-2022-50714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921e: fix rmmod crash in driver reload test

In insmod/rmmod stress test, the following crash dump shows up immediately.
The problem is caused by missing mt76_dev in mt7921_pci_remove(). We
should make sure the drvdata is ready before probe() finished.

[168.862789] ==================================================================
[168.862797] BUG: KASAN: user-memory-access in try_to_grab_pending+0x59/0x480
[168.862805] Write of size 8 at addr 0000000000006df0 by task rmmod/5361
[168.862812] CPU: 7 PID: 5361 Comm: rmmod Tainted: G           OE     5.19.0-rc6 #1
[168.862816] Hardware name: Intel(R) Client Systems NUC8i7BEH/NUC8BEB, 05/04/2020
[168.862820] Call Trace:
[168.862822]  &lt;TASK&gt;
[168.862825]  dump_stack_lvl+0x49/0x63
[168.862832]  print_report.cold+0x493/0x6b7
[168.862845]  kasan_report+0xa7/0x120
[168.862857]  kasan_check_range+0x163/0x200
[168.862861]  __kasan_check_write+0x14/0x20
[168.862866]  try_to_grab_pending+0x59/0x480
[168.862870]  __cancel_work_timer+0xbb/0x340
[168.862898]  cancel_work_sync+0x10/0x20
[168.862902]  mt7921_pci_remove+0x61/0x1c0 [mt7921e]
[168.862909]  pci_device_remove+0xa3/0x1d0
[168.862914]  device_remove+0xc4/0x170
[168.862920]  device_release_driver_internal+0x163/0x300
[168.862925]  driver_detach+0xc7/0x1a0
[168.862930]  bus_remove_driver+0xeb/0x2d0
[168.862935]  driver_unregister+0x71/0xb0
[168.862939]  pci_unregister_driver+0x30/0x230
[168.862944]  mt7921_pci_driver_exit+0x10/0x1b [mt7921e]
[168.862949]  __x64_sys_delete_module+0x2f9/0x4b0
[168.862968]  do_syscall_64+0x38/0x90
[168.862973]  entry_SYSCALL_64_after_hwframe+0x63/0xcd

Test steps:
1. insmode
2. do not ifup
3. rmmod quickly (within 1 second)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-31"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50714/">CVE-2022-50714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50714">CVE-2022-50714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255747">SUSE bug 1255747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255748">SUSE bug 1255748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50715</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50715" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50715" ref_url="https://www.suse.com/security/cve/CVE-2022-50715" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid1: stop mdx_raid1 thread when raid1 array run failed

fail run raid1 array when we assemble array with the inactive disk only,
but the mdx_raid1 thread were not stop, Even if the associated resources
have been released. it will caused a NULL dereference when we do poweroff.

This causes the following Oops:
    [  287.587787] BUG: kernel NULL pointer dereference, address: 0000000000000070
    [  287.594762] #PF: supervisor read access in kernel mode
    [  287.599912] #PF: error_code(0x0000) - not-present page
    [  287.605061] PGD 0 P4D 0
    [  287.607612] Oops: 0000 [#1] SMP NOPTI
    [  287.611287] CPU: 3 PID: 5265 Comm: md0_raid1 Tainted: G     U            5.10.146 #0
    [  287.619029] Hardware name: xxxxxxx/To be filled by O.E.M, BIOS 5.19 06/16/2022
    [  287.626775] RIP: 0010:md_check_recovery+0x57/0x500 [md_mod]
    [  287.632357] Code: fe 01 00 00 48 83 bb 10 03 00 00 00 74 08 48 89 ......
    [  287.651118] RSP: 0018:ffffc90000433d78 EFLAGS: 00010202
    [  287.656347] RAX: 0000000000000000 RBX: ffff888105986800 RCX: 0000000000000000
    [  287.663491] RDX: ffffc90000433bb0 RSI: 00000000ffffefff RDI: ffff888105986800
    [  287.670634] RBP: ffffc90000433da0 R08: 0000000000000000 R09: c0000000ffffefff
    [  287.677771] R10: 0000000000000001 R11: ffffc90000433ba8 R12: ffff888105986800
    [  287.684907] R13: 0000000000000000 R14: fffffffffffffe00 R15: ffff888100b6b500
    [  287.692052] FS:  0000000000000000(0000) GS:ffff888277f80000(0000) knlGS:0000000000000000
    [  287.700149] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    [  287.705897] CR2: 0000000000000070 CR3: 000000000320a000 CR4: 0000000000350ee0
    [  287.713033] Call Trace:
    [  287.715498]  raid1d+0x6c/0xbbb [raid1]
    [  287.719256]  ? __schedule+0x1ff/0x760
    [  287.722930]  ? schedule+0x3b/0xb0
    [  287.726260]  ? schedule_timeout+0x1ed/0x290
    [  287.730456]  ? __switch_to+0x11f/0x400
    [  287.734219]  md_thread+0xe9/0x140 [md_mod]
    [  287.738328]  ? md_thread+0xe9/0x140 [md_mod]
    [  287.742601]  ? wait_woken+0x80/0x80
    [  287.746097]  ? md_register_thread+0xe0/0xe0 [md_mod]
    [  287.751064]  kthread+0x11a/0x140
    [  287.754300]  ? kthread_park+0x90/0x90
    [  287.757974]  ret_from_fork+0x1f/0x30

In fact, when raid1 array run fail, we need to do
md_unregister_thread() before raid1_free().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-31"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50715/">CVE-2022-50715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50715">CVE-2022-50715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255749">SUSE bug 1255749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50716</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50716" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50716" ref_url="https://www.suse.com/security/cve/CVE-2022-50716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out

syzkaller reported use-after-free with the stack trace like below [1]:

[   38.960489][    C3] ==================================================================
[   38.963216][    C3] BUG: KASAN: use-after-free in ar5523_cmd_tx_cb+0x220/0x240
[   38.964950][    C3] Read of size 8 at addr ffff888048e03450 by task swapper/3/0
[   38.966363][    C3]
[   38.967053][    C3] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 6.0.0-09039-ga6afa4199d3d-dirty #18
[   38.968464][    C3] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-1.fc36 04/01/2014
[   38.969959][    C3] Call Trace:
[   38.970841][    C3]  &lt;IRQ&gt;
[   38.971663][    C3]  dump_stack_lvl+0xfc/0x174
[   38.972620][    C3]  print_report.cold+0x2c3/0x752
[   38.973626][    C3]  ? ar5523_cmd_tx_cb+0x220/0x240
[   38.974644][    C3]  kasan_report+0xb1/0x1d0
[   38.975720][    C3]  ? ar5523_cmd_tx_cb+0x220/0x240
[   38.976831][    C3]  ar5523_cmd_tx_cb+0x220/0x240
[   38.978412][    C3]  __usb_hcd_giveback_urb+0x353/0x5b0
[   38.979755][    C3]  usb_hcd_giveback_urb+0x385/0x430
[   38.981266][    C3]  dummy_timer+0x140c/0x34e0
[   38.982925][    C3]  ? notifier_call_chain+0xb5/0x1e0
[   38.984761][    C3]  ? rcu_read_lock_sched_held+0xb/0x60
[   38.986242][    C3]  ? lock_release+0x51c/0x790
[   38.987323][    C3]  ? _raw_read_unlock_irqrestore+0x37/0x70
[   38.988483][    C3]  ? __wake_up_common_lock+0xde/0x130
[   38.989621][    C3]  ? reacquire_held_locks+0x4a0/0x4a0
[   38.990777][    C3]  ? lock_acquire+0x472/0x550
[   38.991919][    C3]  ? rcu_read_lock_sched_held+0xb/0x60
[   38.993138][    C3]  ? lock_acquire+0x472/0x550
[   38.994890][    C3]  ? dummy_urb_enqueue+0x860/0x860
[   38.996266][    C3]  ? do_raw_spin_unlock+0x16f/0x230
[   38.997670][    C3]  ? dummy_urb_enqueue+0x860/0x860
[   38.999116][    C3]  call_timer_fn+0x1a0/0x6a0
[   39.000668][    C3]  ? add_timer_on+0x4a0/0x4a0
[   39.002137][    C3]  ? reacquire_held_locks+0x4a0/0x4a0
[   39.003809][    C3]  ? __next_timer_interrupt+0x226/0x2a0
[   39.005509][    C3]  __run_timers.part.0+0x69a/0xac0
[   39.007025][    C3]  ? dummy_urb_enqueue+0x860/0x860
[   39.008716][    C3]  ? call_timer_fn+0x6a0/0x6a0
[   39.010254][    C3]  ? cpuacct_percpu_seq_show+0x10/0x10
[   39.011795][    C3]  ? kvm_sched_clock_read+0x14/0x40
[   39.013277][    C3]  ? sched_clock_cpu+0x69/0x2b0
[   39.014724][    C3]  run_timer_softirq+0xb6/0x1d0
[   39.016196][    C3]  __do_softirq+0x1d2/0x9be
[   39.017616][    C3]  __irq_exit_rcu+0xeb/0x190
[   39.019004][    C3]  irq_exit_rcu+0x5/0x20
[   39.020361][    C3]  sysvec_apic_timer_interrupt+0x8f/0xb0
[   39.021965][    C3]  &lt;/IRQ&gt;
[   39.023237][    C3]  &lt;TASK&gt;

In ar5523_probe(), ar5523_host_available() calls ar5523_cmd() as below
(there are other functions which finally call ar5523_cmd()):

ar5523_probe()
-&gt; ar5523_host_available()
   -&gt; ar5523_cmd_read()
      -&gt; ar5523_cmd()

If ar5523_cmd() timed out, then ar5523_host_available() failed and
ar5523_probe() freed the device structure.  So, ar5523_cmd_tx_cb()
might touch the freed structure.

This patch fixes this issue by canceling in-flight tx cmd if submitted
urb timed out.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-03"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50716/">CVE-2022-50716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50716">CVE-2022-50716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255839">SUSE bug 1255839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50718</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50718" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50718" ref_url="https://www.suse.com/security/cve/CVE-2022-50718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix pci device refcount leak

As comment of pci_get_domain_bus_and_slot() says, it returns
a pci device with refcount increment, when finish using it,
the caller must decrement the reference count by calling
pci_dev_put().

So before returning from amdgpu_device_resume|suspend_display_audio(),
pci_dev_put() is called to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-31"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50718/">CVE-2022-50718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50718">CVE-2022-50718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255750">SUSE bug 1255750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50725</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50725" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50725" ref_url="https://www.suse.com/security/cve/CVE-2022-50725" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: vidtv: Fix use-after-free in vidtv_bridge_dvb_init()

KASAN reports a use-after-free:
BUG: KASAN: use-after-free in dvb_dmxdev_release+0x4d5/0x5d0 [dvb_core]
Call Trace:
 ...
 dvb_dmxdev_release+0x4d5/0x5d0 [dvb_core]
 vidtv_bridge_probe+0x7bf/0xa40 [dvb_vidtv_bridge]
 platform_probe+0xb6/0x170
 ...
Allocated by task 1238:
 ...
 dvb_register_device+0x1a7/0xa70 [dvb_core]
 dvb_dmxdev_init+0x2af/0x4a0 [dvb_core]
 vidtv_bridge_probe+0x766/0xa40 [dvb_vidtv_bridge]
 ...
Freed by task 1238:
 dvb_register_device+0x6d2/0xa70 [dvb_core]
 dvb_dmxdev_init+0x2af/0x4a0 [dvb_core]
 vidtv_bridge_probe+0x766/0xa40 [dvb_vidtv_bridge]
 ...

It is because the error handling in vidtv_bridge_dvb_init() is wrong.

First, vidtv_bridge_dmx(dev)_init() will clean themselves when fail, but
goto fail_dmx(_dev): calls release functions again, which causes
use-after-free.

Also, in fail_fe, fail_tuner_probe and fail_demod_probe, j = i will cause
out-of-bound when i finished its loop (i == NUM_FE). And the loop
releasing is wrong, although now NUM_FE is 1 so it won't cause problem.

Fix this by correctly releasing everything.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50725/">CVE-2022-50725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50725">CVE-2022-50725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256036">SUSE bug 1256036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50726</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50726" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50726" ref_url="https://www.suse.com/security/cve/CVE-2022-50726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix possible use-after-free in async command interface

mlx5_cmd_cleanup_async_ctx should return only after all its callback
handlers were completed. Before this patch, the below race between
mlx5_cmd_cleanup_async_ctx and mlx5_cmd_exec_cb_handler was possible and
lead to a use-after-free:

1. mlx5_cmd_cleanup_async_ctx is called while num_inflight is 2 (i.e.
   elevated by 1, a single inflight callback).
2. mlx5_cmd_cleanup_async_ctx decreases num_inflight to 1.
3. mlx5_cmd_exec_cb_handler is called, decreases num_inflight to 0 and
   is about to call wake_up().
4. mlx5_cmd_cleanup_async_ctx calls wait_event, which returns
   immediately as the condition (num_inflight == 0) holds.
5. mlx5_cmd_cleanup_async_ctx returns.
6. The caller of mlx5_cmd_cleanup_async_ctx frees the mlx5_async_ctx
   object.
7. mlx5_cmd_exec_cb_handler goes on and calls wake_up() on the freed
   object.

Fix it by syncing using a completion object. Mark it completed when
num_inflight reaches 0.

Trace:

BUG: KASAN: use-after-free in do_raw_spin_lock+0x23d/0x270
Read of size 4 at addr ffff888139cd12f4 by task swapper/5/0

CPU: 5 PID: 0 Comm: swapper/5 Not tainted 6.0.0-rc3_for_upstream_debug_2022_08_30_13_10 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x57/0x7d
 print_report.cold+0x2d5/0x684
 ? do_raw_spin_lock+0x23d/0x270
 kasan_report+0xb1/0x1a0
 ? do_raw_spin_lock+0x23d/0x270
 do_raw_spin_lock+0x23d/0x270
 ? rwlock_bug.part.0+0x90/0x90
 ? __delete_object+0xb8/0x100
 ? lock_downgrade+0x6e0/0x6e0
 _raw_spin_lock_irqsave+0x43/0x60
 ? __wake_up_common_lock+0xb9/0x140
 __wake_up_common_lock+0xb9/0x140
 ? __wake_up_common+0x650/0x650
 ? destroy_tis_callback+0x53/0x70 [mlx5_core]
 ? kasan_set_track+0x21/0x30
 ? destroy_tis_callback+0x53/0x70 [mlx5_core]
 ? kfree+0x1ba/0x520
 ? do_raw_spin_unlock+0x54/0x220
 mlx5_cmd_exec_cb_handler+0x136/0x1a0 [mlx5_core]
 ? mlx5_cmd_cleanup_async_ctx+0x220/0x220 [mlx5_core]
 ? mlx5_cmd_cleanup_async_ctx+0x220/0x220 [mlx5_core]
 mlx5_cmd_comp_handler+0x65a/0x12b0 [mlx5_core]
 ? dump_command+0xcc0/0xcc0 [mlx5_core]
 ? lockdep_hardirqs_on_prepare+0x400/0x400
 ? cmd_comp_notifier+0x7e/0xb0 [mlx5_core]
 cmd_comp_notifier+0x7e/0xb0 [mlx5_core]
 atomic_notifier_call_chain+0xd7/0x1d0
 mlx5_eq_async_int+0x3ce/0xa20 [mlx5_core]
 atomic_notifier_call_chain+0xd7/0x1d0
 ? irq_release+0x140/0x140 [mlx5_core]
 irq_int_handler+0x19/0x30 [mlx5_core]
 __handle_irq_event_percpu+0x1f2/0x620
 handle_irq_event+0xb2/0x1d0
 handle_edge_irq+0x21e/0xb00
 __common_interrupt+0x79/0x1a0
 common_interrupt+0x78/0xa0
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 asm_common_interrupt+0x22/0x40
RIP: 0010:default_idle+0x42/0x60
Code: c1 83 e0 07 48 c1 e9 03 83 c0 03 0f b6 14 11 38 d0 7c 04 84 d2 75 14 8b 05 eb 47 22 02 85 c0 7e 07 0f 00 2d e0 9f 48 00 fb f4 &lt;c3&gt; 48 c7 c7 80 08 7f 85 e8 d1 d3 3e fe eb de 66 66 2e 0f 1f 84 00
RSP: 0018:ffff888100dbfdf0 EFLAGS: 00000242
RAX: 0000000000000001 RBX: ffffffff84ecbd48 RCX: 1ffffffff0afe110
RDX: 0000000000000004 RSI: 0000000000000000 RDI: ffffffff835cc9bc
RBP: 0000000000000005 R08: 0000000000000001 R09: ffff88881dec4ac3
R10: ffffed1103bd8958 R11: 0000017d0ca571c9 R12: 0000000000000005
R13: ffffffff84f024e0 R14: 0000000000000000 R15: dffffc0000000000
 ? default_idle_call+0xcc/0x450
 default_idle_call+0xec/0x450
 do_idle+0x394/0x450
 ? arch_cpu_idle_exit+0x40/0x40
 ? do_idle+0x17/0x450
 cpu_startup_entry+0x19/0x20
 start_secondary+0x221/0x2b0
 ? set_cpu_sibling_map+0x2070/0x2070
 secondary_startup_64_no_verify+0xcd/0xdb
 &lt;/TASK&gt;

Allocated by task 49502:
 kasan_save_stack+0x1e/0x40
 __kasan_kmalloc+0x81/0xa0
 kvmalloc_node+0x48/0xe0
 mlx5e_bulk_async_init+0x35/0x110 [mlx5_core]
 mlx5e_tls_priv_tx_list_cleanup+0x84/0x3e0 [mlx5_core]
 mlx5e_ktls_cleanup_tx+0x38f/0x760 [mlx5_core]
 mlx5e_cleanup_nic_tx+0xa7/0x100 [mlx5_core]
 mlx5e_detach_netdev+0x1c
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50726/">CVE-2022-50726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50726">CVE-2022-50726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256040">SUSE bug 1256040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256255">SUSE bug 1256255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50727</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50727" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50727" ref_url="https://www.suse.com/security/cve/CVE-2022-50727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: efct: Fix possible memleak in efct_device_init()

In efct_device_init(), when efct_scsi_reg_fc_transport() fails,
efct_scsi_tgt_driver_exit() is not called to release memory for
efct_scsi_tgt_driver_init() and causes memleak:

unreferenced object 0xffff8881020ce000 (size 2048):
  comm "modprobe", pid 465, jiffies 4294928222 (age 55.872s)
  backtrace:
    [&lt;0000000021a1ef1b&gt;] kmalloc_trace+0x27/0x110
    [&lt;000000004c3ed51c&gt;] target_register_template+0x4fd/0x7b0 [target_core_mod]
    [&lt;00000000f3393296&gt;] efct_scsi_tgt_driver_init+0x18/0x50 [efct]
    [&lt;00000000115de533&gt;] 0xffffffffc0d90011
    [&lt;00000000d608f646&gt;] do_one_initcall+0xd0/0x4e0
    [&lt;0000000067828cf1&gt;] do_init_module+0x1cc/0x6a0
    ...
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50727/">CVE-2022-50727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50727">CVE-2022-50727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256042">SUSE bug 1256042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50728</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50728" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50728" ref_url="https://www.suse.com/security/cve/CVE-2022-50728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/lcs: Fix return type of lcs_start_xmit()

With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG),
indirect call targets are validated against the expected function
pointer prototype to make sure the call target is valid to help mitigate
ROP attacks. If they are not identical, there is a failure at run time,
which manifests as either a kernel panic or thread getting killed. A
proposed warning in clang aims to catch these at compile time, which
reveals:

  drivers/s390/net/lcs.c:2090:21: error: incompatible function pointer types initializing 'netdev_tx_t (*)(struct sk_buff *, struct net_device *)' (aka 'enum netdev_tx (*)(struct sk_buff *, struct net_device *)') with an expression of type 'int (struct sk_buff *, struct net_device *)' [-Werror,-Wincompatible-function-pointer-types-strict]
          .ndo_start_xmit         = lcs_start_xmit,
                                    ^~~~~~~~~~~~~~
  drivers/s390/net/lcs.c:2097:21: error: incompatible function pointer types initializing 'netdev_tx_t (*)(struct sk_buff *, struct net_device *)' (aka 'enum netdev_tx (*)(struct sk_buff *, struct net_device *)') with an expression of type 'int (struct sk_buff *, struct net_device *)' [-Werror,-Wincompatible-function-pointer-types-strict]
          .ndo_start_xmit         = lcs_start_xmit,
                                    ^~~~~~~~~~~~~~

-&gt;ndo_start_xmit() in 'struct net_device_ops' expects a return type of
'netdev_tx_t', not 'int'. Adjust the return type of lcs_start_xmit() to
match the prototype's to resolve the warning and potential CFI failure,
should s390 select ARCH_SUPPORTS_CFI_CLANG in the future.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50728/">CVE-2022-50728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50728">CVE-2022-50728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256046">SUSE bug 1256046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50729</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50729" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50729" ref_url="https://www.suse.com/security/cve/CVE-2022-50729" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: Fix resource leak in ksmbd_session_rpc_open()

When ksmbd_rpc_open() fails then it must call ksmbd_rpc_id_free() to
undo the result of ksmbd_ipc_id_alloc().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-50729/">CVE-2022-50729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50729">CVE-2022-50729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256047">SUSE bug 1256047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50730</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50730" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50730" ref_url="https://www.suse.com/security/cve/CVE-2022-50730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: silence the warning when evicting inode with dioread_nolock

When evicting an inode with default dioread_nolock, it could be raced by
the unwritten extents converting kworker after writeback some new
allocated dirty blocks. It convert unwritten extents to written, the
extents could be merged to upper level and free extent blocks, so it
could mark the inode dirty again even this inode has been marked
I_FREEING. But the inode-&gt;i_io_list check and warning in
ext4_evict_inode() missing this corner case. Fortunately,
ext4_evict_inode() will wait all extents converting finished before this
check, so it will not lead to inode use-after-free problem, every thing
is OK besides this warning. The WARN_ON_ONCE was originally designed
for finding inode use-after-free issues in advance, but if we add
current dioread_nolock case in, it will become not quite useful, so fix
this warning by just remove this check.

 ======
 WARNING: CPU: 7 PID: 1092 at fs/ext4/inode.c:227
 ext4_evict_inode+0x875/0xc60
 ...
 RIP: 0010:ext4_evict_inode+0x875/0xc60
 ...
 Call Trace:
  &lt;TASK&gt;
  evict+0x11c/0x2b0
  iput+0x236/0x3a0
  do_unlinkat+0x1b4/0x490
  __x64_sys_unlinkat+0x4c/0xb0
  do_syscall_64+0x3b/0x90
  entry_SYSCALL_64_after_hwframe+0x46/0xb0
 RIP: 0033:0x7fa933c1115b
 ======

rm                          kworker
                            ext4_end_io_end()
vfs_unlink()
 ext4_unlink()
                             ext4_convert_unwritten_io_end_vec()
                              ext4_convert_unwritten_extents()
                               ext4_map_blocks()
                                ext4_ext_map_blocks()
                                 ext4_ext_try_to_merge_up()
                                  __mark_inode_dirty()
                                   check !I_FREEING
                                   locked_inode_to_wb_and_lock_list()
 iput()
  iput_final()
   evict()
    ext4_evict_inode()
     truncate_inode_pages_final() //wait release io_end
                                    inode_io_list_move_locked()
                             ext4_release_io_end()
     trigger WARN_ON_ONCE()
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50730/">CVE-2022-50730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50730">CVE-2022-50730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256048">SUSE bug 1256048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50731</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50731" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50731" ref_url="https://www.suse.com/security/cve/CVE-2022-50731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: akcipher - default implementation for setting a private key

Changes from v1:
  * removed the default implementation from set_pub_key: it is assumed that
    an implementation must always have this callback defined as there are
    no use case for an algorithm, which doesn't need a public key

Many akcipher implementations (like ECDSA) support only signature
verifications, so they don't have all callbacks defined.

Commit 78a0324f4a53 ("crypto: akcipher - default implementations for
request callbacks") introduced default callbacks for sign/verify
operations, which just return an error code.

However, these are not enough, because before calling sign the caller would
likely call set_priv_key first on the instantiated transform (as the
in-kernel testmgr does). This function does not have a default stub, so the
kernel crashes, when trying to set a private key on an akcipher, which
doesn't support signature generation.

I've noticed this, when trying to add a KAT vector for ECDSA signature to
the testmgr.

With this patch the testmgr returns an error in dmesg (as it should)
instead of crashing the kernel NULL ptr dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50731/">CVE-2022-50731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50731">CVE-2022-50731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256049">SUSE bug 1256049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50734</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50734" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50734" ref_url="https://www.suse.com/security/cve/CVE-2022-50734" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmem: core: Fix memleak in nvmem_register()

dev_set_name will alloc memory for nvmem-&gt;dev.kobj.name in
nvmem_register, when nvmem_validate_keepouts failed, nvmem's
memory will be freed and return, but nobody will free memory
for nvmem-&gt;dev.kobj.name, there will be memleak, so moving
nvmem_validate_keepouts() after device_register() and let
the device core deal with cleaning name in error cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50734/">CVE-2022-50734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50734">CVE-2022-50734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256073">SUSE bug 1256073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50735</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50735" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50735" ref_url="https://www.suse.com/security/cve/CVE-2022-50735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: do not run mt76u_status_worker if the device is not running

Fix the following NULL pointer dereference avoiding to run
mt76u_status_worker thread if the device is not running yet.

KASAN: null-ptr-deref in range
[0x0000000000000000-0x0000000000000007]
CPU: 0 PID: 98 Comm: kworker/u2:2 Not tainted 5.14.0+ #78 Hardware
name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014
Workqueue: mt76 mt76u_tx_status_data
RIP: 0010:mt76x02_mac_fill_tx_status.isra.0+0x82c/0x9e0
Code: c5 48 b8 00 00 00 00 00 fc ff df 80 3c 02 00 0f 85 94 01 00 00
48 b8 00 00 00 00 00 fc ff df 4d 8b 34 24 4c 89 f2 48 c1 ea 03 &lt;0f&gt;
b6
04 02 84 c0 74 08 3c 03 0f 8e 89 01 00 00 41 8b 16 41 0f b7
RSP: 0018:ffffc900005af988 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffffc900005afae8 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff832fc661 RDI: ffffc900005afc2a
RBP: ffffc900005afae0 R08: 0000000000000001 R09: fffff520000b5f3c
R10: 0000000000000003 R11: fffff520000b5f3b R12: ffff88810b6132d8
R13: 000000000000ffff R14: 0000000000000000 R15: ffffc900005afc28
FS:  0000000000000000(0000) GS:ffff88811aa00000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fa0eda6a000 CR3: 0000000118f17000 CR4: 0000000000750ef0
PKRU: 55555554
Call Trace:
 mt76x02_send_tx_status+0x1d2/0xeb0
 mt76x02_tx_status_data+0x8e/0xd0
 mt76u_tx_status_data+0xe1/0x240
 process_one_work+0x92b/0x1460
 worker_thread+0x95/0xe00
 kthread+0x3a1/0x480
 ret_from_fork+0x1f/0x30
Modules linked in:
--[ end trace 8df5d20fc5040f65 ]--
RIP: 0010:mt76x02_mac_fill_tx_status.isra.0+0x82c/0x9e0
Code: c5 48 b8 00 00 00 00 00 fc ff df 80 3c 02 00 0f 85 94 01 00 00
48 b8 00 00 00 00 00 fc ff df 4d 8b 34 24 4c 89 f2 48 c1 ea 03 &lt;0f&gt;
b6
04 02 84 c0 74 08 3c 03 0f 8e 89 01 00 00 41 8b 16 41 0f b7
RSP: 0018:ffffc900005af988 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffffc900005afae8 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff832fc661 RDI: ffffc900005afc2a
RBP: ffffc900005afae0 R08: 0000000000000001 R09: fffff520000b5f3c
R10: 0000000000000003 R11: fffff520000b5f3b R12: ffff88810b6132d8
R13: 000000000000ffff R14: 0000000000000000 R15: ffffc900005afc28
FS:  0000000000000000(0000) GS:ffff88811aa00000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fa0eda6a000 CR3: 0000000118f17000 CR4: 0000000000750ef0
PKRU: 55555554

Moreover move stat_work schedule out of the for loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50735/">CVE-2022-50735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50735">CVE-2022-50735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256141">SUSE bug 1256141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50736</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50736" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50736" ref_url="https://www.suse.com/security/cve/CVE-2022-50736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Fix immediate work request flush to completion queue

Correctly set send queue element opcode during immediate work request
flushing in post sendqueue operation, if the QP is in ERROR state.
An undefined ocode value results in out-of-bounds access to an array
for mapping the opcode between siw internal and RDMA core representation
in work completion generation. It resulted in a KASAN BUG report
of type 'global-out-of-bounds' during NFSoRDMA testing.

This patch further fixes a potential case of a malicious user which may
write undefined values for completion queue elements status or opcode,
if the CQ is memory mapped to user land. It avoids the same out-of-bounds
access to arrays for status and opcode mapping as described above.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50736/">CVE-2022-50736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50736">CVE-2022-50736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256137">SUSE bug 1256137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256138">SUSE bug 1256138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50737</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50737" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50737" ref_url="https://www.suse.com/security/cve/CVE-2022-50737" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Validate index root when initialize NTFS security

This enhances the sanity check for $SDH and $SII while initializing NTFS
security, guarantees these index root are legit.

[  162.459513] BUG: KASAN: use-after-free in hdr_find_e.isra.0+0x10c/0x320
[  162.460176] Read of size 2 at addr ffff8880037bca99 by task mount/243
[  162.460851]
[  162.461252] CPU: 0 PID: 243 Comm: mount Not tainted 6.0.0-rc7 #42
[  162.461744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[  162.462609] Call Trace:
[  162.462954]  &lt;TASK&gt;
[  162.463276]  dump_stack_lvl+0x49/0x63
[  162.463822]  print_report.cold+0xf5/0x689
[  162.464608]  ? unwind_get_return_address+0x3a/0x60
[  162.465766]  ? hdr_find_e.isra.0+0x10c/0x320
[  162.466975]  kasan_report+0xa7/0x130
[  162.467506]  ? _raw_spin_lock_irq+0xc0/0xf0
[  162.467998]  ? hdr_find_e.isra.0+0x10c/0x320
[  162.468536]  __asan_load2+0x68/0x90
[  162.468923]  hdr_find_e.isra.0+0x10c/0x320
[  162.469282]  ? cmp_uints+0xe0/0xe0
[  162.469557]  ? cmp_sdh+0x90/0x90
[  162.469864]  ? ni_find_attr+0x214/0x300
[  162.470217]  ? ni_load_mi+0x80/0x80
[  162.470479]  ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  162.470931]  ? ntfs_bread_run+0x190/0x190
[  162.471307]  ? indx_get_root+0xe4/0x190
[  162.471556]  ? indx_get_root+0x140/0x190
[  162.471833]  ? indx_init+0x1e0/0x1e0
[  162.472069]  ? fnd_clear+0x115/0x140
[  162.472363]  ? _raw_spin_lock_irqsave+0x100/0x100
[  162.472731]  indx_find+0x184/0x470
[  162.473461]  ? sysvec_apic_timer_interrupt+0x57/0xc0
[  162.474429]  ? indx_find_buffer+0x2d0/0x2d0
[  162.474704]  ? do_syscall_64+0x3b/0x90
[  162.474962]  dir_search_u+0x196/0x2f0
[  162.475381]  ? ntfs_nls_to_utf16+0x450/0x450
[  162.475661]  ? ntfs_security_init+0x3d6/0x440
[  162.475906]  ? is_sd_valid+0x180/0x180
[  162.476191]  ntfs_extend_init+0x13f/0x2c0
[  162.476496]  ? ntfs_fix_post_read+0x130/0x130
[  162.476861]  ? iput.part.0+0x286/0x320
[  162.477325]  ntfs_fill_super+0x11e0/0x1b50
[  162.477709]  ? put_ntfs+0x1d0/0x1d0
[  162.477970]  ? vsprintf+0x20/0x20
[  162.478258]  ? set_blocksize+0x95/0x150
[  162.478538]  get_tree_bdev+0x232/0x370
[  162.478789]  ? put_ntfs+0x1d0/0x1d0
[  162.479038]  ntfs_fs_get_tree+0x15/0x20
[  162.479374]  vfs_get_tree+0x4c/0x130
[  162.479729]  path_mount+0x654/0xfe0
[  162.480124]  ? putname+0x80/0xa0
[  162.480484]  ? finish_automount+0x2e0/0x2e0
[  162.480894]  ? putname+0x80/0xa0
[  162.481467]  ? kmem_cache_free+0x1c4/0x440
[  162.482280]  ? putname+0x80/0xa0
[  162.482714]  do_mount+0xd6/0xf0
[  162.483264]  ? path_mount+0xfe0/0xfe0
[  162.484782]  ? __kasan_check_write+0x14/0x20
[  162.485593]  __x64_sys_mount+0xca/0x110
[  162.486024]  do_syscall_64+0x3b/0x90
[  162.486543]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  162.487141] RIP: 0033:0x7f9d374e948a
[  162.488324] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008
[  162.489728] RSP: 002b:00007ffe30e73d18 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  162.490971] RAX: ffffffffffffffda RBX: 0000561cdb43a060 RCX: 00007f9d374e948a
[  162.491669] RDX: 0000561cdb43a260 RSI: 0000561cdb43a2e0 RDI: 0000561cdb442af0
[  162.492050] RBP: 0000000000000000 R08: 0000561cdb43a280 R09: 0000000000000020
[  162.492459] R10: 00000000c0ed0000 R11: 0000000000000206 R12: 0000561cdb442af0
[  162.493183] R13: 0000561cdb43a260 R14: 0000000000000000 R15: 00000000ffffffff
[  162.493644]  &lt;/TASK&gt;
[  162.493908]
[  162.494214] The buggy address belongs to the physical page:
[  162.494761] page:000000003e38a3d5 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x37bc
[  162.496064] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff)
[  162.497278] raw: 000fffffc0000000 ffffea00000df1c8 ffffea00000df008 0000000000000000
[  162.498928] raw: 0000000000000000 0000000000240000 0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50737/">CVE-2022-50737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50737">CVE-2022-50737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256134">SUSE bug 1256134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256135">SUSE bug 1256135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50738</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50738" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50738" ref_url="https://www.suse.com/security/cve/CVE-2022-50738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost-vdpa: fix an iotlb memory leak

Before commit 3d5698793897 ("vhost-vdpa: introduce asid based IOTLB")
we called vhost_vdpa_iotlb_unmap(v, iotlb, 0ULL, 0ULL - 1) during
release to free all the resources allocated when processing user IOTLB
messages through vhost_vdpa_process_iotlb_update().
That commit changed the handling of IOTLB a bit, and we accidentally
removed some code called during the release.

We partially fixed this with commit 037d4305569a ("vhost-vdpa: call
vhost_vdpa_cleanup during the release") but a potential memory leak is
still there as showed by kmemleak if the application does not send
VHOST_IOTLB_INVALIDATE or crashes:

  unreferenced object 0xffff888007fbaa30 (size 16):
    comm "blkio-bench", pid 914, jiffies 4294993521 (age 885.500s)
    hex dump (first 16 bytes):
      40 73 41 07 80 88 ff ff 00 00 00 00 00 00 00 00  @sA.............
    backtrace:
      [&lt;0000000087736d2a&gt;] kmem_cache_alloc_trace+0x142/0x1c0
      [&lt;0000000060740f50&gt;] vhost_vdpa_process_iotlb_msg+0x68c/0x901 [vhost_vdpa]
      [&lt;0000000083e8e205&gt;] vhost_chr_write_iter+0xc0/0x4a0 [vhost]
      [&lt;000000008f2f414a&gt;] vhost_vdpa_chr_write_iter+0x18/0x20 [vhost_vdpa]
      [&lt;00000000de1cd4a0&gt;] vfs_write+0x216/0x4b0
      [&lt;00000000a2850200&gt;] ksys_write+0x71/0xf0
      [&lt;00000000de8e720b&gt;] __x64_sys_write+0x19/0x20
      [&lt;0000000018b12cbb&gt;] do_syscall_64+0x3f/0x90
      [&lt;00000000986ec465&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd

Let's fix this calling vhost_vdpa_iotlb_unmap() on the whole range in
vhost_vdpa_remove_as(). We move that call before vhost_dev_cleanup()
since we need a valid v-&gt;vdev.mm in vhost_vdpa_pa_unmap().
vhost_iotlb_reset() call can be removed, since vhost_vdpa_iotlb_unmap()
on the whole range removes all the entries.

The kmemleak log reported was observed with a vDPA device that has `use_va`
set to true (e.g. VDUSE). This patch has been tested with both types of
devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50738/">CVE-2022-50738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50738">CVE-2022-50738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256111">SUSE bug 1256111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50739</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50739" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50739" ref_url="https://www.suse.com/security/cve/CVE-2022-50739" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Add null pointer check for inode operations

This adds a sanity check for the i_op pointer of the inode which is
returned after reading Root directory MFT record. We should check the
i_op is valid before trying to create the root dentry, otherwise we may
encounter a NPD while mounting a image with a funny Root directory MFT
record.

[  114.484325] BUG: kernel NULL pointer dereference, address: 0000000000000008
[  114.484811] #PF: supervisor read access in kernel mode
[  114.485084] #PF: error_code(0x0000) - not-present page
[  114.485606] PGD 0 P4D 0
[  114.485975] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI
[  114.486570] CPU: 0 PID: 237 Comm: mount Tainted: G    B              6.0.0-rc4 #28
[  114.486977] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[  114.488169] RIP: 0010:d_flags_for_inode+0xe0/0x110
[  114.488816] Code: 24 f7 ff 49 83 3e 00 74 41 41 83 cd 02 66 44 89 6b 02 eb 92 48 8d 7b 20 e8 6d 24 f7 ff 4c 8b 73 20 49 8d 7e 08 e8 60 241
[  114.490326] RSP: 0018:ffff8880065e7aa8 EFLAGS: 00000296
[  114.490695] RAX: 0000000000000001 RBX: ffff888008ccd750 RCX: ffffffff84af2aea
[  114.490986] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff87abd020
[  114.491364] RBP: ffff8880065e7ac8 R08: 0000000000000001 R09: fffffbfff0f57a05
[  114.491675] R10: ffffffff87abd027 R11: fffffbfff0f57a04 R12: 0000000000000000
[  114.491954] R13: 0000000000000008 R14: 0000000000000000 R15: ffff888008ccd750
[  114.492397] FS:  00007fdc8a627e40(0000) GS:ffff888058200000(0000) knlGS:0000000000000000
[  114.492797] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  114.493150] CR2: 0000000000000008 CR3: 00000000013ba000 CR4: 00000000000006f0
[  114.493671] Call Trace:
[  114.493890]  &lt;TASK&gt;
[  114.494075]  __d_instantiate+0x24/0x1c0
[  114.494505]  d_instantiate.part.0+0x35/0x50
[  114.494754]  d_make_root+0x53/0x80
[  114.494998]  ntfs_fill_super+0x1232/0x1b50
[  114.495260]  ? put_ntfs+0x1d0/0x1d0
[  114.495499]  ? vsprintf+0x20/0x20
[  114.495723]  ? set_blocksize+0x95/0x150
[  114.495964]  get_tree_bdev+0x232/0x370
[  114.496272]  ? put_ntfs+0x1d0/0x1d0
[  114.496502]  ntfs_fs_get_tree+0x15/0x20
[  114.496859]  vfs_get_tree+0x4c/0x130
[  114.497099]  path_mount+0x654/0xfe0
[  114.497507]  ? putname+0x80/0xa0
[  114.497933]  ? finish_automount+0x2e0/0x2e0
[  114.498362]  ? putname+0x80/0xa0
[  114.498571]  ? kmem_cache_free+0x1c4/0x440
[  114.498819]  ? putname+0x80/0xa0
[  114.499069]  do_mount+0xd6/0xf0
[  114.499343]  ? path_mount+0xfe0/0xfe0
[  114.499683]  ? __kasan_check_write+0x14/0x20
[  114.500133]  __x64_sys_mount+0xca/0x110
[  114.500592]  do_syscall_64+0x3b/0x90
[  114.500930]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  114.501294] RIP: 0033:0x7fdc898e948a
[  114.501542] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008
[  114.502716] RSP: 002b:00007ffd793e58f8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5
[  114.503175] RAX: ffffffffffffffda RBX: 0000564b2228f060 RCX: 00007fdc898e948a
[  114.503588] RDX: 0000564b2228f260 RSI: 0000564b2228f2e0 RDI: 0000564b22297ce0
[  114.504925] RBP: 0000000000000000 R08: 0000564b2228f280 R09: 0000000000000020
[  114.505484] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564b22297ce0
[  114.505823] R13: 0000564b2228f260 R14: 0000000000000000 R15: 00000000ffffffff
[  114.506562]  &lt;/TASK&gt;
[  114.506887] Modules linked in:
[  114.507648] CR2: 0000000000000008
[  114.508884] ---[ end trace 0000000000000000 ]---
[  114.509675] RIP: 0010:d_flags_for_inode+0xe0/0x110
[  114.510140] Code: 24 f7 ff 49 83 3e 00 74 41 41 83 cd 02 66 44 89 6b 02 eb 92 48 8d 7b 20 e8 6d 24 f7 ff 4c 8b 73 20 49 8d 7e 08 e8 60 241
[  114.511762] RSP: 0018:ffff8880065e7aa8 EFLAGS: 00000296
[  114.512401] RAX: 0000000000000001 RBX: ffff888008ccd750 RCX: ffffffff84af2aea
[  114.51
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50739/">CVE-2022-50739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50739">CVE-2022-50739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256190">SUSE bug 1256190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50740</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50740" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50740" ref_url="https://www.suse.com/security/cve/CVE-2022-50740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: hif_usb: fix memory leak of urbs in ath9k_hif_usb_dealloc_tx_urbs()

Syzkaller reports a long-known leak of urbs in
ath9k_hif_usb_dealloc_tx_urbs().

The cause of the leak is that usb_get_urb() is called but usb_free_urb()
(or usb_put_urb()) is not called inside usb_kill_urb() as urb-&gt;dev or
urb-&gt;ep fields have not been initialized and usb_kill_urb() returns
immediately.

The patch removes trying to kill urbs located in hif_dev-&gt;tx.tx_buf
because hif_dev-&gt;tx.tx_buf is not supposed to contain urbs which are in
pending state (the pending urbs are stored in hif_dev-&gt;tx.tx_pending).
The tx.tx_lock is acquired so there should not be any changes in the list.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50740/">CVE-2022-50740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50740">CVE-2022-50740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256155">SUSE bug 1256155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50741</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50741" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50741" ref_url="https://www.suse.com/security/cve/CVE-2022-50741" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: imx-jpeg: Disable useless interrupt to avoid kernel panic

There is a hardware bug that the interrupt STMBUF_HALF may be triggered
after or when disable interrupt.
It may led to unexpected kernel panic.
And interrupt STMBUF_HALF and STMBUF_RTND have no other effect.
So disable them and the unused interrupts.

meanwhile clear the interrupt status when disable interrupt.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50741/">CVE-2022-50741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50741">CVE-2022-50741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256147">SUSE bug 1256147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50742</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50742" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50742" ref_url="https://www.suse.com/security/cve/CVE-2022-50742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: ocxl: fix possible refcount leak in afu_ioctl()

eventfd_ctx_put need to be called to put the refcount that gotten by
eventfd_ctx_fdget when ocxl_irq_set_handler fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50742/">CVE-2022-50742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50742">CVE-2022-50742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256143">SUSE bug 1256143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50743</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50743" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50743" ref_url="https://www.suse.com/security/cve/CVE-2022-50743" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: Fix pcluster memleak when its block address is zero

syzkaller reported a memleak:
https://syzkaller.appspot.com/bug?id=62f37ff612f0021641eda5b17f056f1668aa9aed

unreferenced object 0xffff88811009c7f8 (size 136):
  ...
  backtrace:
    [&lt;ffffffff821db19b&gt;] z_erofs_do_read_page+0x99b/0x1740
    [&lt;ffffffff821dee9e&gt;] z_erofs_readahead+0x24e/0x580
    [&lt;ffffffff814bc0d6&gt;] read_pages+0x86/0x3d0
    ...

syzkaller constructed a case: in z_erofs_register_pcluster(),
ztailpacking = false and map-&gt;m_pa = zero. This makes pcl-&gt;obj.index be
zero although pcl is not a inline pcluster.

Then following path adds refcount for grp, but the refcount won't be put
because pcl is inline.

z_erofs_readahead()
  z_erofs_do_read_page() # for another page
    z_erofs_collector_begin()
      erofs_find_workgroup()
        erofs_workgroup_get()

Since it's illegal for the block address of a non-inlined pcluster to
be zero, add check here to avoid registering the pcluster which would
be leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50743/">CVE-2022-50743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50743">CVE-2022-50743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256169">SUSE bug 1256169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50744</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50744" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50744" ref_url="https://www.suse.com/security/cve/CVE-2022-50744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs

During I/O and simultaneous cat of /sys/kernel/debug/lpfc/fnX/rx_monitor, a
hard lockup similar to the call trace below may occur.

The spin_lock_bh in lpfc_rx_monitor_report is not protecting from timer
interrupts as expected, so change the strength of the spin lock to _irq.

Kernel panic - not syncing: Hard LOCKUP
CPU: 3 PID: 110402 Comm: cat Kdump: loaded

exception RIP: native_queued_spin_lock_slowpath+91

[IRQ stack]
 native_queued_spin_lock_slowpath at ffffffffb814e30b
 _raw_spin_lock at ffffffffb89a667a
 lpfc_rx_monitor_record at ffffffffc0a73a36 [lpfc]
 lpfc_cmf_timer at ffffffffc0abbc67 [lpfc]
 __hrtimer_run_queues at ffffffffb8184250
 hrtimer_interrupt at ffffffffb8184ab0
 smp_apic_timer_interrupt at ffffffffb8a026ba
 apic_timer_interrupt at ffffffffb8a01c4f
[End of IRQ stack]

 apic_timer_interrupt at ffffffffb8a01c4f
 lpfc_rx_monitor_report at ffffffffc0a73c80 [lpfc]
 lpfc_rx_monitor_read at ffffffffc0addde1 [lpfc]
 full_proxy_read at ffffffffb83e7fc3
 vfs_read at ffffffffb833fe71
 ksys_read at ffffffffb83402af
 do_syscall_64 at ffffffffb800430b
 entry_SYSCALL_64_after_hwframe at ffffffffb8a000ad
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50744/">CVE-2022-50744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50744">CVE-2022-50744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256165">SUSE bug 1256165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50745</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50745" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50745" ref_url="https://www.suse.com/security/cve/CVE-2022-50745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: media: tegra-video: fix device_node use after free

At probe time this code path is followed:

 * tegra_csi_init
   * tegra_csi_channels_alloc
     * for_each_child_of_node(node, channel) -- iterates over channels
       * automatically gets 'channel'
         * tegra_csi_channel_alloc()
           * saves into chan-&gt;of_node a pointer to the channel OF node
       * automatically gets and puts 'channel'
       * now the node saved in chan-&gt;of_node has refcount 0, can disappear
   * tegra_csi_channels_init
     * iterates over channels
       * tegra_csi_channel_init -- uses chan-&gt;of_node

After that, chan-&gt;of_node keeps storing the node until the device is
removed.

of_node_get() the node and of_node_put() it during teardown to avoid any
risk.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50745/">CVE-2022-50745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50745">CVE-2022-50745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256158">SUSE bug 1256158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256159">SUSE bug 1256159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50746</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50746" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50746" ref_url="https://www.suse.com/security/cve/CVE-2022-50746" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: validate the extent length for uncompressed pclusters

syzkaller reported a KASAN use-after-free:
https://syzkaller.appspot.com/bug?extid=2ae90e873e97f1faf6f2

The referenced fuzzed image actually has two issues:
 - m_pa == 0 as a non-inlined pcluster;
 - The logical length is longer than its physical length.

The first issue has already been addressed.  This patch addresses
the second issue by checking the extent length validity.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50746/">CVE-2022-50746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50746">CVE-2022-50746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256171">SUSE bug 1256171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256176">SUSE bug 1256176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50748</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50748" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50748" ref_url="https://www.suse.com/security/cve/CVE-2022-50748" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipc: mqueue: fix possible memory leak in init_mqueue_fs()

commit db7cfc380900 ("ipc: Free mq_sysctls if ipc namespace creation
failed")

Here's a similar memory leak to the one fixed by the patch above.
retire_mq_sysctls need to be called when init_mqueue_fs fails after
setup_mq_sysctls.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50748/">CVE-2022-50748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50748">CVE-2022-50748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256195">SUSE bug 1256195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50749</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50749" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50749" ref_url="https://www.suse.com/security/cve/CVE-2022-50749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

acct: fix potential integer overflow in encode_comp_t()

The integer overflow is descripted with following codes:
  &gt; 317 static comp_t encode_comp_t(u64 value)
  &gt; 318 {
  &gt; 319         int exp, rnd;
    ......
  &gt; 341         exp &lt;&lt;= MANTSIZE;
  &gt; 342         exp += value;
  &gt; 343         return exp;
  &gt; 344 }

Currently comp_t is defined as type of '__u16', but the variable 'exp' is
type of 'int', so overflow would happen when variable 'exp' in line 343 is
greater than 65535.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50749/">CVE-2022-50749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50749">CVE-2022-50749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256191">SUSE bug 1256191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50750</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50750" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50750" ref_url="https://www.suse.com/security/cve/CVE-2022-50750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panel/panel-sitronix-st7701: Remove panel on DSI attach failure

In case mipi_dsi_attach() fails, call drm_panel_remove() to
avoid memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50750/">CVE-2022-50750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50750">CVE-2022-50750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256188">SUSE bug 1256188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50751</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50751" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50751" ref_url="https://www.suse.com/security/cve/CVE-2022-50751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

configfs: fix possible memory leak in configfs_create_dir()

kmemleak reported memory leaks in configfs_create_dir():

unreferenced object 0xffff888009f6af00 (size 192):
  comm "modprobe", pid 3777, jiffies 4295537735 (age 233.784s)
  backtrace:
    kmem_cache_alloc (mm/slub.c:3250 mm/slub.c:3256 mm/slub.c:3263 mm/slub.c:3273)
    new_fragment (./include/linux/slab.h:600 fs/configfs/dir.c:163)
    configfs_register_subsystem (fs/configfs/dir.c:1857)
    basic_write (drivers/hwtracing/stm/p_basic.c:14) stm_p_basic
    do_one_initcall (init/main.c:1296)
    do_init_module (kernel/module/main.c:2455)
    ...

unreferenced object 0xffff888003ba7180 (size 96):
  comm "modprobe", pid 3777, jiffies 4295537735 (age 233.784s)
  backtrace:
    kmem_cache_alloc (mm/slub.c:3250 mm/slub.c:3256 mm/slub.c:3263 mm/slub.c:3273)
    configfs_new_dirent (./include/linux/slab.h:723 fs/configfs/dir.c:194)
    configfs_make_dirent (fs/configfs/dir.c:248)
    configfs_create_dir (fs/configfs/dir.c:296)
    configfs_attach_group.isra.28 (fs/configfs/dir.c:816 fs/configfs/dir.c:852)
    configfs_register_subsystem (fs/configfs/dir.c:1881)
    basic_write (drivers/hwtracing/stm/p_basic.c:14) stm_p_basic
    do_one_initcall (init/main.c:1296)
    do_init_module (kernel/module/main.c:2455)
    ...

This is because the refcount is not correct in configfs_make_dirent().
For normal stage, the refcount is changing as:

configfs_register_subsystem()
  configfs_create_dir()
    configfs_make_dirent()
      configfs_new_dirent() # set s_count = 1
      dentry-&gt;d_fsdata = configfs_get(sd); # s_count = 2
...
configfs_unregister_subsystem()
  configfs_remove_dir()
    remove_dir()
      configfs_remove_dirent() # s_count = 1
    dput() ...
      *dentry_unlink_inode()*
        configfs_d_iput() # s_count = 0, release

However, if we failed in configfs_create():

configfs_register_subsystem()
  configfs_create_dir()
    configfs_make_dirent() # s_count = 2
    ...
    configfs_create() # fail
    -&gt;out_remove:
    configfs_remove_dirent(dentry)
      configfs_put(sd) # s_count = 1
      return PTR_ERR(inode);

There is no inode in the error path, so the configfs_d_iput() is lost
and makes sd and fragment memory leaked.

To fix this, when we failed in configfs_create(), manually call
configfs_put(sd) to keep the refcount correct.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50751/">CVE-2022-50751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50751">CVE-2022-50751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256184">SUSE bug 1256184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50752</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50752" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50752" ref_url="https://www.suse.com/security/cve/CVE-2022-50752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid5: Remove unnecessary bio_put() in raid5_read_one_chunk()

When running chunk-sized reads on disks with badblocks duplicate bio
free/puts are observed:

   =============================================================================
   BUG bio-200 (Not tainted): Object already free
   -----------------------------------------------------------------------------
   Allocated in mempool_alloc_slab+0x17/0x20 age=3 cpu=2 pid=7504
    __slab_alloc.constprop.0+0x5a/0xb0
    kmem_cache_alloc+0x31e/0x330
    mempool_alloc_slab+0x17/0x20
    mempool_alloc+0x100/0x2b0
    bio_alloc_bioset+0x181/0x460
    do_mpage_readpage+0x776/0xd00
    mpage_readahead+0x166/0x320
    blkdev_readahead+0x15/0x20
    read_pages+0x13f/0x5f0
    page_cache_ra_unbounded+0x18d/0x220
    force_page_cache_ra+0x181/0x1c0
    page_cache_sync_ra+0x65/0xb0
    filemap_get_pages+0x1df/0xaf0
    filemap_read+0x1e1/0x700
    blkdev_read_iter+0x1e5/0x330
    vfs_read+0x42a/0x570
   Freed in mempool_free_slab+0x17/0x20 age=3 cpu=2 pid=7504
    kmem_cache_free+0x46d/0x490
    mempool_free_slab+0x17/0x20
    mempool_free+0x66/0x190
    bio_free+0x78/0x90
    bio_put+0x100/0x1a0
    raid5_make_request+0x2259/0x2450
    md_handle_request+0x402/0x600
    md_submit_bio+0xd9/0x120
    __submit_bio+0x11f/0x1b0
    submit_bio_noacct_nocheck+0x204/0x480
    submit_bio_noacct+0x32e/0xc70
    submit_bio+0x98/0x1a0
    mpage_readahead+0x250/0x320
    blkdev_readahead+0x15/0x20
    read_pages+0x13f/0x5f0
    page_cache_ra_unbounded+0x18d/0x220
   Slab 0xffffea000481b600 objects=21 used=0 fp=0xffff8881206d8940 flags=0x17ffffc0010201(locked|slab|head|node=0|zone=2|lastcpupid=0x1fffff)
   CPU: 0 PID: 34525 Comm: kworker/u24:2 Not tainted 6.0.0-rc2-localyes-265166-gf11c5343fa3f #143
   Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-1ubuntu1.1 04/01/2014
   Workqueue: raid5wq raid5_do_work
   Call Trace:
    &lt;TASK&gt;
    dump_stack_lvl+0x5a/0x78
    dump_stack+0x10/0x16
    print_trailer+0x158/0x165
    object_err+0x35/0x50
    free_debug_processing.cold+0xb7/0xbe
    __slab_free+0x1ae/0x330
    kmem_cache_free+0x46d/0x490
    mempool_free_slab+0x17/0x20
    mempool_free+0x66/0x190
    bio_free+0x78/0x90
    bio_put+0x100/0x1a0
    mpage_end_io+0x36/0x150
    bio_endio+0x2fd/0x360
    md_end_io_acct+0x7e/0x90
    bio_endio+0x2fd/0x360
    handle_failed_stripe+0x960/0xb80
    handle_stripe+0x1348/0x3760
    handle_active_stripes.constprop.0+0x72a/0xaf0
    raid5_do_work+0x177/0x330
    process_one_work+0x616/0xb20
    worker_thread+0x2bd/0x6f0
    kthread+0x179/0x1b0
    ret_from_fork+0x22/0x30
    &lt;/TASK&gt;

The double free is caused by an unnecessary bio_put() in the
if(is_badblock(...)) error path in raid5_read_one_chunk().

The error path was moved ahead of bio_alloc_clone() in c82aa1b76787c
("md/raid5: move checking badblock before clone bio in
raid5_read_one_chunk"). The previous code checked and freed align_bio
which required a bio_put. After the move that is no longer needed as
raid_bio is returned to the control of the common io path which
performs its own endio resulting in a double free on bad device blocks.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50752/">CVE-2022-50752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50752">CVE-2022-50752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256204">SUSE bug 1256204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50753</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50753" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50753" ref_url="https://www.suse.com/security/cve/CVE-2022-50753" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to do sanity check on summary info

As Wenqing Liu reported in bugzilla:

https://bugzilla.kernel.org/show_bug.cgi?id=216456

BUG: KASAN: use-after-free in recover_data+0x63ae/0x6ae0 [f2fs]
Read of size 4 at addr ffff8881464dcd80 by task mount/1013

CPU: 3 PID: 1013 Comm: mount Tainted: G        W          6.0.0-rc4 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
Call Trace:
 dump_stack_lvl+0x45/0x5e
 print_report.cold+0xf3/0x68d
 kasan_report+0xa8/0x130
 recover_data+0x63ae/0x6ae0 [f2fs]
 f2fs_recover_fsync_data+0x120d/0x1fc0 [f2fs]
 f2fs_fill_super+0x4665/0x61e0 [f2fs]
 mount_bdev+0x2cf/0x3b0
 legacy_get_tree+0xed/0x1d0
 vfs_get_tree+0x81/0x2b0
 path_mount+0x47e/0x19d0
 do_mount+0xce/0xf0
 __x64_sys_mount+0x12c/0x1a0
 do_syscall_64+0x38/0x90
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

The root cause is: in fuzzed image, SSA table is corrupted: ofs_in_node
is larger than ADDRS_PER_PAGE(), result in out-of-range access on 4k-size
page.

- recover_data
 - do_recover_data
  - check_index_in_prev_nodes
   - f2fs_data_blkaddr

This patch adds sanity check on summary info in recovery and GC flow
in where the flows rely on them.

After patch:
[   29.310883] F2FS-fs (loop0): Inconsistent ofs_in_node:65286 in summary, ino:0, nid:6, max:1018
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50753/">CVE-2022-50753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50753">CVE-2022-50753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256201">SUSE bug 1256201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50755</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50755" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50755" ref_url="https://www.suse.com/security/cve/CVE-2022-50755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udf: Avoid double brelse() in udf_rename()

syzbot reported a warning like below [1]:

VFS: brelse: Trying to free free buffer
WARNING: CPU: 2 PID: 7301 at fs/buffer.c:1145 __brelse+0x67/0xa0
...
Call Trace:
 &lt;TASK&gt;
 invalidate_bh_lru+0x99/0x150
 smp_call_function_many_cond+0xe2a/0x10c0
 ? generic_remap_file_range_prep+0x50/0x50
 ? __brelse+0xa0/0xa0
 ? __mutex_lock+0x21c/0x12d0
 ? smp_call_on_cpu+0x250/0x250
 ? rcu_read_lock_sched_held+0xb/0x60
 ? lock_release+0x587/0x810
 ? __brelse+0xa0/0xa0
 ? generic_remap_file_range_prep+0x50/0x50
 on_each_cpu_cond_mask+0x3c/0x80
 blkdev_flush_mapping+0x13a/0x2f0
 blkdev_put_whole+0xd3/0xf0
 blkdev_put+0x222/0x760
 deactivate_locked_super+0x96/0x160
 deactivate_super+0xda/0x100
 cleanup_mnt+0x222/0x3d0
 task_work_run+0x149/0x240
 ? task_work_cancel+0x30/0x30
 do_exit+0xb29/0x2a40
 ? reacquire_held_locks+0x4a0/0x4a0
 ? do_raw_spin_lock+0x12a/0x2b0
 ? mm_update_next_owner+0x7c0/0x7c0
 ? rwlock_bug.part.0+0x90/0x90
 ? zap_other_threads+0x234/0x2d0
 do_group_exit+0xd0/0x2a0
 __x64_sys_exit_group+0x3a/0x50
 do_syscall_64+0x34/0xb0
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

The cause of the issue is that brelse() is called on both ofibh.sbh
and ofibh.ebh by udf_find_entry() when it returns NULL.  However,
brelse() is called by udf_rename(), too.  So, b_count on buffer_head
becomes unbalanced.

This patch fixes the issue by not calling brelse() by udf_rename()
when udf_find_entry() returns NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50755/">CVE-2022-50755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50755">CVE-2022-50755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256199">SUSE bug 1256199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50756</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50756" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50756" ref_url="https://www.suse.com/security/cve/CVE-2022-50756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-pci: fix mempool alloc size

Convert the max size to bytes to match the units of the divisor that
calculates the worst-case number of PRP entries.

The result is used to determine how many PRP Lists are required. The
code was previously rounding this to 1 list, but we can require 2 in the
worst case. In that scenario, the driver would corrupt memory beyond the
size provided by the mempool.

While unlikely to occur (you'd need a 4MB in exactly 127 phys segments
on a queue that doesn't support SGLs), this memory corruption has been
observed by kfence.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50756/">CVE-2022-50756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50756">CVE-2022-50756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256216">SUSE bug 1256216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256217">SUSE bug 1256217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50757</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50757" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50757" ref_url="https://www.suse.com/security/cve/CVE-2022-50757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: camss: Clean up received buffers on failed start of streaming

It is required to return the received buffers, if streaming can not be
started. For instance media_pipeline_start() may fail with EPIPE, if
a link validation between entities is not passed, and in such a case
a user gets a kernel warning:

  WARNING: CPU: 1 PID: 520 at drivers/media/common/videobuf2/videobuf2-core.c:1592 vb2_start_streaming+0xec/0x160
  &lt;snip&gt;
  Call trace:
   vb2_start_streaming+0xec/0x160
   vb2_core_streamon+0x9c/0x1a0
   vb2_ioctl_streamon+0x68/0xbc
   v4l_streamon+0x30/0x3c
   __video_do_ioctl+0x184/0x3e0
   video_usercopy+0x37c/0x7b0
   video_ioctl2+0x24/0x40
   v4l2_ioctl+0x4c/0x70

The fix is to correct the error path in video_start_streaming() of camss.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50757/">CVE-2022-50757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50757">CVE-2022-50757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256215">SUSE bug 1256215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50758</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50758" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50758" ref_url="https://www.suse.com/security/cve/CVE-2022-50758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: vt6655: fix potential memory leak

In function device_init_td0_ring, memory is allocated for member
td_info of priv-&gt;apTD0Rings[i], with i increasing from 0. In case of
allocation failure, the memory is freed in reversed order, with i
decreasing to 0. However, the case i=0 is left out and thus memory is
leaked.

Modify the memory freeing loop to include the case i=0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50758/">CVE-2022-50758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50758">CVE-2022-50758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256207">SUSE bug 1256207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50759</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50759" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50759" ref_url="https://www.suse.com/security/cve/CVE-2022-50759" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: i2c: ov5648: Free V4L2 fwnode data on unbind

The V4L2 fwnode data structure doesn't get freed on unbind, which leads to
a memleak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50759/">CVE-2022-50759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50759">CVE-2022-50759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256213">SUSE bug 1256213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50762</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50762" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50762" ref_url="https://www.suse.com/security/cve/CVE-2022-50762" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Avoid UBSAN error on true_sectors_per_clst()

syzbot reported UBSAN error as below:

[   76.901829][ T6677] ================================================================================
[   76.903908][ T6677] UBSAN: shift-out-of-bounds in fs/ntfs3/super.c:675:13
[   76.905363][ T6677] shift exponent -247 is negative

This patch avoid this error.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50762/">CVE-2022-50762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50762">CVE-2022-50762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256210">SUSE bug 1256210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50763</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50763" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50763" ref_url="https://www.suse.com/security/cve/CVE-2022-50763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: marvell/octeontx - prevent integer overflows

The "code_length" value comes from the firmware file.  If your firmware
is untrusted realistically there is probably very little you can do to
protect yourself.  Still we try to limit the damage as much as possible.
Also Smatch marks any data read from the filesystem as untrusted and
prints warnings if it not capped correctly.

The "code_length * 2" can overflow.  The round_up(ucode_size, 16) +
sizeof() expression can overflow too.  Prevent these overflows.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50763/">CVE-2022-50763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50763">CVE-2022-50763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256317">SUSE bug 1256317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256319">SUSE bug 1256319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50764</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50764" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50764" ref_url="https://www.suse.com/security/cve/CVE-2022-50764" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6/sit: use DEV_STATS_INC() to avoid data-races

syzbot/KCSAN reported that multiple cpus are updating dev-&gt;stats.tx_error
concurrently.

This is because sit tunnels are NETIF_F_LLTX, meaning their ndo_start_xmit()
is not protected by a spinlock.

While original KCSAN report was about tx path, rx path has the same issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50764/">CVE-2022-50764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50764">CVE-2022-50764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256314">SUSE bug 1256314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50765</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50765" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50765" ref_url="https://www.suse.com/security/cve/CVE-2022-50765" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RISC-V: kexec: Fix memory leak of elf header buffer

This is reported by kmemleak detector:

unreferenced object 0xff2000000403d000 (size 4096):
  comm "kexec", pid 146, jiffies 4294900633 (age 64.792s)
  hex dump (first 32 bytes):
    7f 45 4c 46 02 01 01 00 00 00 00 00 00 00 00 00  .ELF............
    04 00 f3 00 01 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;00000000566ca97c&gt;] kmemleak_vmalloc+0x3c/0xbe
    [&lt;00000000979283d8&gt;] __vmalloc_node_range+0x3ac/0x560
    [&lt;00000000b4b3712a&gt;] __vmalloc_node+0x56/0x62
    [&lt;00000000854f75e2&gt;] vzalloc+0x2c/0x34
    [&lt;00000000e9a00db9&gt;] crash_prepare_elf64_headers+0x80/0x30c
    [&lt;0000000067e8bf48&gt;] elf_kexec_load+0x3e8/0x4ec
    [&lt;0000000036548e09&gt;] kexec_image_load_default+0x40/0x4c
    [&lt;0000000079fbe1b4&gt;] sys_kexec_file_load+0x1c4/0x322
    [&lt;0000000040c62c03&gt;] ret_from_syscall+0x0/0x2

In elf_kexec_load(), a buffer is allocated via vzalloc() to store elf
headers.  While it's not freed back to system when kdump kernel is
reloaded or unloaded, or when image-&gt;elf_header is successfully set and
then fails to load kdump kernel for some reason. Fix it by freeing the
buffer in arch_kimage_file_post_load_cleanup().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50765/">CVE-2022-50765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50765">CVE-2022-50765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256277">SUSE bug 1256277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50766</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50766" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50766" ref_url="https://www.suse.com/security/cve/CVE-2022-50766" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: set generation before calling btrfs_clean_tree_block in btrfs_init_new_buffer

syzbot is reporting uninit-value in btrfs_clean_tree_block() [1], for
commit bc877d285ca3dba2 ("btrfs: Deduplicate extent_buffer init code")
missed that btrfs_set_header_generation() in btrfs_init_new_buffer() must
not be moved to after clean_tree_block() because clean_tree_block() is
calling btrfs_header_generation() since commit 55c69072d6bd5be1 ("Btrfs:
Fix extent_buffer usage when nodesize != leafsize").

Since memzero_extent_buffer() will reset "struct btrfs_header" part, we
can't move btrfs_set_header_generation() to before memzero_extent_buffer().
Just re-add btrfs_set_header_generation() before btrfs_clean_tree_block().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50766/">CVE-2022-50766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50766">CVE-2022-50766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256311">SUSE bug 1256311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50768</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50768" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50768" ref_url="https://www.suse.com/security/cve/CVE-2022-50768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: smartpqi: Correct device removal for multi-actuator devices

Correct device count for multi-actuator drives which can cause kernel
panics.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50768/">CVE-2022-50768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50768">CVE-2022-50768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256309">SUSE bug 1256309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50769</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50769" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50769" ref_url="https://www.suse.com/security/cve/CVE-2022-50769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: mxcmmc: fix return value check of mmc_add_host()

mmc_add_host() may return error, if we ignore its return value, the memory
that allocated in mmc_alloc_host() will be leaked and it will lead a kernel
crash because of deleting not added device in the remove path.

So fix this by checking the return value and goto error path which will call
mmc_free_host().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50769/">CVE-2022-50769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50769">CVE-2022-50769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256383">SUSE bug 1256383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50770</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50770" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50770" ref_url="https://www.suse.com/security/cve/CVE-2022-50770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix memory leak in ocfs2_mount_volume()

There is a memory leak reported by kmemleak:

  unreferenced object 0xffff88810cc65e60 (size 32):
    comm "mount.ocfs2", pid 23753, jiffies 4302528942 (age 34735.105s)
    hex dump (first 32 bytes):
      10 00 00 00 00 00 00 00 00 01 01 01 01 01 01 01  ................
      01 01 01 01 01 01 01 01 00 00 00 00 00 00 00 00  ................
    backtrace:
      [&lt;ffffffff8170f73d&gt;] __kmalloc+0x4d/0x150
      [&lt;ffffffffa0ac3f51&gt;] ocfs2_compute_replay_slots+0x121/0x330 [ocfs2]
      [&lt;ffffffffa0b65165&gt;] ocfs2_check_volume+0x485/0x900 [ocfs2]
      [&lt;ffffffffa0b68129&gt;] ocfs2_mount_volume.isra.0+0x1e9/0x650 [ocfs2]
      [&lt;ffffffffa0b7160b&gt;] ocfs2_fill_super+0xe0b/0x1740 [ocfs2]
      [&lt;ffffffff818e1fe2&gt;] mount_bdev+0x312/0x400
      [&lt;ffffffff819a086d&gt;] legacy_get_tree+0xed/0x1d0
      [&lt;ffffffff818de82d&gt;] vfs_get_tree+0x7d/0x230
      [&lt;ffffffff81957f92&gt;] path_mount+0xd62/0x1760
      [&lt;ffffffff81958a5a&gt;] do_mount+0xca/0xe0
      [&lt;ffffffff81958d3c&gt;] __x64_sys_mount+0x12c/0x1a0
      [&lt;ffffffff82f26f15&gt;] do_syscall_64+0x35/0x80
      [&lt;ffffffff8300006a&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0

This call stack is related to two problems.  Firstly, the ocfs2 super uses
"replay_map" to trace online/offline slots, in order to recover offline
slots during recovery and mount.  But when ocfs2_truncate_log_init()
returns an error in ocfs2_mount_volume(), the memory of "replay_map" will
not be freed in error handling path.  Secondly, the memory of "replay_map"
will not be freed if d_make_root() returns an error in ocfs2_fill_super().
But the memory of "replay_map" will be freed normally when completing
recovery and mount in ocfs2_complete_mount_recovery().

Fix the first problem by adding error handling path to free "replay_map"
when ocfs2_truncate_log_init() fails.  And fix the second problem by
calling ocfs2_free_replay_slots(osb) in the error handling path
"out_dismount".  In addition, since ocfs2_free_replay_slots() is static,
it is necessary to remove its static attribute and declare it in header
file.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50770/">CVE-2022-50770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50770">CVE-2022-50770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256221">SUSE bug 1256221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50771</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50771" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50771" ref_url="https://www.suse.com/security/cve/CVE-2022-50771" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu: Fix __this_cpu_read() lockdep warning in rcu_force_quiescent_state()

Running rcutorture with non-zero fqs_duration module parameter in a
kernel built with CONFIG_PREEMPTION=y results in the following splat:

BUG: using __this_cpu_read() in preemptible [00000000]
code: rcu_torture_fqs/398
caller is __this_cpu_preempt_check+0x13/0x20
CPU: 3 PID: 398 Comm: rcu_torture_fqs Not tainted 6.0.0-rc1-yoctodev-standard+
Call Trace:
&lt;TASK&gt;
dump_stack_lvl+0x5b/0x86
dump_stack+0x10/0x16
check_preemption_disabled+0xe5/0xf0
__this_cpu_preempt_check+0x13/0x20
rcu_force_quiescent_state.part.0+0x1c/0x170
rcu_force_quiescent_state+0x1e/0x30
rcu_torture_fqs+0xca/0x160
? rcu_torture_boost+0x430/0x430
kthread+0x192/0x1d0
? kthread_complete_and_exit+0x30/0x30
ret_from_fork+0x22/0x30
&lt;/TASK&gt;

The problem is that rcu_force_quiescent_state() uses __this_cpu_read()
in preemptible code instead of the proper raw_cpu_read().  This commit
therefore changes __this_cpu_read() to raw_cpu_read().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50771/">CVE-2022-50771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50771">CVE-2022-50771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256322">SUSE bug 1256322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50772</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50772" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50772" ref_url="https://www.suse.com/security/cve/CVE-2022-50772" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netdevsim: fix memory leak in nsim_bus_dev_new()

If device_register() failed in nsim_bus_dev_new(), the value of reference
in nsim_bus_dev-&gt;dev is 1. obj-&gt;name in nsim_bus_dev-&gt;dev will not be
released.

unreferenced object 0xffff88810352c480 (size 16):
  comm "echo", pid 5691, jiffies 4294945921 (age 133.270s)
  hex dump (first 16 bytes):
    6e 65 74 64 65 76 73 69 6d 31 00 00 00 00 00 00  netdevsim1......
  backtrace:
    [&lt;000000005e2e5e26&gt;] __kmalloc_node_track_caller+0x3a/0xb0
    [&lt;0000000094ca4fc8&gt;] kvasprintf+0xc3/0x160
    [&lt;00000000aad09bcc&gt;] kvasprintf_const+0x55/0x180
    [&lt;000000009bac868d&gt;] kobject_set_name_vargs+0x56/0x150
    [&lt;000000007c1a5d70&gt;] dev_set_name+0xbb/0xf0
    [&lt;00000000ad0d126b&gt;] device_add+0x1f8/0x1cb0
    [&lt;00000000c222ae24&gt;] new_device_store+0x3b6/0x5e0
    [&lt;0000000043593421&gt;] bus_attr_store+0x72/0xa0
    [&lt;00000000cbb1833a&gt;] sysfs_kf_write+0x106/0x160
    [&lt;00000000d0dedb8a&gt;] kernfs_fop_write_iter+0x3a8/0x5a0
    [&lt;00000000770b66e2&gt;] vfs_write+0x8f0/0xc80
    [&lt;0000000078bb39be&gt;] ksys_write+0x106/0x210
    [&lt;00000000005e55a4&gt;] do_syscall_64+0x35/0x80
    [&lt;00000000eaa40bbc&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50772/">CVE-2022-50772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50772">CVE-2022-50772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256278">SUSE bug 1256278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50773</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50773" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50773" ref_url="https://www.suse.com/security/cve/CVE-2022-50773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: mts64: fix possible null-ptr-defer in snd_mts64_interrupt

I got a null-ptr-defer error report when I do the following tests
on the qemu platform:

make defconfig and CONFIG_PARPORT=m, CONFIG_PARPORT_PC=m,
CONFIG_SND_MTS64=m

Then making test scripts:
cat&gt;test_mod1.sh&lt;&lt;EOF
modprobe snd-mts64
modprobe snd-mts64
EOF

Executing the script, perhaps several times, we will get a null-ptr-defer
report, as follow:

syzkaller:~# ./test_mod.sh
snd_mts64: probe of snd_mts64.0 failed with error -5
modprobe: ERROR: could not insert 'snd_mts64': No such device
 BUG: kernel NULL pointer dereference, address: 0000000000000000
 #PF: supervisor write access in kernel mode
 #PF: error_code(0x0002) - not-present page
 PGD 0 P4D 0
 Oops: 0002 [#1] PREEMPT SMP PTI
 CPU: 0 PID: 205 Comm: modprobe Not tainted 6.1.0-rc8-00588-g76dcd734eca2 #6
 Call Trace:
  &lt;IRQ&gt;
  snd_mts64_interrupt+0x24/0xa0 [snd_mts64]
  parport_irq_handler+0x37/0x50 [parport]
  __handle_irq_event_percpu+0x39/0x190
  handle_irq_event_percpu+0xa/0x30
  handle_irq_event+0x2f/0x50
  handle_edge_irq+0x99/0x1b0
  __common_interrupt+0x5d/0x100
  common_interrupt+0xa0/0xc0
  &lt;/IRQ&gt;
  &lt;TASK&gt;
  asm_common_interrupt+0x22/0x40
 RIP: 0010:_raw_write_unlock_irqrestore+0x11/0x30
  parport_claim+0xbd/0x230 [parport]
  snd_mts64_probe+0x14a/0x465 [snd_mts64]
  platform_probe+0x3f/0xa0
  really_probe+0x129/0x2c0
  __driver_probe_device+0x6d/0xc0
  driver_probe_device+0x1a/0xa0
  __device_attach_driver+0x7a/0xb0
  bus_for_each_drv+0x62/0xb0
  __device_attach+0xe4/0x180
  bus_probe_device+0x82/0xa0
  device_add+0x550/0x920
  platform_device_add+0x106/0x220
  snd_mts64_attach+0x2e/0x80 [snd_mts64]
  port_check+0x14/0x20 [parport]
  bus_for_each_dev+0x6e/0xc0
  __parport_register_driver+0x7c/0xb0 [parport]
  snd_mts64_module_init+0x31/0x1000 [snd_mts64]
  do_one_initcall+0x3c/0x1f0
  do_init_module+0x46/0x1c6
  load_module+0x1d8d/0x1e10
  __do_sys_finit_module+0xa2/0xf0
  do_syscall_64+0x37/0x90
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
  &lt;/TASK&gt;
 Kernel panic - not syncing: Fatal exception in interrupt
 Rebooting in 1 seconds..

The mts wa not initialized during interrupt,  we add check for
mts to fix this bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50773/">CVE-2022-50773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50773">CVE-2022-50773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256245">SUSE bug 1256245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50774</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50774" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50774" ref_url="https://www.suse.com/security/cve/CVE-2022-50774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qat - fix DMA transfer direction

When CONFIG_DMA_API_DEBUG is selected, while running the crypto self
test on the QAT crypto algorithms, the function add_dma_entry() reports
a warning similar to the one below, saying that overlapping mappings
are not supported. This occurs in tests where the input and the output
scatter list point to the same buffers (i.e. two different scatter lists
which point to the same chunks of memory).

The logic that implements the mapping uses the flag DMA_BIDIRECTIONAL
for both the input and the output scatter lists which leads to
overlapped write mappings. These are not supported by the DMA layer.

Fix by specifying the correct DMA transfer directions when mapping
buffers. For in-place operations where the input scatter list
matches the output scatter list, buffers are mapped once with
DMA_BIDIRECTIONAL, otherwise input buffers are mapped using the flag
DMA_TO_DEVICE and output buffers are mapped with DMA_FROM_DEVICE.
Overlapping a read mapping with a write mapping is a valid case in
dma-coherent devices like QAT.
The function that frees and unmaps the buffers, qat_alg_free_bufl()
has been changed accordingly to the changes to the mapping function.

   DMA-API: 4xxx 0000:06:00.0: cacheline tracking EEXIST, overlapping mappings aren't supported
   WARNING: CPU: 53 PID: 4362 at kernel/dma/debug.c:570 add_dma_entry+0x1e9/0x270
   ...
   Call Trace:
   dma_map_page_attrs+0x82/0x2d0
   ? preempt_count_add+0x6a/0xa0
   qat_alg_sgl_to_bufl+0x45b/0x990 [intel_qat]
   qat_alg_aead_dec+0x71/0x250 [intel_qat]
   crypto_aead_decrypt+0x3d/0x70
   test_aead_vec_cfg+0x649/0x810
   ? number+0x310/0x3a0
   ? vsnprintf+0x2a3/0x550
   ? scnprintf+0x42/0x70
   ? valid_sg_divisions.constprop.0+0x86/0xa0
   ? test_aead_vec+0xdf/0x120
   test_aead_vec+0xdf/0x120
   alg_test_aead+0x185/0x400
   alg_test+0x3d8/0x500
   ? crypto_acomp_scomp_free_ctx+0x30/0x30
   ? __schedule+0x32a/0x12a0
   ? ttwu_queue_wakelist+0xbf/0x110
   ? _raw_spin_unlock_irqrestore+0x23/0x40
   ? try_to_wake_up+0x83/0x570
   ? _raw_spin_unlock_irqrestore+0x23/0x40
   ? __set_cpus_allowed_ptr_locked+0xea/0x1b0
   ? crypto_acomp_scomp_free_ctx+0x30/0x30
   cryptomgr_test+0x27/0x50
   kthread+0xe6/0x110
   ? kthread_complete_and_exit+0x20/0x20
   ret_from_fork+0x1f/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50774/">CVE-2022-50774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50774">CVE-2022-50774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256323">SUSE bug 1256323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256324">SUSE bug 1256324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50775</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50775" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50775" ref_url="https://www.suse.com/security/cve/CVE-2022-50775" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix refcount leak in hns_roce_mmap

rdma_user_mmap_entry_get_pgoff() takes the reference.
Add missing rdma_user_mmap_entry_put() to release the reference.

Acked-by Haoyue Xu &lt;xuhaoyue1@hisilicon.com&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50775/">CVE-2022-50775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50775">CVE-2022-50775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256321">SUSE bug 1256321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50776</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50776" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50776" ref_url="https://www.suse.com/security/cve/CVE-2022-50776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: st: Fix memory leak in st_of_quadfs_setup()

If st_clk_register_quadfs_pll() fails, @lock should be freed before goto
@err_exit, otherwise will cause meory leak issue, fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50776/">CVE-2022-50776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50776">CVE-2022-50776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256254">SUSE bug 1256254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50777</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50777" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50777" ref_url="https://www.suse.com/security/cve/CVE-2022-50777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: xgmiitorgmii: Fix refcount leak in xgmiitorgmii_probe

of_phy_find_device() return device node with refcount incremented.
Call put_device() to relese it when not needed anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50777/">CVE-2022-50777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50777">CVE-2022-50777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256320">SUSE bug 1256320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50778</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50778" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50778" ref_url="https://www.suse.com/security/cve/CVE-2022-50778" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fortify: Fix __compiletime_strlen() under UBSAN_BOUNDS_LOCAL

With CONFIG_FORTIFY=y and CONFIG_UBSAN_LOCAL_BOUNDS=y enabled, we observe
a runtime panic while running Android's Compatibility Test Suite's (CTS)
android.hardware.input.cts.tests. This is stemming from a strlen()
call in hidinput_allocate().

__compiletime_strlen() is implemented in terms of __builtin_object_size(),
then does an array access to check for NUL-termination. A quirk of
__builtin_object_size() is that for strings whose values are runtime
dependent, __builtin_object_size(str, 1 or 0) returns the maximum size
of possible values when those sizes are determinable at compile time.
Example:

  static const char *v = "FOO BAR";
  static const char *y = "FOO BA";
  unsigned long x (int z) {
      // Returns 8, which is:
      // max(__builtin_object_size(v, 1), __builtin_object_size(y, 1))
      return __builtin_object_size(z ? v : y, 1);
  }

So when FORTIFY_SOURCE is enabled, the current implementation of
__compiletime_strlen() will try to access beyond the end of y at runtime
using the size of v. Mixed with UBSAN_LOCAL_BOUNDS we get a fault.

hidinput_allocate() has a local C string whose value is control flow
dependent on a switch statement, so __builtin_object_size(str, 1)
evaluates to the maximum string length, making all other cases fault on
the last character check. hidinput_allocate() could be cleaned up to
avoid runtime calls to strlen() since the local variable can only have
literal values, so there's no benefit to trying to fortify the strlen
call site there.

Perform a __builtin_constant_p() check against index 0 earlier in the
macro to filter out the control-flow-dependant case. Add a KUnit test
for checking the expected behavioral characteristics of FORTIFY_SOURCE
internals.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50778/">CVE-2022-50778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50778">CVE-2022-50778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256304">SUSE bug 1256304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50779</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50779" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50779" ref_url="https://www.suse.com/security/cve/CVE-2022-50779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string()

When insert and remove the orangefs module, then debug_help_string will
be leaked:

  unreferenced object 0xffff8881652ba000 (size 4096):
    comm "insmod", pid 1701, jiffies 4294893639 (age 13218.530s)
    hex dump (first 32 bytes):
      43 6c 69 65 6e 74 20 44 65 62 75 67 20 4b 65 79  Client Debug Key
      77 6f 72 64 73 20 61 72 65 20 75 6e 6b 6e 6f 77  words are unknow
    backtrace:
      [&lt;0000000004e6f8e3&gt;] kmalloc_trace+0x27/0xa0
      [&lt;0000000006f75d85&gt;] orangefs_prepare_debugfs_help_string+0x5e/0x480 [orangefs]
      [&lt;0000000091270a2a&gt;] _sub_I_65535_1+0x57/0xf70 [crc_itu_t]
      [&lt;000000004b1ee1a3&gt;] do_one_initcall+0x87/0x2a0
      [&lt;000000001d0614ae&gt;] do_init_module+0xdf/0x320
      [&lt;00000000efef068c&gt;] load_module+0x2f98/0x3330
      [&lt;000000006533b44d&gt;] __do_sys_finit_module+0x113/0x1b0
      [&lt;00000000a0da6f99&gt;] do_syscall_64+0x35/0x80
      [&lt;000000007790b19b&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0

When remove the module, should always free debug_help_string. Should
always free the allocated buffer when change the free_debug_help_string.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50779/">CVE-2022-50779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50779">CVE-2022-50779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256423">SUSE bug 1256423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50780</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50780" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50780" ref_url="https://www.suse.com/security/cve/CVE-2022-50780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix UAF issue in nfqnl_nf_hook_drop() when ops_init() failed

When the ops_init() interface is invoked to initialize the net, but
ops-&gt;init() fails, data is released. However, the ptr pointer in
net-&gt;gen is invalid. In this case, when nfqnl_nf_hook_drop() is invoked
to release the net, invalid address access occurs.

The process is as follows:
setup_net()
	ops_init()
		data = kzalloc(...)   ---&gt; alloc "data"
		net_assign_generic()  ---&gt; assign "date" to ptr in net-&gt;gen
		...
		ops-&gt;init()           ---&gt; failed
		...
		kfree(data);          ---&gt; ptr in net-&gt;gen is invalid
	...
	ops_exit_list()
		...
		nfqnl_nf_hook_drop()
			*q = nfnl_queue_pernet(net) ---&gt; q is invalid

The following is the Call Trace information:
BUG: KASAN: use-after-free in nfqnl_nf_hook_drop+0x264/0x280
Read of size 8 at addr ffff88810396b240 by task ip/15855
Call Trace:
&lt;TASK&gt;
dump_stack_lvl+0x8e/0xd1
print_report+0x155/0x454
kasan_report+0xba/0x1f0
nfqnl_nf_hook_drop+0x264/0x280
nf_queue_nf_hook_drop+0x8b/0x1b0
__nf_unregister_net_hook+0x1ae/0x5a0
nf_unregister_net_hooks+0xde/0x130
ops_exit_list+0xb0/0x170
setup_net+0x7ac/0xbd0
copy_net_ns+0x2e6/0x6b0
create_new_namespaces+0x382/0xa50
unshare_nsproxy_namespaces+0xa6/0x1c0
ksys_unshare+0x3a4/0x7e0
__x64_sys_unshare+0x2d/0x40
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x46/0xb0
&lt;/TASK&gt;

Allocated by task 15855:
kasan_save_stack+0x1e/0x40
kasan_set_track+0x21/0x30
__kasan_kmalloc+0xa1/0xb0
__kmalloc+0x49/0xb0
ops_init+0xe7/0x410
setup_net+0x5aa/0xbd0
copy_net_ns+0x2e6/0x6b0
create_new_namespaces+0x382/0xa50
unshare_nsproxy_namespaces+0xa6/0x1c0
ksys_unshare+0x3a4/0x7e0
__x64_sys_unshare+0x2d/0x40
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x46/0xb0

Freed by task 15855:
kasan_save_stack+0x1e/0x40
kasan_set_track+0x21/0x30
kasan_save_free_info+0x2a/0x40
____kasan_slab_free+0x155/0x1b0
slab_free_freelist_hook+0x11b/0x220
__kmem_cache_free+0xa4/0x360
ops_init+0xb9/0x410
setup_net+0x5aa/0xbd0
copy_net_ns+0x2e6/0x6b0
create_new_namespaces+0x382/0xa50
unshare_nsproxy_namespaces+0xa6/0x1c0
ksys_unshare+0x3a4/0x7e0
__x64_sys_unshare+0x2d/0x40
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x46/0xb0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50780/">CVE-2022-50780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50780">CVE-2022-50780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256305">SUSE bug 1256305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50781</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50781" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50781" ref_url="https://www.suse.com/security/cve/CVE-2022-50781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table()

In the PP_OD_EDIT_VDDC_CURVE case the "input_index" variable is capped at
2 but not checked for negative values so it results in an out of bounds
read.  This value comes from the user via sysfs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50781/">CVE-2022-50781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50781">CVE-2022-50781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256306">SUSE bug 1256306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50782</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50782" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50782" ref_url="https://www.suse.com/security/cve/CVE-2022-50782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix bug_on in __es_tree_search caused by bad quota inode

We got a issue as fllows:
==================================================================
 kernel BUG at fs/ext4/extents_status.c:202!
 invalid opcode: 0000 [#1] PREEMPT SMP
 CPU: 1 PID: 810 Comm: mount Not tainted 6.1.0-rc1-next-g9631525255e3 #352
 RIP: 0010:__es_tree_search.isra.0+0xb8/0xe0
 RSP: 0018:ffffc90001227900 EFLAGS: 00010202
 RAX: 0000000000000000 RBX: 0000000077512a0f RCX: 0000000000000000
 RDX: 0000000000000002 RSI: 0000000000002a10 RDI: ffff8881004cd0c8
 RBP: ffff888177512ac8 R08: 47ffffffffffffff R09: 0000000000000001
 R10: 0000000000000001 R11: 00000000000679af R12: 0000000000002a10
 R13: ffff888177512d88 R14: 0000000077512a10 R15: 0000000000000000
 FS: 00007f4bd76dbc40(0000)GS:ffff88842fd00000(0000)knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00005653bf993cf8 CR3: 000000017bfdf000 CR4: 00000000000006e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;TASK&gt;
  ext4_es_cache_extent+0xe2/0x210
  ext4_cache_extents+0xd2/0x110
  ext4_find_extent+0x5d5/0x8c0
  ext4_ext_map_blocks+0x9c/0x1d30
  ext4_map_blocks+0x431/0xa50
  ext4_getblk+0x82/0x340
  ext4_bread+0x14/0x110
  ext4_quota_read+0xf0/0x180
  v2_read_header+0x24/0x90
  v2_check_quota_file+0x2f/0xa0
  dquot_load_quota_sb+0x26c/0x760
  dquot_load_quota_inode+0xa5/0x190
  ext4_enable_quotas+0x14c/0x300
  __ext4_fill_super+0x31cc/0x32c0
  ext4_fill_super+0x115/0x2d0
  get_tree_bdev+0x1d2/0x360
  ext4_get_tree+0x19/0x30
  vfs_get_tree+0x26/0xe0
  path_mount+0x81d/0xfc0
  do_mount+0x8d/0xc0
  __x64_sys_mount+0xc0/0x160
  do_syscall_64+0x35/0x80
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
  &lt;/TASK&gt;
==================================================================

Above issue may happen as follows:
-------------------------------------
ext4_fill_super
 ext4_orphan_cleanup
  ext4_enable_quotas
   ext4_quota_enable
    ext4_iget --&gt; get error inode &lt;5&gt;
     ext4_ext_check_inode --&gt; Wrong imode makes it escape inspection
     make_bad_inode(inode) --&gt; EXT4_BOOT_LOADER_INO set imode
    dquot_load_quota_inode
     vfs_setup_quota_inode --&gt; check pass
     dquot_load_quota_sb
      v2_check_quota_file
       v2_read_header
        ext4_quota_read
         ext4_bread
          ext4_getblk
           ext4_map_blocks
            ext4_ext_map_blocks
             ext4_find_extent
              ext4_cache_extents
               ext4_es_cache_extent
                __es_tree_search.isra.0
                 ext4_es_end --&gt; Wrong extents trigger BUG_ON

In the above issue, s_usr_quota_inum is set to 5, but inode&lt;5&gt; contains
incorrect imode and disordered extents. Because 5 is EXT4_BOOT_LOADER_INO,
the ext4_ext_check_inode check in the ext4_iget function can be bypassed,
finally, the extents that are not checked trigger the BUG_ON in the
__es_tree_search function. To solve this issue, check whether the inode is
bad_inode in vfs_setup_quota_inode().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50782/">CVE-2022-50782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50782">CVE-2022-50782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256282">SUSE bug 1256282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50783</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50783" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50783" ref_url="https://www.suse.com/security/cve/CVE-2022-50783" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: use proper req destructor for IPv6

Before, only the destructor from TCP request sock in IPv4 was called
even if the subflow was IPv6.

It is important to use the right destructor to avoid memory leaks with
some advanced IPv6 features, e.g. when the request socks contain
specific IPv6 options.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50783/">CVE-2022-50783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50783">CVE-2022-50783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256281">SUSE bug 1256281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50784</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50784" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50784" ref_url="https://www.suse.com/security/cve/CVE-2022-50784" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mei: fix potential NULL-ptr deref after clone

If cloning the SKB fails, don't try to use it, but rather return
as if we should pass it.

Coverity CID: 1503456
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50784/">CVE-2022-50784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50784">CVE-2022-50784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256266">SUSE bug 1256266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50785</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50785" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50785" ref_url="https://www.suse.com/security/cve/CVE-2022-50785" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fsi: occ: Prevent use after free

Use get_device and put_device in the open and close functions to
make sure the device doesn't get freed while a file descriptor is
open.
Also, lock around the freeing of the device buffer and check the
buffer before using it in the submit function.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50785/">CVE-2022-50785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50785">CVE-2022-50785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256264">SUSE bug 1256264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50786</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50786" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50786" ref_url="https://www.suse.com/security/cve/CVE-2022-50786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: s5p-mfc: Clear workbit to handle error condition

During error on CLOSE_INSTANCE command, ctx_work_bits was not getting
cleared. During consequent mfc execution NULL pointer dereferencing of
this context led to kernel panic. This patch fixes this issue by making
sure to clear ctx_work_bits always.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50786/">CVE-2022-50786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50786">CVE-2022-50786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256258">SUSE bug 1256258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50809</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50809" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50809" ref_url="https://www.suse.com/security/cve/CVE-2022-50809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xhci: dbc: Fix memory leak in xhci_alloc_dbc()

If DbC is already in use, then the allocated memory for the xhci_dbc struct
doesn't get freed before returning NULL, which leads to a memleak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50809/">CVE-2022-50809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50809">CVE-2022-50809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256250">SUSE bug 1256250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50810</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50810" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50810" ref_url="https://www.suse.com/security/cve/CVE-2022-50810" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rapidio: devices: fix missing put_device in mport_cdev_open

When kfifo_alloc fails, the refcount of chdev-&gt;dev is left incremental. 
We should use put_device(&amp;chdev-&gt;dev) to decrease the ref count of
chdev-&gt;dev to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50810/">CVE-2022-50810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50810">CVE-2022-50810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256257">SUSE bug 1256257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50811</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50811" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50811" ref_url="https://www.suse.com/security/cve/CVE-2022-50811" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: fix missing unmap if z_erofs_get_extent_compressedlen() fails

Otherwise, meta buffers could be leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50811/">CVE-2022-50811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50811">CVE-2022-50811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256252">SUSE bug 1256252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50812</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50812" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50812" ref_url="https://www.suse.com/security/cve/CVE-2022-50812" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang &gt; 15.0.6

A bad bug in clang's implementation of -fzero-call-used-regs can result
in NULL pointer dereferences (see the links above the check for more
information). Restrict CONFIG_CC_HAS_ZERO_CALL_USED_REGS to either a
supported GCC version or a clang newer than 15.0.6, which will catch
both a theoretical 15.0.7 and the upcoming 16.0.0, which will both have
the bug fixed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50812/">CVE-2022-50812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50812">CVE-2022-50812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256247">SUSE bug 1256247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50813</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50813" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50813" ref_url="https://www.suse.com/security/cve/CVE-2022-50813" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers: mcb: fix resource leak in mcb_probe()

When probe hook function failed in mcb_probe(), it doesn't put the device.
Compiled test only.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50813/">CVE-2022-50813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50813">CVE-2022-50813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256249">SUSE bug 1256249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50814</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50814" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50814" ref_url="https://www.suse.com/security/cve/CVE-2022-50814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr

KASAN reported this Bug:

	[17619.659757] BUG: KASAN: global-out-of-bounds in param_get_int+0x34/0x60
	[17619.673193] Read of size 4 at addr fffff01332d7ed00 by task read_all/1507958
	...
	[17619.698934] The buggy address belongs to the variable:
	[17619.708371]  sgl_sge_nr+0x0/0xffffffffffffa300 [hisi_zip]

There is a mismatch in hisi_zip when get/set the variable sgl_sge_nr.
The type of sgl_sge_nr is u16, and get/set sgl_sge_nr by
param_get/set_int.

Replacing param_get/set_int to param_get/set_ushort can fix this bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50814/">CVE-2022-50814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50814">CVE-2022-50814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256248">SUSE bug 1256248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50815</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50815" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50815" ref_url="https://www.suse.com/security/cve/CVE-2022-50815" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext2: Add sanity checks for group and filesystem size

Add sanity check that filesystem size does not exceed the underlying
device size and that group size is big enough so that metadata can fit
into it. This avoid trying to mount some crafted filesystems with
extremely large group counts.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50815/">CVE-2022-50815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50815">CVE-2022-50815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256307">SUSE bug 1256307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50818</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50818" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50818" ref_url="https://www.suse.com/security/cve/CVE-2022-50818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: pm8001: Fix running_req for internal abort commands

Disabling the remote phy for a SATA disk causes a hang:

root@(none)$ more /sys/class/sas_phy/phy-0:0:8/target_port_protocols
sata
root@(none)$ echo 0 &gt; sys/class/sas_phy/phy-0:0:8/enable
root@(none)$ [   67.855950] sas: ex 500e004aaaaaaa1f phy08 change count has changed
[   67.920585] sd 0:0:2:0: [sdc] Synchronizing SCSI cache
[   67.925780] sd 0:0:2:0: [sdc] Synchronize Cache(10) failed: Result: hostbyte=0x04 driverbyte=DRIVER_OK
[   67.935094] sd 0:0:2:0: [sdc] Stopping disk
[   67.939305] sd 0:0:2:0: [sdc] Start/Stop Unit failed: Result: hostbyte=0x04 driverbyte=DRIVER_OK
...
[  123.998998] INFO: task kworker/u192:1:642 blocked for more than 30 seconds.
[  124.005960]   Not tainted 6.0.0-rc1-205202-gf26f8f761e83 #218
[  124.012049] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  124.019872] task:kworker/u192:1  state:D stack:0 pid:  642 ppid: 2 flags:0x00000008
[  124.028223] Workqueue: 0000:04:00.0_event_q sas_port_event_worker
[  124.034319] Call trace:
[  124.036758]  __switch_to+0x128/0x278
[  124.040333]  __schedule+0x434/0xa58
[  124.043820]  schedule+0x94/0x138
[  124.047045]  schedule_timeout+0x2fc/0x368
[  124.051052]  wait_for_completion+0xdc/0x200
[  124.055234]  __flush_workqueue+0x1a8/0x708
[  124.059328]  sas_porte_broadcast_rcvd+0xa8/0xc0
[  124.063858]  sas_port_event_worker+0x60/0x98
[  124.068126]  process_one_work+0x3f8/0x660
[  124.072134]  worker_thread+0x70/0x700
[  124.075793]  kthread+0x1a4/0x1b8
[  124.079014]  ret_from_fork+0x10/0x20

The issue is that the per-device running_req read in
pm8001_dev_gone_notify() never goes to zero and we never make progress.
This is caused by missing accounting for running_req for when an internal
abort command completes.

In commit 2cbbf489778e ("scsi: pm8001: Use libsas internal abort support")
we started to send internal abort commands as a proper sas_task. In this
when we deliver a sas_task to HW the per-device running_req is incremented
in pm8001_queue_command(). However it is never decremented for internal
abort commnds, so decrement in pm8001_mpi_task_abort_resp().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50818/">CVE-2022-50818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50818">CVE-2022-50818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256239">SUSE bug 1256239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50819</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50819" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50819" ref_url="https://www.suse.com/security/cve/CVE-2022-50819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udmabuf: Set ubuf-&gt;sg = NULL if the creation of sg table fails

When userspace tries to map the dmabuf and if for some reason
(e.g. OOM) the creation of the sg table fails, ubuf-&gt;sg needs to be
set to NULL. Otherwise, when the userspace subsequently closes the
dmabuf fd, we'd try to erroneously free the invalid sg table from
release_udmabuf resulting in the following crash reported by syzbot:

general protection fault, probably for non-canonical address
0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 0 PID: 3609 Comm: syz-executor487 Not tainted
5.19.0-syzkaller-13930-g7ebfc85e2cd7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 07/22/2022
RIP: 0010:dma_unmap_sgtable include/linux/dma-mapping.h:378 [inline]
RIP: 0010:put_sg_table drivers/dma-buf/udmabuf.c:89 [inline]
RIP: 0010:release_udmabuf+0xcb/0x4f0 drivers/dma-buf/udmabuf.c:114
Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 2b 04 00 00 48 8d 7d 0c 4c
8b 63 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 &lt;0f&gt; b6 14
02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 e2
RSP: 0018:ffffc900037efd30 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffffffff8cb67800 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff84ad27e0 RDI: 0000000000000000
RBP: fffffffffffffff4 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000000 R11: 000000000008c07c R12: ffff88801fa05000
R13: ffff888073db07e8 R14: ffff888025c25440 R15: 0000000000000000
FS:  0000555555fc4300(0000) GS:ffff8880b9a00000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc1c0ce06e4 CR3: 00000000715e6000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 dma_buf_release+0x157/0x2d0 drivers/dma-buf/dma-buf.c:78
 __dentry_kill+0x42b/0x640 fs/dcache.c:612
 dentry_kill fs/dcache.c:733 [inline]
 dput+0x806/0xdb0 fs/dcache.c:913
 __fput+0x39c/0x9d0 fs/file_table.c:333
 task_work_run+0xdd/0x1a0 kernel/task_work.c:177
 ptrace_notify+0x114/0x140 kernel/signal.c:2353
 ptrace_report_syscall include/linux/ptrace.h:420 [inline]
 ptrace_report_syscall_exit include/linux/ptrace.h:482 [inline]
 syscall_exit_work kernel/entry/common.c:249 [inline]
 syscall_exit_to_user_mode_prepare+0x129/0x280 kernel/entry/common.c:276
 __syscall_exit_to_user_mode_work kernel/entry/common.c:281 [inline]
 syscall_exit_to_user_mode+0x9/0x50 kernel/entry/common.c:294
 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fc1c0c35b6b
Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24
0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 &lt;48&gt; 3d 00
f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44
RSP: 002b:00007ffd78a06090 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000007 RCX: 00007fc1c0c35b6b
RDX: 0000000020000280 RSI: 0000000040086200 RDI: 0000000000000006
RBP: 0000000000000007 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000293 R12: 000000000000000c
R13: 0000000000000003 R14: 00007fc1c0cfe4a0 R15: 00007ffd78a06140
 &lt;/TASK&gt;
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:dma_unmap_sgtable include/linux/dma-mapping.h:378 [inline]
RIP: 0010:put_sg_table drivers/dma-buf/udmabuf.c:89 [inline]
RIP: 0010:release_udmabuf+0xcb/0x4f0 drivers/dma-buf/udmabuf.c:114
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50819/">CVE-2022-50819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50819">CVE-2022-50819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256241">SUSE bug 1256241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50820</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50820" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50820" ref_url="https://www.suse.com/security/cve/CVE-2022-50820" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/arm_dmc620: Fix hotplug callback leak in dmc620_pmu_init()

dmc620_pmu_init() won't remove the callback added by
cpuhp_setup_state_multi() when platform_driver_register() failed. Remove
the callback by cpuhp_remove_multi_state() in fail path.

Similar to the handling of arm_ccn_init() in commit 26242b330093 ("bus:
arm-ccn: Prevent hotplug callback leak")
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50820/">CVE-2022-50820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50820">CVE-2022-50820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256261">SUSE bug 1256261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50821</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50821" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50821" ref_url="https://www.suse.com/security/cve/CVE-2022-50821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Don't leak netobj memory when gss_read_proxy_verf() fails
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50821/">CVE-2022-50821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50821">CVE-2022-50821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256242">SUSE bug 1256242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50822</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50822" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50822" ref_url="https://www.suse.com/security/cve/CVE-2022-50822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/restrack: Release MR restrack when delete

The MR restrack also needs to be released when delete it, otherwise it
cause memory leak as the task struct won't be released.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50822/">CVE-2022-50822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50822">CVE-2022-50822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256260">SUSE bug 1256260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50823</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50823" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50823" ref_url="https://www.suse.com/security/cve/CVE-2022-50823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: tegra: Fix refcount leak in tegra114_clock_init

of_find_matching_node() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50823/">CVE-2022-50823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50823">CVE-2022-50823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256333">SUSE bug 1256333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50824</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50824" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50824" ref_url="https://www.suse.com/security/cve/CVE-2022-50824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: tpm_tis: Add the missed acpi_put_table() to fix memory leak

In check_acpi_tpm2(), we get the TPM2 table just to make
sure the table is there, not used after the init, so the
acpi_put_table() should be added to release the ACPI memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50824/">CVE-2022-50824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50824">CVE-2022-50824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256334">SUSE bug 1256334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50825</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50825" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50825" ref_url="https://www.suse.com/security/cve/CVE-2022-50825" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: wusb3801: fix fwnode refcount leak in wusb3801_probe()

I got the following report while doing fault injection test:

  OF: ERROR: memory leak, expected refcount 1 instead of 4,
  of_node_get()/of_node_put() unbalanced - destroy cset entry:
  attach overlay node /i2c/tcpc@60/connector

If wusb3801_hw_init() fails, fwnode_handle_put() needs be called to
avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50825/">CVE-2022-50825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50825">CVE-2022-50825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256227">SUSE bug 1256227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50826</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50826" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50826" ref_url="https://www.suse.com/security/cve/CVE-2022-50826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipu3-imgu: Fix NULL pointer dereference in imgu_subdev_set_selection()

Calling v4l2_subdev_get_try_crop() and v4l2_subdev_get_try_compose()
with a subdev state of NULL leads to a NULL pointer dereference. This
can currently happen in imgu_subdev_set_selection() when the state
passed in is NULL, as this method first gets pointers to both the "try"
and "active" states and only then decides which to use.

The same issue has been addressed for imgu_subdev_get_selection() with
commit 30d03a0de650 ("ipu3-imgu: Fix NULL pointer dereference in active
selection access"). However the issue still persists in
imgu_subdev_set_selection().

Therefore, apply a similar fix as done in the aforementioned commit to
imgu_subdev_set_selection(). To keep things a bit cleaner, introduce
helper functions for "crop" and "compose" access and use them in both
imgu_subdev_set_selection() and imgu_subdev_get_selection().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50826/">CVE-2022-50826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50826">CVE-2022-50826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256265">SUSE bug 1256265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50827</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50827" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50827" ref_url="https://www.suse.com/security/cve/CVE-2022-50827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix memory leak in lpfc_create_port()

Commit 5e633302ace1 ("scsi: lpfc: vmid: Add support for VMID in mailbox
command") introduced allocations for the VMID resources in
lpfc_create_port() after the call to scsi_host_alloc(). Upon failure on the
VMID allocations, the new code would branch to the 'out' label, which
returns NULL without unwinding anything, thus skipping the call to
scsi_host_put().

Fix the problem by creating a separate label 'out_free_vmid' to unwind the
VMID resources and make the 'out_put_shost' label call only
scsi_host_put(), as was done before the introduction of allocations for
VMID.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50827/">CVE-2022-50827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50827">CVE-2022-50827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256344">SUSE bug 1256344</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50828</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50828" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50828" ref_url="https://www.suse.com/security/cve/CVE-2022-50828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: zynqmp: Fix stack-out-of-bounds in strncpy`

"BUG: KASAN: stack-out-of-bounds in strncpy+0x30/0x68"

Linux-ATF interface is using 16 bytes of SMC payload. In case clock name is
longer than 15 bytes, string terminated NULL character will not be received
by Linux. Add explicit NULL character at last byte to fix issues when clock
name is longer.

This fixes below bug reported by KASAN:

 ==================================================================
 BUG: KASAN: stack-out-of-bounds in strncpy+0x30/0x68
 Read of size 1 at addr ffff0008c89a7410 by task swapper/0/1

 CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.4.0-00396-g81ef9e7-dirty #3
 Hardware name: Xilinx Versal vck190 Eval board revA (QSPI) (DT)
 Call trace:
  dump_backtrace+0x0/0x1e8
  show_stack+0x14/0x20
  dump_stack+0xd4/0x108
  print_address_description.isra.0+0xbc/0x37c
  __kasan_report+0x144/0x198
  kasan_report+0xc/0x18
  __asan_load1+0x5c/0x68
  strncpy+0x30/0x68
  zynqmp_clock_probe+0x238/0x7b8
  platform_drv_probe+0x6c/0xc8
  really_probe+0x14c/0x418
  driver_probe_device+0x74/0x130
  __device_attach_driver+0xc4/0xe8
  bus_for_each_drv+0xec/0x150
  __device_attach+0x160/0x1d8
  device_initial_probe+0x10/0x18
  bus_probe_device+0xe0/0xf0
  device_add+0x528/0x950
  of_device_add+0x5c/0x80
  of_platform_device_create_pdata+0x120/0x168
  of_platform_bus_create+0x244/0x4e0
  of_platform_populate+0x50/0xe8
  zynqmp_firmware_probe+0x370/0x3a8
  platform_drv_probe+0x6c/0xc8
  really_probe+0x14c/0x418
  driver_probe_device+0x74/0x130
  device_driver_attach+0x94/0xa0
  __driver_attach+0x70/0x108
  bus_for_each_dev+0xe4/0x158
  driver_attach+0x30/0x40
  bus_add_driver+0x21c/0x2b8
  driver_register+0xbc/0x1d0
  __platform_driver_register+0x7c/0x88
  zynqmp_firmware_driver_init+0x1c/0x24
  do_one_initcall+0xa4/0x234
  kernel_init_freeable+0x1b0/0x24c
  kernel_init+0x10/0x110
  ret_from_fork+0x10/0x18

 The buggy address belongs to the page:
 page:ffff0008f9be1c88 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0
 raw: 0008d00000000000 ffff0008f9be1c90 ffff0008f9be1c90 0000000000000000
 raw: 0000000000000000 0000000000000000 00000000ffffffff
 page dumped because: kasan: bad access detected

 addr ffff0008c89a7410 is located in stack of task swapper/0/1 at offset 112 in frame:
  zynqmp_clock_probe+0x0/0x7b8

 this frame has 3 objects:
  [32, 44) 'response'
  [64, 80) 'ret_payload'
  [96, 112) 'name'

 Memory state around the buggy address:
  ffff0008c89a7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  ffff0008c89a7380: 00 00 00 00 f1 f1 f1 f1 00 04 f2 f2 00 00 f2 f2
 &gt;ffff0008c89a7400: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
                          ^
  ffff0008c89a7480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  ffff0008c89a7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 ==================================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50828/">CVE-2022-50828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50828">CVE-2022-50828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256230">SUSE bug 1256230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50830</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50830" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50830" ref_url="https://www.suse.com/security/cve/CVE-2022-50830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

auxdisplay: hd44780: Fix potential memory leak in hd44780_remove()

hd44780_probe() allocates a memory chunk for hd with kzalloc() and
makes "lcd-&gt;drvdata-&gt;hd44780" point to it. When we call hd44780_remove(),
we should release all relevant memory and resource. But "lcd-&gt;drvdata
-&gt;hd44780" is not released, which will lead to a memory leak.

We should release the "lcd-&gt;drvdata-&gt;hd44780" in hd44780_remove() to fix
the memory leak bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50830/">CVE-2022-50830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50830">CVE-2022-50830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256328">SUSE bug 1256328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50832</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50832" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50832" ref_url="https://www.suse.com/security/cve/CVE-2022-50832" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: fix potential memory leak in wilc_mac_xmit()

The wilc_mac_xmit() returns NETDEV_TX_OK without freeing skb, add
dev_kfree_skb() to fix it. Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50832/">CVE-2022-50832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50832">CVE-2022-50832 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256228">SUSE bug 1256228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50833</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50833" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50833" ref_url="https://www.suse.com/security/cve/CVE-2022-50833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: use hdev-&gt;workqueue when queuing hdev-&gt;{cmd,ncmd}_timer works

syzbot is reporting attempt to schedule hdev-&gt;cmd_work work from system_wq
WQ into hdev-&gt;workqueue WQ which is under draining operation [1], for
commit c8efcc2589464ac7 ("workqueue: allow chained queueing during
destruction") does not allow such operation.

The check introduced by commit 877afadad2dce8aa ("Bluetooth: When HCI work
queue is drained, only queue chained work") was incomplete.

Use hdev-&gt;workqueue WQ when queuing hdev-&gt;{cmd,ncmd}_timer works because
hci_{cmd,ncmd}_timeout() calls queue_work(hdev-&gt;workqueue). Also, protect
the queuing operation with RCU read lock in order to avoid calling
queue_delayed_work() after cancel_delayed_work() completed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50833/">CVE-2022-50833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50833">CVE-2022-50833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256218">SUSE bug 1256218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50834</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50834" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50834" ref_url="https://www.suse.com/security/cve/CVE-2022-50834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: Fix potential resource leaks

nfc_get_device() take reference for the device, add missing
nfc_put_device() to release it when not need anymore.
Also fix the style warnning by use error EOPNOTSUPP instead of
ENOTSUPP.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50834/">CVE-2022-50834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50834">CVE-2022-50834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256219">SUSE bug 1256219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50835</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50835" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50835" ref_url="https://www.suse.com/security/cve/CVE-2022-50835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jbd2: add miss release buffer head in fc_do_one_pass()

In fc_do_one_pass() miss release buffer head after use which will lead
to reference count leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50835/">CVE-2022-50835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50835">CVE-2022-50835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256220">SUSE bug 1256220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50836</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50836" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50836" ref_url="https://www.suse.com/security/cve/CVE-2022-50836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

remoteproc: sysmon: fix memory leak in qcom_add_sysmon_subdev()

The kfree() should be called when of_irq_get_byname() fails or
devm_request_threaded_irq() fails in qcom_add_sysmon_subdev(),
otherwise there will be a memory leak, so add kfree() to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50836/">CVE-2022-50836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50836">CVE-2022-50836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256211">SUSE bug 1256211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50837</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50837" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50837" ref_url="https://www.suse.com/security/cve/CVE-2022-50837" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: tag_8021q: avoid leaking ctx on dsa_tag_8021q_register() error path

If dsa_tag_8021q_setup() fails, for example due to the inability of the
device to install a VLAN, the tag_8021q context of the switch will leak.
Make sure it is freed on the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50837/">CVE-2022-50837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50837">CVE-2022-50837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256212">SUSE bug 1256212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50838</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50838" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50838" ref_url="https://www.suse.com/security/cve/CVE-2022-50838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stream: purge sk_error_queue in sk_stream_kill_queues()

Changheon Lee reported TCP socket leaks, with a nice repro.

It seems we leak TCP sockets with the following sequence:

1) SOF_TIMESTAMPING_TX_ACK is enabled on the socket.

   Each ACK will cook an skb put in error queue, from __skb_tstamp_tx().
   __skb_tstamp_tx() is using skb_clone(), unless
   SOF_TIMESTAMPING_OPT_TSONLY was also requested.

2) If the application is also using MSG_ZEROCOPY, then we put in the
   error queue cloned skbs that had a struct ubuf_info attached to them.

   Whenever an struct ubuf_info is allocated, sock_zerocopy_alloc()
   does a sock_hold().

   As long as the cloned skbs are still in sk_error_queue,
   socket refcount is kept elevated.

3) Application closes the socket, while error queue is not empty.

Since tcp_close() no longer purges the socket error queue,
we might end up with a TCP socket with at least one skb in
error queue keeping the socket alive forever.

This bug can be (ab)used to consume all kernel memory
and freeze the host.

We need to purge the error queue, with proper synchronization
against concurrent writers.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50838/">CVE-2022-50838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50838">CVE-2022-50838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256214">SUSE bug 1256214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50839</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50839" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50839" ref_url="https://www.suse.com/security/cve/CVE-2022-50839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jbd2: fix potential buffer head reference count leak

As in 'jbd2_fc_wait_bufs' if buffer isn't uptodate, will return -EIO without
update 'journal-&gt;j_fc_off'. But 'jbd2_fc_release_bufs' will release buffer head
from 'j_fc_off - 1' if 'bh' is NULL will terminal release which will lead to
buffer head buffer head reference count leak.
To solve above issue, update 'journal-&gt;j_fc_off' before return -EIO.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50839/">CVE-2022-50839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50839">CVE-2022-50839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256206">SUSE bug 1256206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50840</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50840" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50840" ref_url="https://www.suse.com/security/cve/CVE-2022-50840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: snic: Fix possible UAF in snic_tgt_create()

Smatch reports a warning as follows:

drivers/scsi/snic/snic_disc.c:307 snic_tgt_create() warn:
  '&amp;tgt-&gt;list' not removed from list

If device_add() fails in snic_tgt_create(), tgt will be freed, but
tgt-&gt;list will not be removed from snic-&gt;disc.tgt_list, then list traversal
may cause UAF.

Remove from snic-&gt;disc.tgt_list before free().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50840/">CVE-2022-50840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50840">CVE-2022-50840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256208">SUSE bug 1256208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50841</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50841" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50841" ref_url="https://www.suse.com/security/cve/CVE-2022-50841" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Add overflow check for attribute size

The offset addition could overflow and pass the used size check given an
attribute with very large size (e.g., 0xffffff7f) while parsing MFT
attributes. This could lead to out-of-bound memory R/W if we try to
access the next attribute derived by Add2Ptr(attr, asize)

[   32.963847] BUG: unable to handle page fault for address: ffff956a83c76067
[   32.964301] #PF: supervisor read access in kernel mode
[   32.964526] #PF: error_code(0x0000) - not-present page
[   32.964893] PGD 4dc01067 P4D 4dc01067 PUD 0
[   32.965316] Oops: 0000 [#1] PREEMPT SMP NOPTI
[   32.965727] CPU: 0 PID: 243 Comm: mount Not tainted 5.19.0+ #6
[   32.966050] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[   32.966628] RIP: 0010:mi_enum_attr+0x44/0x110
[   32.967239] Code: 89 f0 48 29 c8 48 89 c1 39 c7 0f 86 94 00 00 00 8b 56 04 83 fa 17 0f 86 88 00 00 00 89 d0 01 ca 48 01 f0 8d 4a 08 39 f9a
[   32.968101] RSP: 0018:ffffba15c06a7c38 EFLAGS: 00000283
[   32.968364] RAX: ffff956a83c76067 RBX: ffff956983c76050 RCX: 000000000000006f
[   32.968651] RDX: 0000000000000067 RSI: ffff956983c760e8 RDI: 00000000000001c8
[   32.968963] RBP: ffffba15c06a7c38 R08: 0000000000000064 R09: 00000000ffffff7f
[   32.969249] R10: 0000000000000007 R11: ffff956983c760e8 R12: ffff95698225e000
[   32.969870] R13: 0000000000000000 R14: ffffba15c06a7cd8 R15: ffff95698225e170
[   32.970655] FS:  00007fdab8189e40(0000) GS:ffff9569fdc00000(0000) knlGS:0000000000000000
[   32.971098] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   32.971378] CR2: ffff956a83c76067 CR3: 0000000002c58000 CR4: 00000000000006f0
[   32.972098] Call Trace:
[   32.972842]  &lt;TASK&gt;
[   32.973341]  ni_enum_attr_ex+0xda/0xf0
[   32.974087]  ntfs_iget5+0x1db/0xde0
[   32.974386]  ? slab_post_alloc_hook+0x53/0x270
[   32.974778]  ? ntfs_fill_super+0x4c7/0x12a0
[   32.975115]  ntfs_fill_super+0x5d6/0x12a0
[   32.975336]  get_tree_bdev+0x175/0x270
[   32.975709]  ? put_ntfs+0x150/0x150
[   32.975956]  ntfs_fs_get_tree+0x15/0x20
[   32.976191]  vfs_get_tree+0x2a/0xc0
[   32.976374]  ? capable+0x19/0x20
[   32.976572]  path_mount+0x484/0xaa0
[   32.977025]  ? putname+0x57/0x70
[   32.977380]  do_mount+0x80/0xa0
[   32.977555]  __x64_sys_mount+0x8b/0xe0
[   32.978105]  do_syscall_64+0x3b/0x90
[   32.978830]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   32.979311] RIP: 0033:0x7fdab72e948a
[   32.980015] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008
[   32.981251] RSP: 002b:00007ffd15b87588 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[   32.981832] RAX: ffffffffffffffda RBX: 0000557de0aaf060 RCX: 00007fdab72e948a
[   32.982234] RDX: 0000557de0aaf260 RSI: 0000557de0aaf2e0 RDI: 0000557de0ab7ce0
[   32.982714] RBP: 0000000000000000 R08: 0000557de0aaf280 R09: 0000000000000020
[   32.983046] R10: 00000000c0ed0000 R11: 0000000000000206 R12: 0000557de0ab7ce0
[   32.983494] R13: 0000557de0aaf260 R14: 0000000000000000 R15: 00000000ffffffff
[   32.984094]  &lt;/TASK&gt;
[   32.984352] Modules linked in:
[   32.984753] CR2: ffff956a83c76067
[   32.985911] ---[ end trace 0000000000000000 ]---
[   32.986555] RIP: 0010:mi_enum_attr+0x44/0x110
[   32.987217] Code: 89 f0 48 29 c8 48 89 c1 39 c7 0f 86 94 00 00 00 8b 56 04 83 fa 17 0f 86 88 00 00 00 89 d0 01 ca 48 01 f0 8d 4a 08 39 f9a
[   32.988232] RSP: 0018:ffffba15c06a7c38 EFLAGS: 00000283
[   32.988532] RAX: ffff956a83c76067 RBX: ffff956983c76050 RCX: 000000000000006f
[   32.988916] RDX: 0000000000000067 RSI: ffff956983c760e8 RDI: 00000000000001c8
[   32.989356] RBP: ffffba15c06a7c38 R08: 0000000000000064 R09: 00000000ffffff7f
[   32.989994] R10: 0000000000000007 R11: ffff956983c760e8 R12: ffff95698225e000
[   32.990415] R13: 0000000000000000 R14: ffffba15c06a7cd8 R15: ffff95698225e170
[   32.991011] FS:  
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50841/">CVE-2022-50841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50841">CVE-2022-50841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256209">SUSE bug 1256209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50842</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50842" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50842" ref_url="https://www.suse.com/security/cve/CVE-2022-50842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/virtio: Check whether transferred 2D BO is shmem

Transferred 2D BO always must be a shmem BO. Add check for that to prevent
NULL dereference if userspace passes a VRAM BO.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50842/">CVE-2022-50842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50842">CVE-2022-50842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256202">SUSE bug 1256202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50843</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50843" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50843" ref_url="https://www.suse.com/security/cve/CVE-2022-50843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm clone: Fix UAF in clone_dtr()

Dm_clone also has the same UAF problem when dm_resume()
and dm_destroy() are concurrent.

Therefore, cancelling timer again in clone_dtr().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50843/">CVE-2022-50843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50843">CVE-2022-50843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256203">SUSE bug 1256203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50844</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50844" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50844" ref_url="https://www.suse.com/security/cve/CVE-2022-50844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix type of second parameter in odn_edit_dpm_table() callback

With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG),
indirect call targets are validated against the expected function
pointer prototype to make sure the call target is valid to help mitigate
ROP attacks. If they are not identical, there is a failure at run time,
which manifests as either a kernel panic or thread getting killed. A
proposed warning in clang aims to catch these at compile time, which
reveals:

  drivers/gpu/drm/amd/amdgpu/../pm/swsmu/amdgpu_smu.c:3008:29: error: incompatible function pointer types initializing 'int (*)(void *, uint32_t, long *, uint32_t)' (aka 'int (*)(void *, unsigned int, long *, unsigned int)') with an expression of type 'int (void *, enum PP_OD_DPM_TABLE_COMMAND, long *, uint32_t)' (aka 'int (void *, enum PP_OD_DPM_TABLE_COMMAND, long *, unsigned int)') [-Werror,-Wincompatible-function-pointer-types-strict]
          .odn_edit_dpm_table      = smu_od_edit_dpm_table,
                                     ^~~~~~~~~~~~~~~~~~~~~
  1 error generated.

There are only two implementations of -&gt;odn_edit_dpm_table() in 'struct
amd_pm_funcs': smu_od_edit_dpm_table() and pp_odn_edit_dpm_table(). One
has a second parameter type of 'enum PP_OD_DPM_TABLE_COMMAND' and the
other uses 'u32'. Ultimately, smu_od_edit_dpm_table() calls
-&gt;od_edit_dpm_table() from 'struct pptable_funcs' and
pp_odn_edit_dpm_table() calls -&gt;odn_edit_dpm_table() from 'struct
pp_hwmgr_func', which both have a second parameter type of 'enum
PP_OD_DPM_TABLE_COMMAND'.

Update the type parameter in both the prototype in 'struct amd_pm_funcs'
and pp_odn_edit_dpm_table() to 'enum PP_OD_DPM_TABLE_COMMAND', which
cleans up the warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50844/">CVE-2022-50844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50844">CVE-2022-50844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256205">SUSE bug 1256205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50845</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50845" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50845" ref_url="https://www.suse.com/security/cve/CVE-2022-50845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix inode leak in ext4_xattr_inode_create() on an error path

There is issue as follows when do setxattr with inject fault:

[localhost]# fsck.ext4  -fn  /dev/sda
e2fsck 1.46.6-rc1 (12-Sep-2022)
Pass 1: Checking inodes, blocks, and sizes
Pass 2: Checking directory structure
Pass 3: Checking directory connectivity
Pass 4: Checking reference counts
Unattached zero-length inode 15.  Clear? no

Unattached inode 15
Connect to /lost+found? no

Pass 5: Checking group summary information

/dev/sda: ********** WARNING: Filesystem still has errors **********

/dev/sda: 15/655360 files (0.0% non-contiguous), 66755/2621440 blocks

This occurs in 'ext4_xattr_inode_create()'. If 'ext4_mark_inode_dirty()'
fails, dropping i_nlink of the inode is needed. Or will lead to inode leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50845/">CVE-2022-50845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50845">CVE-2022-50845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256196">SUSE bug 1256196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50846</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50846" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50846" ref_url="https://www.suse.com/security/cve/CVE-2022-50846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: via-sdmmc: fix return value check of mmc_add_host()

mmc_add_host() may return error, if we ignore its return value,
it will lead two issues:
1. The memory that allocated in mmc_alloc_host() is leaked.
2. In the remove() path, mmc_remove_host() will be called to
   delete device, but it's not added yet, it will lead a kernel
   crash because of null-ptr-deref in device_del().

Fix this by checking the return value and goto error path which
will call mmc_free_host().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50846/">CVE-2022-50846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50846">CVE-2022-50846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256200">SUSE bug 1256200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50847</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50847" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50847" ref_url="https://www.suse.com/security/cve/CVE-2022-50847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: it6505: Initialize AUX channel in it6505_i2c_probe

During device boot, the HPD interrupt could be triggered before the DRM
subsystem registers it6505 as a DRM bridge. In such cases, the driver
tries to access AUX channel and causes NULL pointer dereference.
Initializing the AUX channel earlier to prevent such error.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50847/">CVE-2022-50847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50847">CVE-2022-50847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256198">SUSE bug 1256198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50848</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50848" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50848" ref_url="https://www.suse.com/security/cve/CVE-2022-50848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers: dio: fix possible memory leak in dio_init()

If device_register() returns error, the 'dev' and name needs be
freed. Add a release function, and then call put_device() in the
error path, so the name is freed in kobject_cleanup() and to the
'dev' is freed in release function.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50848/">CVE-2022-50848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50848">CVE-2022-50848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256192">SUSE bug 1256192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50849</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50849" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50849" ref_url="https://www.suse.com/security/cve/CVE-2022-50849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP

An oops can be induced by running 'cat /proc/kcore &gt; /dev/null' on
devices using pstore with the ram backend because kmap_atomic() assumes
lowmem pages are accessible with __va().

 Unable to handle kernel paging request at virtual address ffffff807ff2b000
 Mem abort info:
 ESR = 0x96000006
 EC = 0x25: DABT (current EL), IL = 32 bits
 SET = 0, FnV = 0
 EA = 0, S1PTW = 0
 FSC = 0x06: level 2 translation fault
 Data abort info:
 ISV = 0, ISS = 0x00000006
 CM = 0, WnR = 0
 swapper pgtable: 4k pages, 39-bit VAs, pgdp=0000000081d87000
 [ffffff807ff2b000] pgd=180000017fe18003, p4d=180000017fe18003, pud=180000017fe18003, pmd=0000000000000000
 Internal error: Oops: 96000006 [#1] PREEMPT SMP
 Modules linked in: dm_integrity
 CPU: 7 PID: 21179 Comm: perf Not tainted 5.15.67-10882-ge4eb2eb988cd #1 baa443fb8e8477896a370b31a821eb2009f9bfba
 Hardware name: Google Lazor (rev3 - 8) (DT)
 pstate: a0400009 (NzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : __memcpy+0x110/0x260
 lr : vread+0x194/0x294
 sp : ffffffc013ee39d0
 x29: ffffffc013ee39f0 x28: 0000000000001000 x27: ffffff807ff2b000
 x26: 0000000000001000 x25: ffffffc0085a2000 x24: ffffff802d4b3000
 x23: ffffff80f8a60000 x22: ffffff802d4b3000 x21: ffffffc0085a2000
 x20: ffffff8080b7bc68 x19: 0000000000001000 x18: 0000000000000000
 x17: 0000000000000000 x16: 0000000000000000 x15: ffffffd3073f2e60
 x14: ffffffffad588000 x13: 0000000000000000 x12: 0000000000000001
 x11: 00000000000001a2 x10: 00680000fff2bf0b x9 : 03fffffff807ff2b
 x8 : 0000000000000001 x7 : 0000000000000000 x6 : 0000000000000000
 x5 : ffffff802d4b4000 x4 : ffffff807ff2c000 x3 : ffffffc013ee3a78
 x2 : 0000000000001000 x1 : ffffff807ff2b000 x0 : ffffff802d4b3000
 Call trace:
 __memcpy+0x110/0x260
 read_kcore+0x584/0x778
 proc_reg_read+0xb4/0xe4

During early boot, memblock reserves the pages for the ramoops reserved
memory node in DT that would otherwise be part of the direct lowmem
mapping. Pstore's ram backend reuses those reserved pages to change the
memory type (writeback or non-cached) by passing the pages to vmap()
(see pfn_to_page() usage in persistent_ram_vmap() for more details) with
specific flags. When read_kcore() starts iterating over the vmalloc
region, it runs over the virtual address that vmap() returned for
ramoops. In aligned_vread() the virtual address is passed to
vmalloc_to_page() which returns the page struct for the reserved lowmem
area. That lowmem page is passed to kmap_atomic(), which effectively
calls page_to_virt() that assumes a lowmem page struct must be directly
accessible with __va() and friends. These pages are mapped via vmap()
though, and the lowmem mapping was never made, so accessing them via the
lowmem virtual address oopses like above.

Let's side-step this problem by passing VM_IOREMAP to vmap(). This will
tell vread() to not include the ramoops region in the kcore. Instead the
area will look like a bunch of zeros. The alternative is to teach kmap()
about vmalloc areas that intersect with lowmem. Presumably such a change
isn't a one-liner, and there isn't much interest in inspecting the
ramoops region in kcore files anyway, so the most expedient route is
taken for now.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50849/">CVE-2022-50849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50849">CVE-2022-50849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256193">SUSE bug 1256193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50850</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50850" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50850" ref_url="https://www.suse.com/security/cve/CVE-2022-50850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ipr: Fix WARNING in ipr_init()

ipr_init() will not call unregister_reboot_notifier() when
pci_register_driver() fails, which causes a WARNING. Call
unregister_reboot_notifier() when pci_register_driver() fails.

notifier callback ipr_halt [ipr] already registered
WARNING: CPU: 3 PID: 299 at kernel/notifier.c:29
notifier_chain_register+0x16d/0x230
Modules linked in: ipr(+) xhci_pci_renesas xhci_hcd ehci_hcd usbcore
led_class gpu_sched drm_buddy video wmi drm_ttm_helper ttm
drm_display_helper drm_kms_helper drm drm_panel_orientation_quirks
agpgart cfbft
CPU: 3 PID: 299 Comm: modprobe Tainted: G        W
6.1.0-rc1-00190-g39508d23b672-dirty #332
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014
RIP: 0010:notifier_chain_register+0x16d/0x230
Call Trace:
 &lt;TASK&gt;
 __blocking_notifier_chain_register+0x73/0xb0
 ipr_init+0x30/0x1000 [ipr]
 do_one_initcall+0xdb/0x480
 do_init_module+0x1cf/0x680
 load_module+0x6a50/0x70a0
 __do_sys_finit_module+0x12f/0x1c0
 do_syscall_64+0x3f/0x90
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50850/">CVE-2022-50850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50850">CVE-2022-50850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256194">SUSE bug 1256194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50851</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50851" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50851" ref_url="https://www.suse.com/security/cve/CVE-2022-50851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost_vdpa: fix the crash in unmap a large memory

While testing in vIOMMU, sometimes Guest will unmap very large memory,
which will cause the crash. To fix this, add a new function
vhost_vdpa_general_unmap(). This function will only unmap the memory
that saved in iotlb.

Call Trace:
[  647.820144] ------------[ cut here ]------------
[  647.820848] kernel BUG at drivers/iommu/intel/iommu.c:1174!
[  647.821486] invalid opcode: 0000 [#1] PREEMPT SMP PTI
[  647.822082] CPU: 10 PID: 1181 Comm: qemu-system-x86 Not tainted 6.0.0-rc1home_lulu_2452_lulu7_vhost+ #62
[  647.823139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.15.0-29-g6a62e0cb0dfe-prebuilt.qem4
[  647.824365] RIP: 0010:domain_unmap+0x48/0x110
[  647.825424] Code: 48 89 fb 8d 4c f6 1e 39 c1 0f 4f c8 83 e9 0c 83 f9 3f 7f 18 48 89 e8 48 d3 e8 48 85 c0 75 59
[  647.828064] RSP: 0018:ffffae5340c0bbf0 EFLAGS: 00010202
[  647.828973] RAX: 0000000000000001 RBX: ffff921793d10540 RCX: 000000000000001b
[  647.830083] RDX: 00000000080000ff RSI: 0000000000000001 RDI: ffff921793d10540
[  647.831214] RBP: 0000000007fc0100 R08: ffffae5340c0bcd0 R09: 0000000000000003
[  647.832388] R10: 0000007fc0100000 R11: 0000000000100000 R12: 00000000080000ff
[  647.833668] R13: ffffae5340c0bcd0 R14: ffff921793d10590 R15: 0000008000100000
[  647.834782] FS:  00007f772ec90640(0000) GS:ffff921ce7a80000(0000) knlGS:0000000000000000
[  647.836004] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  647.836990] CR2: 00007f02c27a3a20 CR3: 0000000101b0c006 CR4: 0000000000372ee0
[  647.838107] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  647.839283] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  647.840666] Call Trace:
[  647.841437]  &lt;TASK&gt;
[  647.842107]  intel_iommu_unmap_pages+0x93/0x140
[  647.843112]  __iommu_unmap+0x91/0x1b0
[  647.844003]  iommu_unmap+0x6a/0x95
[  647.844885]  vhost_vdpa_unmap+0x1de/0x1f0 [vhost_vdpa]
[  647.845985]  vhost_vdpa_process_iotlb_msg+0xf0/0x90b [vhost_vdpa]
[  647.847235]  ? _raw_spin_unlock+0x15/0x30
[  647.848181]  ? _copy_from_iter+0x8c/0x580
[  647.849137]  vhost_chr_write_iter+0xb3/0x430 [vhost]
[  647.850126]  vfs_write+0x1e4/0x3a0
[  647.850897]  ksys_write+0x53/0xd0
[  647.851688]  do_syscall_64+0x3a/0x90
[  647.852508]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  647.853457] RIP: 0033:0x7f7734ef9f4f
[  647.854408] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 29 76 f8 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c8
[  647.857217] RSP: 002b:00007f772ec8f040 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
[  647.858486] RAX: ffffffffffffffda RBX: 00000000fef00000 RCX: 00007f7734ef9f4f
[  647.859713] RDX: 0000000000000048 RSI: 00007f772ec8f090 RDI: 0000000000000010
[  647.860942] RBP: 00007f772ec8f1a0 R08: 0000000000000000 R09: 0000000000000000
[  647.862206] R10: 0000000000000001 R11: 0000000000000293 R12: 0000000000000010
[  647.863446] R13: 0000000000000002 R14: 0000000000000000 R15: ffffffff01100000
[  647.864692]  &lt;/TASK&gt;
[  647.865458] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs v]
[  647.874688] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50851/">CVE-2022-50851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50851">CVE-2022-50851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256186">SUSE bug 1256186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50852</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50852" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50852" ref_url="https://www.suse.com/security/cve/CVE-2022-50852" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921: fix use after free in mt7921_acpi_read()

Don't dereference "sar_root" after it has been freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50852/">CVE-2022-50852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50852">CVE-2022-50852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256347">SUSE bug 1256347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50853</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50853" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50853" ref_url="https://www.suse.com/security/cve/CVE-2022-50853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4: Fix a credential leak in _nfs4_discover_trunking()
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50853/">CVE-2022-50853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50853">CVE-2022-50853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256189">SUSE bug 1256189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50854</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50854" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50854" ref_url="https://www.suse.com/security/cve/CVE-2022-50854" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: virtual_ncidev: Fix memory leak in virtual_nci_send()

skb should be free in virtual_nci_send(), otherwise kmemleak will report
memleak.

Steps for reproduction (simulated in qemu):
	cd tools/testing/selftests/nci
	make
	./nci_dev

BUG: memory leak
unreferenced object 0xffff888107588000 (size 208):
  comm "nci_dev", pid 206, jiffies 4294945376 (age 368.248s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;000000008d94c8fd&gt;] __alloc_skb+0x1da/0x290
    [&lt;00000000278bc7f8&gt;] nci_send_cmd+0xa3/0x350
    [&lt;0000000081256a22&gt;] nci_reset_req+0x6b/0xa0
    [&lt;000000009e721112&gt;] __nci_request+0x90/0x250
    [&lt;000000005d556e59&gt;] nci_dev_up+0x217/0x5b0
    [&lt;00000000e618ce62&gt;] nfc_dev_up+0x114/0x220
    [&lt;00000000981e226b&gt;] nfc_genl_dev_up+0x94/0xe0
    [&lt;000000009bb03517&gt;] genl_family_rcv_msg_doit.isra.14+0x228/0x2d0
    [&lt;00000000b7f8c101&gt;] genl_rcv_msg+0x35c/0x640
    [&lt;00000000c94075ff&gt;] netlink_rcv_skb+0x11e/0x350
    [&lt;00000000440cfb1e&gt;] genl_rcv+0x24/0x40
    [&lt;0000000062593b40&gt;] netlink_unicast+0x43f/0x640
    [&lt;000000001d0b13cc&gt;] netlink_sendmsg+0x73a/0xbf0
    [&lt;000000003272487f&gt;] __sys_sendto+0x324/0x370
    [&lt;00000000ef9f1747&gt;] __x64_sys_sendto+0xdd/0x1b0
    [&lt;000000001e437841&gt;] do_syscall_64+0x3f/0x90
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50854/">CVE-2022-50854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50854">CVE-2022-50854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256187">SUSE bug 1256187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50855</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50855" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50855" ref_url="https://www.suse.com/security/cve/CVE-2022-50855" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: prevent leak of lsm program after failed attach

In [0], we added the ability to bpf_prog_attach LSM programs to cgroups,
but in our validation to make sure the prog is meant to be attached to
BPF_LSM_CGROUP, we return too early if the check fails. This results in
lack of decrementing prog's refcnt (through bpf_prog_put)
leaving the LSM program alive past the point of the expected lifecycle.
This fix allows for the decrement to take place.

[0] https://lore.kernel.org/all/20220628174314.1216643-4-sdf@google.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50855/">CVE-2022-50855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50855">CVE-2022-50855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256180">SUSE bug 1256180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50856</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50856" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50856" ref_url="https://www.suse.com/security/cve/CVE-2022-50856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix xid leak in cifs_ses_add_channel()

Before return, should free the xid, otherwise, the
xid will be leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50856/">CVE-2022-50856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50856">CVE-2022-50856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256182">SUSE bug 1256182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50857</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50857" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50857" ref_url="https://www.suse.com/security/cve/CVE-2022-50857" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rapidio: rio: fix possible name leak in rio_register_mport()

If device_register() returns error, the name allocated by dev_set_name()
need be freed.  It should use put_device() to give up the reference in the
error path, so that the name can be freed in kobject_cleanup(), and
list_del() is called to delete the port from rio_mports.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50857/">CVE-2022-50857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50857">CVE-2022-50857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256181">SUSE bug 1256181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50859</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50859" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50859" ref_url="https://www.suse.com/security/cve/CVE-2022-50859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message

Commit d5c7076b772a ("smb3: add smb3.1.1 to default dialect list")
extend the dialects from 3 to 4, but forget to decrease the extended
length when specific the dialect, then the message length is larger
than expected.

This maybe leak some info through network because not initialize the
message body.

After apply this patch, the VALIDATE_NEGOTIATE_INFO message length is
reduced from 28 bytes to 26 bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50859/">CVE-2022-50859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50859">CVE-2022-50859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256172">SUSE bug 1256172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50860</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50860" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50860" ref_url="https://www.suse.com/security/cve/CVE-2022-50860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

apparmor: Fix memleak in alloc_ns()

After changes in commit a1bd627b46d1 ("apparmor: share profile name on
replacement"), the hname member of struct aa_policy is not valid slab
object, but a subset of that, it can not be freed by kfree_sensitive(),
use aa_policy_destroy() to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50860/">CVE-2022-50860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50860">CVE-2022-50860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256174">SUSE bug 1256174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50861</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50861" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50861" ref_url="https://www.suse.com/security/cve/CVE-2022-50861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Finish converting the NFSv2 GETACL result encoder

The xdr_stream conversion inadvertently left some code that set the
page_len of the send buffer. The XDR stream encoders should handle
this automatically now.

This oversight adds garbage past the end of the Reply message.
Clients typically ignore the garbage, but NFSD does not need to send
it, as it leaks stale memory contents onto the wire.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50861/">CVE-2022-50861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50861">CVE-2022-50861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256177">SUSE bug 1256177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50862</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50862" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50862" ref_url="https://www.suse.com/security/cve/CVE-2022-50862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: prevent decl_tag from being referenced in func_proto

Syzkaller was able to hit the following issue:

------------[ cut here ]------------
WARNING: CPU: 0 PID: 3609 at kernel/bpf/btf.c:1946
btf_type_id_size+0x2d5/0x9d0 kernel/bpf/btf.c:1946
Modules linked in:
CPU: 0 PID: 3609 Comm: syz-executor361 Not tainted
6.0.0-syzkaller-02734-g0326074ff465 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 09/22/2022
RIP: 0010:btf_type_id_size+0x2d5/0x9d0 kernel/bpf/btf.c:1946
Code: ef e8 7f 8e e4 ff 41 83 ff 0b 77 28 f6 44 24 10 18 75 3f e8 6d 91
e4 ff 44 89 fe bf 0e 00 00 00 e8 20 8e e4 ff e8 5b 91 e4 ff &lt;0f&gt; 0b 45
31 f6 e9 98 02 00 00 41 83 ff 12 74 18 e8 46 91 e4 ff 44
RSP: 0018:ffffc90003cefb40 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000000
RDX: ffff8880259c0000 RSI: ffffffff81968415 RDI: 0000000000000005
RBP: ffff88801270ca00 R08: 0000000000000005 R09: 000000000000000e
R10: 0000000000000011 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000011 R14: ffff888026ee6424 R15: 0000000000000011
FS:  000055555641b300(0000) GS:ffff8880b9a00000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000f2e258 CR3: 000000007110e000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 btf_func_proto_check kernel/bpf/btf.c:4447 [inline]
 btf_check_all_types kernel/bpf/btf.c:4723 [inline]
 btf_parse_type_sec kernel/bpf/btf.c:4752 [inline]
 btf_parse kernel/bpf/btf.c:5026 [inline]
 btf_new_fd+0x1926/0x1e70 kernel/bpf/btf.c:6892
 bpf_btf_load kernel/bpf/syscall.c:4324 [inline]
 __sys_bpf+0xb7d/0x4cf0 kernel/bpf/syscall.c:5010
 __do_sys_bpf kernel/bpf/syscall.c:5069 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5067 [inline]
 __x64_sys_bpf+0x75/0xb0 kernel/bpf/syscall.c:5067
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f0fbae41c69
Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89
f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01
f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc8aeb6228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fbae41c69
RDX: 0000000000000020 RSI: 0000000020000140 RDI: 0000000000000012
RBP: 00007f0fbae05e10 R08: 0000000000000000 R09: 0000000000000000
R10: 00000000ffffffff R11: 0000000000000246 R12: 00007f0fbae05ea0
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
 &lt;/TASK&gt;

Looks like it tries to create a func_proto which return type is
decl_tag. For the details, see Martin's spot on analysis in [0].

0: https://lore.kernel.org/bpf/CAKH8qBuQDLva_hHxxBuZzyAcYNO4ejhovz6TQeVSk8HY-2SO6g@mail.gmail.com/T/#mea6524b3fcd6298347432226e81b1e6155efc62c
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50862/">CVE-2022-50862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50862">CVE-2022-50862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256166">SUSE bug 1256166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50864</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50864" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50864" ref_url="https://www.suse.com/security/cve/CVE-2022-50864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix shift-out-of-bounds due to too large exponent of block size

If field s_log_block_size of superblock data is corrupted and too large,
init_nilfs() and load_nilfs() still can trigger a shift-out-of-bounds
warning followed by a kernel panic (if panic_on_warn is set):

 shift exponent 38973 is too large for 32-bit type 'int'
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0xcd/0x134
  ubsan_epilogue+0xb/0x50
  __ubsan_handle_shift_out_of_bounds.cold.12+0x17b/0x1f5
  init_nilfs.cold.11+0x18/0x1d [nilfs2]
  nilfs_mount+0x9b5/0x12b0 [nilfs2]
  ...

This fixes the issue by adding and using a new helper function for getting
block size with sanity check.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50864/">CVE-2022-50864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50864">CVE-2022-50864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256167">SUSE bug 1256167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50865</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50865" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50865" ref_url="https://www.suse.com/security/cve/CVE-2022-50865" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: fix a signed-integer-overflow bug in tcp_add_backlog()

The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and
in tcp_add_backlog(), the variable limit is caculated by adding
sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value
of int and overflow. This patch reduces the limit budget by
halving the sndbuf to solve this issue since ACK packets are much
smaller than the payload.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50865/">CVE-2022-50865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50865">CVE-2022-50865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256168">SUSE bug 1256168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50866</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50866" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50866" ref_url="https://www.suse.com/security/cve/CVE-2022-50866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: pxa: fix null-pointer dereference in filter()

kasprintf() would return NULL pointer when kmalloc() fail to allocate.
Need to check the return pointer before calling strcmp().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50866/">CVE-2022-50866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50866">CVE-2022-50866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256162">SUSE bug 1256162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50867</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50867" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50867" ref_url="https://www.suse.com/security/cve/CVE-2022-50867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/a6xx: Fix kvzalloc vs state_kcalloc usage

adreno_show_object() is a trap!  It will re-allocate the pointer it is
passed on first call, when the data is ascii85 encoded, using kvmalloc/
kvfree().  Which means the data *passed* to it must be kvmalloc'd, ie.
we cannot use the state_kcalloc() helper.

This partially reverts commit ec8f1813bf8d ("drm/msm/a6xx: Replace
kcalloc() with kvzalloc()"), but adds the missing kvfree() to fix the
memory leak that was present previously.  And adds a warning comment.

Patchwork: https://patchwork.freedesktop.org/patch/507014/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50867/">CVE-2022-50867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50867">CVE-2022-50867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256164">SUSE bug 1256164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50869</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50869" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50869" ref_url="https://www.suse.com/security/cve/CVE-2022-50869" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fix slab-out-of-bounds in r_page

When PAGE_SIZE is 64K, if read_log_page is called by log_read_rst for
the first time, the size of *buffer would be equal to
DefaultLogPageSize(4K).But for *buffer operations like memcpy,
if the memory area size(n) which being assigned to buffer is larger
than 4K (log-&gt;page_size(64K) or bytes(64K-page_off)), it will cause
an out of boundary error.
 Call trace:
  [...]
  kasan_report+0x44/0x130
  check_memory_region+0xf8/0x1a0
  memcpy+0xc8/0x100
  ntfs_read_run_nb+0x20c/0x460
  read_log_page+0xd0/0x1f4
  log_read_rst+0x110/0x75c
  log_replay+0x1e8/0x4aa0
  ntfs_loadlog_and_replay+0x290/0x2d0
  ntfs_fill_super+0x508/0xec0
  get_tree_bdev+0x1fc/0x34c
  [...]

Fix this by setting variable r_page to NULL in log_read_rst.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50869/">CVE-2022-50869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50869">CVE-2022-50869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256163">SUSE bug 1256163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50870</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50870" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50870" ref_url="https://www.suse.com/security/cve/CVE-2022-50870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/rtas: avoid device tree lookups in rtas_os_term()

rtas_os_term() is called during panic. Its behavior depends on a couple
of conditions in the /rtas node of the device tree, the traversal of
which entails locking and local IRQ state changes. If the kernel panics
while devtree_lock is held, rtas_os_term() as currently written could
hang.

Instead of discovering the relevant characteristics at panic time,
cache them in file-static variables at boot. Note the lookup for
"ibm,extended-os-term" is converted to of_property_read_bool() since it
is a boolean property, not an RTAS function token.

[mpe: Incorporate suggested change from Nick]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50870/">CVE-2022-50870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50870">CVE-2022-50870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256154">SUSE bug 1256154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50871</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50871" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50871" ref_url="https://www.suse.com/security/cve/CVE-2022-50871" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: Fix qmi_msg_handler data structure initialization

qmi_msg_handler is required to be null terminated by QMI module.
There might be a case where a handler for a msg id is not present in the
handlers array which can lead to infinite loop while searching the handler
and therefore out of bound access in qmi_invoke_handler().
Hence update the initialization in qmi_msg_handler data structure.

Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.5.0.1-01100-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50871/">CVE-2022-50871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50871">CVE-2022-50871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256156">SUSE bug 1256156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50872</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50872" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50872" ref_url="https://www.suse.com/security/cve/CVE-2022-50872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ARM: OMAP2+: Fix memory leak in realtime_counter_init()

The "sys_clk" resource is malloced by clk_get(),
it is not released when the function return.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50872/">CVE-2022-50872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50872">CVE-2022-50872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256157">SUSE bug 1256157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50873</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50873" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50873" ref_url="https://www.suse.com/security/cve/CVE-2022-50873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa/vp_vdpa: fix kfree a wrong pointer in vp_vdpa_remove

In vp_vdpa_remove(), the code kfree(&amp;vp_vdpa_mgtdev-&gt;mgtdev.id_table) uses
a reference of pointer as the argument of kfree, which is the wrong pointer
and then may hit crash like this:

Unable to handle kernel paging request at virtual address 00ffff003363e30c
Internal error: Oops: 96000004 [#1] SMP
Call trace:
 rb_next+0x20/0x5c
 ext4_readdir+0x494/0x5c4 [ext4]
 iterate_dir+0x168/0x1b4
 __se_sys_getdents64+0x68/0x170
 __arm64_sys_getdents64+0x24/0x30
 el0_svc_common.constprop.0+0x7c/0x1bc
 do_el0_svc+0x2c/0x94
 el0_svc+0x20/0x30
 el0_sync_handler+0xb0/0xb4
 el0_sync+0x160/0x180
Code: 54000220 f9400441 b4000161 aa0103e0 (f9400821)
SMP: stopping secondary CPUs
Starting crashdump kernel...
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50873/">CVE-2022-50873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50873">CVE-2022-50873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256144">SUSE bug 1256144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50874</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50874" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50874" ref_url="https://www.suse.com/security/cve/CVE-2022-50874" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/erdma: Fix refcount leak in erdma_mmap

rdma_user_mmap_entry_get() take reference, we should release it when not
need anymore, add the missing rdma_user_mmap_entry_put() in the error
path to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50874/">CVE-2022-50874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50874">CVE-2022-50874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256148">SUSE bug 1256148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50875</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50875" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50875" ref_url="https://www.suse.com/security/cve/CVE-2022-50875" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of: overlay: fix null pointer dereferencing in find_dup_cset_node_entry() and find_dup_cset_prop()

When kmalloc() fail to allocate memory in kasprintf(), fn_1 or fn_2 will
be NULL, and strcmp() will cause null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50875/">CVE-2022-50875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50875">CVE-2022-50875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256151">SUSE bug 1256151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50876</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50876" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50876" ref_url="https://www.suse.com/security/cve/CVE-2022-50876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: musb: Fix musb_gadget.c rxstate overflow bug

The usb function device call musb_gadget_queue() adds the passed
request to musb_ep::req_list,If the (request-&gt;length &gt; musb_ep-&gt;packet_sz)
and (is_buffer_mapped(req) return false),the rxstate() will copy all data
in fifo to request-&gt;buf which may cause request-&gt;buf out of bounds.

Fix it by add the length check :
fifocnt = min_t(unsigned, request-&gt;length - request-&gt;actual, fifocnt);
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50876/">CVE-2022-50876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50876">CVE-2022-50876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256136">SUSE bug 1256136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50877</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50877" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50877" ref_url="https://www.suse.com/security/cve/CVE-2022-50877" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: broadcom: bcm4908_enet: update TX stats after actual transmission

Queueing packets doesn't guarantee their transmission. Update TX stats
after hardware confirms consuming submitted data.

This also fixes a possible race and NULL dereference.
bcm4908_enet_start_xmit() could try to access skb after freeing it in
the bcm4908_enet_poll_tx().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50877/">CVE-2022-50877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50877">CVE-2022-50877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256139">SUSE bug 1256139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50878</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50878" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50878" ref_url="https://www.suse.com/security/cve/CVE-2022-50878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init()

A NULL check for bridge-&gt;encoder shows that it may be NULL, but it
already been dereferenced on all paths leading to the check.
812	if (!bridge-&gt;encoder) {

Dereference the pointer bridge-&gt;encoder.
810	drm_connector_attach_encoder(&amp;lt9611-&gt;connector, bridge-&gt;encoder);
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50878/">CVE-2022-50878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50878">CVE-2022-50878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256140">SUSE bug 1256140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50879</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50879" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50879" ref_url="https://www.suse.com/security/cve/CVE-2022-50879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

objtool: Fix SEGFAULT

find_insn() will return NULL in case of failure. Check insn in order
to avoid a kernel Oops for NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50879/">CVE-2022-50879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50879">CVE-2022-50879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256129">SUSE bug 1256129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50880</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50880" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50880" ref_url="https://www.suse.com/security/cve/CVE-2022-50880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state()

When peer delete failed in a disconnect operation, use-after-free
detected by KFENCE in below log. It is because for each vdev_id and
address, it has only one struct ath10k_peer, it is allocated in
ath10k_peer_map_event(). When connected to an AP, it has more than
one HTT_T2H_MSG_TYPE_PEER_MAP reported from firmware, then the
array peer_map of struct ath10k will be set muti-elements to the
same ath10k_peer in ath10k_peer_map_event(). When peer delete failed
in ath10k_sta_state(), the ath10k_peer will be free for the 1st peer
id in array peer_map of struct ath10k, and then use-after-free happened
for the 2nd peer id because they map to the same ath10k_peer.

And clean up all peers in array peer_map for the ath10k_peer, then
user-after-free disappeared

peer map event log:
[  306.911021] wlan0: authenticate with b0:2a:43:e6:75:0e
[  306.957187] ath10k_pci 0000:01:00.0: mac vdev 0 peer create b0:2a:43:e6:75:0e (new sta) sta 1 / 32 peer 1 / 33
[  306.957395] ath10k_pci 0000:01:00.0: htt peer map vdev 0 peer b0:2a:43:e6:75:0e id 246
[  306.957404] ath10k_pci 0000:01:00.0: htt peer map vdev 0 peer b0:2a:43:e6:75:0e id 198
[  306.986924] ath10k_pci 0000:01:00.0: htt peer map vdev 0 peer b0:2a:43:e6:75:0e id 166

peer unmap event log:
[  435.715691] wlan0: deauthenticating from b0:2a:43:e6:75:0e by local choice (Reason: 3=DEAUTH_LEAVING)
[  435.716802] ath10k_pci 0000:01:00.0: mac vdev 0 peer delete b0:2a:43:e6:75:0e sta ffff990e0e9c2b50 (sta gone)
[  435.717177] ath10k_pci 0000:01:00.0: htt peer unmap vdev 0 peer b0:2a:43:e6:75:0e id 246
[  435.717186] ath10k_pci 0000:01:00.0: htt peer unmap vdev 0 peer b0:2a:43:e6:75:0e id 198
[  435.717193] ath10k_pci 0000:01:00.0: htt peer unmap vdev 0 peer b0:2a:43:e6:75:0e id 166

use-after-free log:
[21705.888627] wlan0: deauthenticating from d0:76:8f:82:be:75 by local choice (Reason: 3=DEAUTH_LEAVING)
[21713.799910] ath10k_pci 0000:01:00.0: failed to delete peer d0:76:8f:82:be:75 for vdev 0: -110
[21713.799925] ath10k_pci 0000:01:00.0: found sta peer d0:76:8f:82:be:75 (ptr 0000000000000000 id 102) entry on vdev 0 after it was supposedly removed
[21713.799968] ==================================================================
[21713.799991] BUG: KFENCE: use-after-free read in ath10k_sta_state+0x265/0xb8a [ath10k_core]
[21713.799991]
[21713.799997] Use-after-free read at 0x00000000abe1c75e (in kfence-#69):
[21713.800010]  ath10k_sta_state+0x265/0xb8a [ath10k_core]
[21713.800041]  drv_sta_state+0x115/0x677 [mac80211]
[21713.800059]  __sta_info_destroy_part2+0xb1/0x133 [mac80211]
[21713.800076]  __sta_info_flush+0x11d/0x162 [mac80211]
[21713.800093]  ieee80211_set_disassoc+0x12d/0x2f4 [mac80211]
[21713.800110]  ieee80211_mgd_deauth+0x26c/0x29b [mac80211]
[21713.800137]  cfg80211_mlme_deauth+0x13f/0x1bb [cfg80211]
[21713.800153]  nl80211_deauthenticate+0xf8/0x121 [cfg80211]
[21713.800161]  genl_rcv_msg+0x38e/0x3be
[21713.800166]  netlink_rcv_skb+0x89/0xf7
[21713.800171]  genl_rcv+0x28/0x36
[21713.800176]  netlink_unicast+0x179/0x24b
[21713.800181]  netlink_sendmsg+0x3a0/0x40e
[21713.800187]  sock_sendmsg+0x72/0x76
[21713.800192]  ____sys_sendmsg+0x16d/0x1e3
[21713.800196]  ___sys_sendmsg+0x95/0xd1
[21713.800200]  __sys_sendmsg+0x85/0xbf
[21713.800205]  do_syscall_64+0x43/0x55
[21713.800210]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[21713.800213]
[21713.800219] kfence-#69: 0x000000009149b0d5-0x000000004c0697fb, size=1064, cache=kmalloc-2k
[21713.800219]
[21713.800224] allocated by task 13 on cpu 0 at 21705.501373s:
[21713.800241]  ath10k_peer_map_event+0x7e/0x154 [ath10k_core]
[21713.800254]  ath10k_htt_t2h_msg_handler+0x586/0x1039 [ath10k_core]
[21713.800265]  ath10k_htt_htc_t2h_msg_handler+0x12/0x28 [ath10k_core]
[21713.800277]  ath10k_htc_rx_completion_handler+0x14c/0x1b5 [ath10k_core]
[21713.800283]  ath10k_pci_process_rx_cb+0x195/0x1d
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50880/">CVE-2022-50880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50880">CVE-2022-50880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256132">SUSE bug 1256132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50881</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50881" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50881" ref_url="https://www.suse.com/security/cve/CVE-2022-50881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect()

This patch fixes a use-after-free in ath9k that occurs in
ath9k_hif_usb_disconnect() when ath9k_destroy_wmi() is trying to access
'drv_priv' that has already been freed by ieee80211_free_hw(), called by
ath9k_htc_hw_deinit(). The patch moves ath9k_destroy_wmi() before
ieee80211_free_hw(). Note that urbs from the driver should be killed
before freeing 'wmi' with ath9k_destroy_wmi() as their callbacks will
access 'wmi'.

Found by a modified version of syzkaller.

==================================================================
BUG: KASAN: use-after-free in ath9k_destroy_wmi+0x38/0x40
Read of size 8 at addr ffff8881069132a0 by task kworker/0:1/7

CPU: 0 PID: 7 Comm: kworker/0:1 Tainted: G O 5.14.0+ #131
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014
Workqueue: usb_hub_wq hub_event
Call Trace:
 dump_stack_lvl+0x8e/0xd1
 print_address_description.constprop.0.cold+0x93/0x334
 ? ath9k_destroy_wmi+0x38/0x40
 ? ath9k_destroy_wmi+0x38/0x40
 kasan_report.cold+0x83/0xdf
 ? ath9k_destroy_wmi+0x38/0x40
 ath9k_destroy_wmi+0x38/0x40
 ath9k_hif_usb_disconnect+0x329/0x3f0
 ? ath9k_hif_usb_suspend+0x120/0x120
 ? usb_disable_interface+0xfc/0x180
 usb_unbind_interface+0x19b/0x7e0
 ? usb_autoresume_device+0x50/0x50
 device_release_driver_internal+0x44d/0x520
 bus_remove_device+0x2e5/0x5a0
 device_del+0x5b2/0xe30
 ? __device_link_del+0x370/0x370
 ? usb_remove_ep_devs+0x43/0x80
 ? remove_intf_ep_devs+0x112/0x1a0
 usb_disable_device+0x1e3/0x5a0
 usb_disconnect+0x267/0x870
 hub_event+0x168d/0x3950
 ? rcu_read_lock_sched_held+0xa1/0xd0
 ? hub_port_debounce+0x2e0/0x2e0
 ? check_irq_usage+0x860/0xf20
 ? drain_workqueue+0x281/0x360
 ? lock_release+0x640/0x640
 ? rcu_read_lock_sched_held+0xa1/0xd0
 ? rcu_read_lock_bh_held+0xb0/0xb0
 ? lockdep_hardirqs_on_prepare+0x273/0x3e0
 process_one_work+0x92b/0x1460
 ? pwq_dec_nr_in_flight+0x330/0x330
 ? rwlock_bug.part.0+0x90/0x90
 worker_thread+0x95/0xe00
 ? __kthread_parkme+0x115/0x1e0
 ? process_one_work+0x1460/0x1460
 kthread+0x3a1/0x480
 ? set_kthread_struct+0x120/0x120
 ret_from_fork+0x1f/0x30

The buggy address belongs to the page:
page:ffffea00041a44c0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106913
flags: 0x200000000000000(node=0|zone=2)
raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 3, migratetype Unmovable, gfp_mask 0x40dc0(GFP_KERNEL|__GFP_COMP|__GFP_ZERO), pid 7, ts 38347963444, free_ts 41399957635
 prep_new_page+0x1aa/0x240
 get_page_from_freelist+0x159a/0x27c0
 __alloc_pages+0x2da/0x6a0
 alloc_pages+0xec/0x1e0
 kmalloc_order+0x39/0xf0
 kmalloc_order_trace+0x19/0x120
 __kmalloc+0x308/0x390
 wiphy_new_nm+0x6f5/0x1dd0
 ieee80211_alloc_hw_nm+0x36d/0x2230
 ath9k_htc_probe_device+0x9d/0x1e10
 ath9k_htc_hw_init+0x34/0x50
 ath9k_hif_usb_firmware_cb+0x25f/0x4e0
 request_firmware_work_func+0x131/0x240
 process_one_work+0x92b/0x1460
 worker_thread+0x95/0xe00
 kthread+0x3a1/0x480
page last free stack trace:
 free_pcp_prepare+0x3d3/0x7f0
 free_unref_page+0x1e/0x3d0
 device_release+0xa4/0x240
 kobject_put+0x186/0x4c0
 put_device+0x20/0x30
 ath9k_htc_disconnect_device+0x1cf/0x2c0
 ath9k_htc_hw_deinit+0x26/0x30
 ath9k_hif_usb_disconnect+0x2d9/0x3f0
 usb_unbind_interface+0x19b/0x7e0
 device_release_driver_internal+0x44d/0x520
 bus_remove_device+0x2e5/0x5a0
 device_del+0x5b2/0xe30
 usb_disable_device+0x1e3/0x5a0
 usb_disconnect+0x267/0x870
 hub_event+0x168d/0x3950
 process_one_work+0x92b/0x1460

Memory state around the buggy address:
 ffff888106913180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
 ffff888106913200: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
&gt;ffff888
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50881/">CVE-2022-50881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50881">CVE-2022-50881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256130">SUSE bug 1256130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50882</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50882" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50882" ref_url="https://www.suse.com/security/cve/CVE-2022-50882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Fix memory leak in uvc_gpio_parse

Previously the unit buffer was allocated before checking the IRQ for
privacy GPIO. In case of error, the unit buffer was leaked.

Allocate the unit buffer after the IRQ to avoid it.

Addresses-Coverity-ID: 1474639 ("Resource leak")
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50882/">CVE-2022-50882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50882">CVE-2022-50882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256126">SUSE bug 1256126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50883</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50883" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50883" ref_url="https://www.suse.com/security/cve/CVE-2022-50883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Prevent decl_tag from being referenced in func_proto arg

Syzkaller managed to hit another decl_tag issue:

  btf_func_proto_check kernel/bpf/btf.c:4506 [inline]
  btf_check_all_types kernel/bpf/btf.c:4734 [inline]
  btf_parse_type_sec+0x1175/0x1980 kernel/bpf/btf.c:4763
  btf_parse kernel/bpf/btf.c:5042 [inline]
  btf_new_fd+0x65a/0xb00 kernel/bpf/btf.c:6709
  bpf_btf_load+0x6f/0x90 kernel/bpf/syscall.c:4342
  __sys_bpf+0x50a/0x6c0 kernel/bpf/syscall.c:5034
  __do_sys_bpf kernel/bpf/syscall.c:5093 [inline]
  __se_sys_bpf kernel/bpf/syscall.c:5091 [inline]
  __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5091
  do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48

This seems similar to commit ea68376c8bed ("bpf: prevent decl_tag from being
referenced in func_proto") but for the argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50883/">CVE-2022-50883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50883">CVE-2022-50883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256128">SUSE bug 1256128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50884</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50884" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50884" ref_url="https://www.suse.com/security/cve/CVE-2022-50884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: Prevent drm_copy_field() to attempt copying a NULL pointer

There are some struct drm_driver fields that are required by drivers since
drm_copy_field() attempts to copy them to user-space via DRM_IOCTL_VERSION.

But it can be possible that a driver has a bug and did not set some of the
fields, which leads to drm_copy_field() attempting to copy a NULL pointer:

[ +10.395966] Unable to handle kernel access to user memory outside uaccess routines at virtual address 0000000000000000
[  +0.010955] Mem abort info:
[  +0.002835]   ESR = 0x0000000096000004
[  +0.003872]   EC = 0x25: DABT (current EL), IL = 32 bits
[  +0.005395]   SET = 0, FnV = 0
[  +0.003113]   EA = 0, S1PTW = 0
[  +0.003182]   FSC = 0x04: level 0 translation fault
[  +0.004964] Data abort info:
[  +0.002919]   ISV = 0, ISS = 0x00000004
[  +0.003886]   CM = 0, WnR = 0
[  +0.003040] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000115dad000
[  +0.006536] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000
[  +0.006925] Internal error: Oops: 96000004 [#1] SMP
...
[  +0.011113] pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  +0.007061] pc : __pi_strlen+0x14/0x150
[  +0.003895] lr : drm_copy_field+0x30/0x1a4
[  +0.004156] sp : ffff8000094b3a50
[  +0.003355] x29: ffff8000094b3a50 x28: ffff8000094b3b70 x27: 0000000000000040
[  +0.007242] x26: ffff443743c2ba00 x25: 0000000000000000 x24: 0000000000000040
[  +0.007243] x23: ffff443743c2ba00 x22: ffff8000094b3b70 x21: 0000000000000000
[  +0.007241] x20: 0000000000000000 x19: ffff8000094b3b90 x18: 0000000000000000
[  +0.007241] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaab14b9af40
[  +0.007241] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  +0.007239] x11: 0000000000000000 x10: 0000000000000000 x9 : ffffa524ad67d4d8
[  +0.007242] x8 : 0101010101010101 x7 : 7f7f7f7f7f7f7f7f x6 : 6c6e6263606e7141
[  +0.007239] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
[  +0.007241] x2 : 0000000000000000 x1 : ffff8000094b3b90 x0 : 0000000000000000
[  +0.007240] Call trace:
[  +0.002475]  __pi_strlen+0x14/0x150
[  +0.003537]  drm_version+0x84/0xac
[  +0.003448]  drm_ioctl_kernel+0xa8/0x16c
[  +0.003975]  drm_ioctl+0x270/0x580
[  +0.003448]  __arm64_sys_ioctl+0xb8/0xfc
[  +0.003978]  invoke_syscall+0x78/0x100
[  +0.003799]  el0_svc_common.constprop.0+0x4c/0xf4
[  +0.004767]  do_el0_svc+0x38/0x4c
[  +0.003357]  el0_svc+0x34/0x100
[  +0.003185]  el0t_64_sync_handler+0x11c/0x150
[  +0.004418]  el0t_64_sync+0x190/0x194
[  +0.003716] Code: 92402c04 b200c3e8 f13fc09f 5400088c (a9400c02)
[  +0.006180] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50884/">CVE-2022-50884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50884">CVE-2022-50884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256127">SUSE bug 1256127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50885</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50885" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50885" ref_url="https://www.suse.com/security/cve/CVE-2022-50885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix NULL-ptr-deref in rxe_qp_do_cleanup() when socket create failed

There is a null-ptr-deref when mount.cifs over rdma:

  BUG: KASAN: null-ptr-deref in rxe_qp_do_cleanup+0x2f3/0x360 [rdma_rxe]
  Read of size 8 at addr 0000000000000018 by task mount.cifs/3046

  CPU: 2 PID: 3046 Comm: mount.cifs Not tainted 6.1.0-rc5+ #62
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc3
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x34/0x44
   kasan_report+0xad/0x130
   rxe_qp_do_cleanup+0x2f3/0x360 [rdma_rxe]
   execute_in_process_context+0x25/0x90
   __rxe_cleanup+0x101/0x1d0 [rdma_rxe]
   rxe_create_qp+0x16a/0x180 [rdma_rxe]
   create_qp.part.0+0x27d/0x340
   ib_create_qp_kernel+0x73/0x160
   rdma_create_qp+0x100/0x230
   _smbd_get_connection+0x752/0x20f0
   smbd_get_connection+0x21/0x40
   cifs_get_tcp_session+0x8ef/0xda0
   mount_get_conns+0x60/0x750
   cifs_mount+0x103/0xd00
   cifs_smb3_do_mount+0x1dd/0xcb0
   smb3_get_tree+0x1d5/0x300
   vfs_get_tree+0x41/0xf0
   path_mount+0x9b3/0xdd0
   __x64_sys_mount+0x190/0x1d0
   do_syscall_64+0x35/0x80
   entry_SYSCALL_64_after_hwframe+0x46/0xb0

The root cause of the issue is the socket create failed in
rxe_qp_init_req().

So move the reset rxe_qp_do_cleanup() after the NULL ptr check.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50885/">CVE-2022-50885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50885">CVE-2022-50885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256122">SUSE bug 1256122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50886</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50886" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50886" ref_url="https://www.suse.com/security/cve/CVE-2022-50886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: toshsd: fix return value check of mmc_add_host()

mmc_add_host() may return error, if we ignore its return value, the memory
that allocated in mmc_alloc_host() will be leaked and it will lead a kernel
crash because of deleting not added device in the remove path.

So fix this by checking the return value and goto error path which will call
mmc_free_host(), besides, free_irq() also needs be called.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50886/">CVE-2022-50886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50886">CVE-2022-50886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256124">SUSE bug 1256124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50887</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50887" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50887" ref_url="https://www.suse.com/security/cve/CVE-2022-50887" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: core: fix unbalanced of node refcount in regulator_dev_lookup()

I got the the following report:

  OF: ERROR: memory leak, expected refcount 1 instead of 2,
  of_node_get()/of_node_put() unbalanced - destroy cset entry:
  attach overlay node /i2c/pmic@62/regulators/exten

In of_get_regulator(), the node is returned from of_parse_phandle()
with refcount incremented, after using it, of_node_put() need be called.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50887/">CVE-2022-50887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50887">CVE-2022-50887 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256125">SUSE bug 1256125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50888</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50888" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50888" ref_url="https://www.suse.com/security/cve/CVE-2022-50888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

remoteproc: qcom: q6v5: Fix potential null-ptr-deref in q6v5_wcss_init_mmio()

q6v5_wcss_init_mmio() will call platform_get_resource_byname() that may
fail and return NULL. devm_ioremap() will use res-&gt;start as input, which
may causes null-ptr-deref. Check the ret value of
platform_get_resource_byname() to avoid the null-ptr-deref.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50888/">CVE-2022-50888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50888">CVE-2022-50888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256057">SUSE bug 1256057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50889</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50889" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50889" ref_url="https://www.suse.com/security/cve/CVE-2022-50889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm integrity: Fix UAF in dm_integrity_dtr()

Dm_integrity also has the same UAF problem when dm_resume()
and dm_destroy() are concurrent.

Therefore, cancelling timer again in dm_integrity_dtr().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50889/">CVE-2022-50889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50889">CVE-2022-50889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256056">SUSE bug 1256056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39325</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39325" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3098-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036979.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHLNOE5TP7BJKIUIINHT2OD2ZR672SJX/" source="SUSE-SU"/>
    <description>
    A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216109">SUSE bug 1216109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230323">SUSE bug 1230323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009699741" comment="containerized-data-importer-manifests is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962708" comment="ignition is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009699742" comment="kubevirt-manifests is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009699743" comment="kubevirt-virtctl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009343329" comment="podman is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958376" comment="podman-docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871694" comment="podman-remote is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958377" comment="podmansh is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659876" comment="skopeo is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45288</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45288" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1121-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1160-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3098-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3155-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0420-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-February/038343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14399-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4SYE7WTKUNXNTHQW42V7UBGJBEQBHRTP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14400-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZZCCVQLIJ7QABQ7SEQNIICQGIOXKWPA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NNZGCIESABPBXHMTGTQFNKICWRW67ACD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14744-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XZS7XT62LC6S42NWSITGMUS7QX5RQGAX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC2EUYZRCX6GXM6Y26SHEX6QS2URIZ2I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCWJWNWXOFGQ73SBS66L5ZCYZ5J7FOQY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15145-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLZDGCKYKLU6M3753VM7UMQPAHBYR63F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHSZPRYNEYI2KIIJZMPPNQRPAMZ5ILGP/" source="SUSE-SU"/>
    <description>
    An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221400">SUSE bug 1221400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009699741" comment="containerized-data-importer-manifests is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958738" comment="docker-compose is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962708" comment="ignition is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009699742" comment="kubevirt-manifests is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009699743" comment="kubevirt-virtctl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45853</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45853" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45853" ref_url="https://www.suse.com/security/cve/CVE-2023-45853" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2431-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21013-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045395.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14857-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ABXZCXAJPKFIKTZDV7F2NZKSAF3WVEW/" source="SUSE-SU"/>
    <description>
    MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-13"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45853/">CVE-2023-45853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45853">CVE-2023-45853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216378">SUSE bug 1216378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056312" comment="libz1-1.2.13-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056313" comment="zlib-devel-1.2.13-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52925</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52925" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52925" ref_url="https://www.suse.com/security/cve/CVE-2023-52925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: don't fail inserts if duplicate has expired

nftables selftests fail:
run-tests.sh testcases/sets/0044interval_overlap_0
Expected: 0-2 . 0-3, got:
W: [FAILED]     ./testcases/sets/0044interval_overlap_0: got 1

Insertion must ignore duplicate but expired entries.

Moreover, there is a strange asymmetry in nft_pipapo_activate:

It refetches the current element, whereas the other -&gt;activate callbacks
(bitmap, hash, rhash, rbtree) use elem-&gt;priv.
Same for .remove: other set implementations take elem-&gt;priv,
nft_pipapo_remove fetches elem-&gt;priv, then does a relookup,
remove this.

I suspect this was the reason for the change that prompted the
removal of the expired check in pipapo_get() in the first place,
but skipping exired elements there makes no sense to me, this helper
is used for normal get requests, insertions (duplicate check)
and deactivate callback.

In first two cases expired elements must be skipped.

For -&gt;deactivate(), this gets called for DELSETELEM, so it
seems to me that expired elements should be skipped as well, i.e.
delete request should fail with -ENOENT error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52925/">CVE-2023-52925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52925">CVE-2023-52925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236822">SUSE bug 1236822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246009">SUSE bug 1246009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53008</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53008" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53008" ref_url="https://www.suse.com/security/cve/CVE-2023-53008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix potential memory leaks in session setup

Make sure to free cifs_ses::auth_key.response before allocating it as
we might end up leaking memory in reconnect or mounting.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53008/">CVE-2023-53008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53008">CVE-2023-53008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240318">SUSE bug 1240318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53150</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53150" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53150" ref_url="https://www.suse.com/security/cve/CVE-2023-53150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Pointer may be dereferenced

Klocwork tool reported pointer 'rport' returned from call to function
fc_bsg_to_rport() may be NULL and will be dereferenced.

Add a fix to validate rport before dereferencing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53150/">CVE-2023-53150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53150">CVE-2023-53150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249853">SUSE bug 1249853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53153</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53153" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53153" ref_url="https://www.suse.com/security/cve/CVE-2023-53153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: Fix use after free for wext

Key information in wext.connect is not reset on (re)connect and can hold
data from a previous connection.

Reset key data to avoid that drivers or mac80211 incorrectly detect a
WEP connection request and access the freed or already reused memory.

Additionally optimize cfg80211_sme_connect() and avoid an useless
schedule of conn_work.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53153/">CVE-2023-53153 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53153">CVE-2023-53153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249877">SUSE bug 1249877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53178</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53178" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53178" ref_url="https://www.suse.com/security/cve/CVE-2023-53178" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19931" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002216.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: fix zswap writeback race condition

The zswap writeback mechanism can cause a race condition resulting in
memory corruption, where a swapped out page gets swapped in with data that
was written to a different page.

The race unfolds like this:
1. a page with data A and swap offset X is stored in zswap
2. page A is removed off the LRU by zpool driver for writeback in
   zswap-shrink work, data for A is mapped by zpool driver
3. user space program faults and invalidates page entry A, offset X is
   considered free
4. kswapd stores page B at offset X in zswap (zswap could also be
   full, if so, page B would then be IOed to X, then skip step 5.)
5. entry A is replaced by B in tree-&gt;rbroot, this doesn't affect the
   local reference held by zswap-shrink work
6. zswap-shrink work writes back A at X, and frees zswap entry A
7. swapin of slot X brings A in memory instead of B

The fix:
Once the swap page cache has been allocated (case ZSWAP_SWAPCACHE_NEW),
zswap-shrink work just checks that the local zswap_entry reference is
still the same as the one in the tree.  If it's not the same it means that
it's either been invalidated or replaced, in both cases the writeback is
aborted because the local entry contains stale data.

Reproducer:
I originally found this by running `stress` overnight to validate my work
on the zswap writeback mechanism, it manifested after hours on my test
machine.  The key to make it happen is having zswap writebacks, so
whatever setup pumps /sys/kernel/debug/zswap/written_back_pages should do
the trick.

In order to reproduce this faster on a vm, I setup a system with ~100M of
available memory and a 500M swap file, then running `stress --vm 1
--vm-bytes 300000000 --vm-stride 4000` makes it happen in matter of tens
of minutes.  One can speed things up even more by swinging
/sys/module/zswap/parameters/max_pool_percent up and down between, say, 20
and 1; this makes it reproduce in tens of seconds.  It's crucial to set
`--vm-stride` to something other than 4096 otherwise `stress` won't
realize that memory has been corrupted because all pages would have the
same data.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53178/">CVE-2023-53178 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53178">CVE-2023-53178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249827">SUSE bug 1249827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53185</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53185" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53185" ref_url="https://www.suse.com/security/cve/CVE-2023-53185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes

A bad USB device is able to construct a service connection response
message with target endpoint being ENDPOINT0 which is reserved for
HTC_CTRL_RSVD_SVC and should not be modified to be used for any other
services.

Reject such service connection responses.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53185/">CVE-2023-53185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53185">CVE-2023-53185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249820">SUSE bug 1249820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53188</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53188" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53188" ref_url="https://www.suse.com/security/cve/CVE-2023-53188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix race on port output

assume the following setup on a single machine:
1. An openvswitch instance with one bridge and default flows
2. two network namespaces "server" and "client"
3. two ovs interfaces "server" and "client" on the bridge
4. for each ovs interface a veth pair with a matching name and 32 rx and
   tx queues
5. move the ends of the veth pairs to the respective network namespaces
6. assign ip addresses to each of the veth ends in the namespaces (needs
   to be the same subnet)
7. start some http server on the server network namespace
8. test if a client in the client namespace can reach the http server

when following the actions below the host has a chance of getting a cpu
stuck in a infinite loop:
1. send a large amount of parallel requests to the http server (around
   3000 curls should work)
2. in parallel delete the network namespace (do not delete interfaces or
   stop the server, just kill the namespace)

there is a low chance that this will cause the below kernel cpu stuck
message. If this does not happen just retry.
Below there is also the output of bpftrace for the functions mentioned
in the output.

The series of events happening here is:
1. the network namespace is deleted calling
   `unregister_netdevice_many_notify` somewhere in the process
2. this sets first `NETREG_UNREGISTERING` on both ends of the veth and
   then runs `synchronize_net`
3. it then calls `call_netdevice_notifiers` with `NETDEV_UNREGISTER`
4. this is then handled by `dp_device_event` which calls
   `ovs_netdev_detach_dev` (if a vport is found, which is the case for
   the veth interface attached to ovs)
5. this removes the rx_handlers of the device but does not prevent
   packages to be sent to the device
6. `dp_device_event` then queues the vport deletion to work in
   background as a ovs_lock is needed that we do not hold in the
   unregistration path
7. `unregister_netdevice_many_notify` continues to call
   `netdev_unregister_kobject` which sets `real_num_tx_queues` to 0
8. port deletion continues (but details are not relevant for this issue)
9. at some future point the background task deletes the vport

If after 7. but before 9. a packet is send to the ovs vport (which is
not deleted at this point in time) which forwards it to the
`dev_queue_xmit` flow even though the device is unregistering.
In `skb_tx_hash` (which is called in the `dev_queue_xmit`) path there is
a while loop (if the packet has a rx_queue recorded) that is infinite if
`dev-&gt;real_num_tx_queues` is zero.

To prevent this from happening we update `do_output` to handle devices
without carrier the same as if the device is not found (which would
be the code path after 9. is done).

Additionally we now produce a warning in `skb_tx_hash` if we will hit
the infinite loop.

bpftrace (first word is function name):

__dev_queue_xmit server: real_num_tx_queues: 1, cpu: 2, pid: 28024, tid: 28024, skb_addr: 0xffff9edb6f207000, reg_state: 1
netdev_core_pick_tx server: addr: 0xffff9f0a46d4a000 real_num_tx_queues: 1, cpu: 2, pid: 28024, tid: 28024, skb_addr: 0xffff9edb6f207000, reg_state: 1
dp_device_event server: real_num_tx_queues: 1 cpu 9, pid: 21024, tid: 21024, event 2, reg_state: 1
synchronize_rcu_expedited: cpu 9, pid: 21024, tid: 21024
synchronize_rcu_expedited: cpu 9, pid: 21024, tid: 21024
synchronize_rcu_expedited: cpu 9, pid: 21024, tid: 21024
synchronize_rcu_expedited: cpu 9, pid: 21024, tid: 21024
dp_device_event server: real_num_tx_queues: 1 cpu 9, pid: 21024, tid: 21024, event 6, reg_state: 2
ovs_netdev_detach_dev server: real_num_tx_queues: 1 cpu 9, pid: 21024, tid: 21024, reg_state: 2
netdev_rx_handler_unregister server: real_num_tx_queues: 1, cpu: 9, pid: 21024, tid: 21024, reg_state: 2
synchronize_rcu_expedited: cpu 9, pid: 21024, tid: 21024
netdev_rx_handler_unregister ret server: real_num_tx_queues: 1, cpu: 9, pid: 21024, tid: 21024, reg_state: 2
dp_
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53188/">CVE-2023-53188 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53188">CVE-2023-53188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249854">SUSE bug 1249854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53189</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53189" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53189" ref_url="https://www.suse.com/security/cve/CVE-2023-53189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6/addrconf: fix a potential refcount underflow for idev

Now in addrconf_mod_rs_timer(), reference idev depends on whether
rs_timer is not pending. Then modify rs_timer timeout.

There is a time gap in [1], during which if the pending rs_timer
becomes not pending. It will miss to hold idev, but the rs_timer
is activated. Thus rs_timer callback function addrconf_rs_timer()
will be executed and put idev later without holding idev. A refcount
underflow issue for idev can be caused by this.

	if (!timer_pending(&amp;idev-&gt;rs_timer))
		in6_dev_hold(idev);
		  &lt;--------------[1]
	mod_timer(&amp;idev-&gt;rs_timer, jiffies + when);

To fix the issue, hold idev if mod_timer() return 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53189/">CVE-2023-53189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53189">CVE-2023-53189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249894">SUSE bug 1249894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53201</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53201" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53201" ref_url="https://www.suse.com/security/cve/CVE-2023-53201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/bnxt_re: wraparound mbox producer index

Driver is not handling the wraparound of the mbox producer index correctly.
Currently the wraparound happens once u32 max is reached.

Bit 31 of the producer index register is special and should be set
only once for the first command. Because the producer index overflow
setting bit31 after a long time, FW goes to initialization sequence
and this causes FW hang.

Fix is to wraparound the mbox producer index once it reaches u16 max.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53201/">CVE-2023-53201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53201">CVE-2023-53201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249687">SUSE bug 1249687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53204</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53204" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53204" ref_url="https://www.suse.com/security/cve/CVE-2023-53204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Fix data-races around user-&gt;unix_inflight.

user-&gt;unix_inflight is changed under spin_lock(unix_gc_lock),
but too_many_unix_fds() reads it locklessly.

Let's annotate the write/read accesses to user-&gt;unix_inflight.

BUG: KCSAN: data-race in unix_attach_fds / unix_inflight

write to 0xffffffff8546f2d0 of 8 bytes by task 44798 on cpu 1:
 unix_inflight+0x157/0x180 net/unix/scm.c:66
 unix_attach_fds+0x147/0x1e0 net/unix/scm.c:123
 unix_scm_to_skb net/unix/af_unix.c:1827 [inline]
 unix_dgram_sendmsg+0x46a/0x14f0 net/unix/af_unix.c:1950
 unix_seqpacket_sendmsg net/unix/af_unix.c:2308 [inline]
 unix_seqpacket_sendmsg+0xba/0x130 net/unix/af_unix.c:2292
 sock_sendmsg_nosec net/socket.c:725 [inline]
 sock_sendmsg+0x148/0x160 net/socket.c:748
 ____sys_sendmsg+0x4e4/0x610 net/socket.c:2494
 ___sys_sendmsg+0xc6/0x140 net/socket.c:2548
 __sys_sendmsg+0x94/0x140 net/socket.c:2577
 __do_sys_sendmsg net/socket.c:2586 [inline]
 __se_sys_sendmsg net/socket.c:2584 [inline]
 __x64_sys_sendmsg+0x45/0x50 net/socket.c:2584
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x6e/0xd8

read to 0xffffffff8546f2d0 of 8 bytes by task 44814 on cpu 0:
 too_many_unix_fds net/unix/scm.c:101 [inline]
 unix_attach_fds+0x54/0x1e0 net/unix/scm.c:110
 unix_scm_to_skb net/unix/af_unix.c:1827 [inline]
 unix_dgram_sendmsg+0x46a/0x14f0 net/unix/af_unix.c:1950
 unix_seqpacket_sendmsg net/unix/af_unix.c:2308 [inline]
 unix_seqpacket_sendmsg+0xba/0x130 net/unix/af_unix.c:2292
 sock_sendmsg_nosec net/socket.c:725 [inline]
 sock_sendmsg+0x148/0x160 net/socket.c:748
 ____sys_sendmsg+0x4e4/0x610 net/socket.c:2494
 ___sys_sendmsg+0xc6/0x140 net/socket.c:2548
 __sys_sendmsg+0x94/0x140 net/socket.c:2577
 __do_sys_sendmsg net/socket.c:2586 [inline]
 __se_sys_sendmsg net/socket.c:2584 [inline]
 __x64_sys_sendmsg+0x45/0x50 net/socket.c:2584
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x6e/0xd8

value changed: 0x000000000000000c -&gt; 0x000000000000000d

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 PID: 44814 Comm: systemd-coredum Not tainted 6.4.0-11989-g6843306689af #6
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53204/">CVE-2023-53204 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53204">CVE-2023-53204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249682">SUSE bug 1249682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53226</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53226" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53226" ref_url="https://www.suse.com/security/cve/CVE-2023-53226" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19447" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Fix OOB and integer underflow when rx packets

Make sure mwifiex_process_mgmt_packet,
mwifiex_process_sta_rx_packet and mwifiex_process_uap_rx_packet,
mwifiex_uap_queue_bridged_pkt and mwifiex_process_rx_packet
not out-of-bounds access the skb-&gt;data buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53226/">CVE-2023-53226 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53226">CVE-2023-53226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249658">SUSE bug 1249658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53229</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53229" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53229" ref_url="https://www.suse.com/security/cve/CVE-2023-53229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta

Avoid potential data corruption issues caused by uninitialized driver
private data structures.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53229/">CVE-2023-53229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53229">CVE-2023-53229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249650">SUSE bug 1249650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53248</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53248" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53248" ref_url="https://www.suse.com/security/cve/CVE-2023-53248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: install stub fence into potential unused fence pointers

When using cpu to update page tables, vm update fences are unused.
Install stub fence into these fence pointers instead of NULL
to avoid NULL dereference when calling dma_fence_wait() on them.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53248/">CVE-2023-53248 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53248">CVE-2023-53248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249779">SUSE bug 1249779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53254</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53254" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53254" ref_url="https://www.suse.com/security/cve/CVE-2023-53254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cacheinfo: Fix shared_cpu_map to handle shared caches at different levels

The cacheinfo sets up the shared_cpu_map by checking whether the caches
with the same index are shared between CPUs. However, this will trigger
slab-out-of-bounds access if the CPUs do not have the same cache hierarchy.
Another problem is the mismatched shared_cpu_map when the shared cache does
not have the same index between CPUs.

CPU0	I	D	L3
index	0	1	2	x
	^	^	^	^
index	0	1	2	3
CPU1	I	D	L2	L3

This patch checks each cache is shared with all caches on other CPUs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53254/">CVE-2023-53254 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53254">CVE-2023-53254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249871">SUSE bug 1249871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250731">SUSE bug 1250731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53259</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53259" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53259" ref_url="https://www.suse.com/security/cve/CVE-2023-53259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

VMCI: check context-&gt;notify_page after call to get_user_pages_fast() to avoid GPF

The call to get_user_pages_fast() in vmci_host_setup_notify() can return
NULL context-&gt;notify_page causing a GPF. To avoid GPF check if
context-&gt;notify_page == NULL and return error if so.

general protection fault, probably for non-canonical address
    0xe0009d1000000060: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: maybe wild-memory-access in range [0x0005088000000300-
    0x0005088000000307]
CPU: 2 PID: 26180 Comm: repro_34802241 Not tainted 6.1.0-rc4 #1
Hardware name: Red Hat KVM, BIOS 1.15.0-2.module+el8.6.0 04/01/2014
RIP: 0010:vmci_ctx_check_signal_notify+0x91/0xe0
Call Trace:
 &lt;TASK&gt;
 vmci_host_unlocked_ioctl+0x362/0x1f40
 __x64_sys_ioctl+0x1a1/0x230
 do_syscall_64+0x3a/0x90
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53259/">CVE-2023-53259 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53259">CVE-2023-53259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249767">SUSE bug 1249767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53270</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53270" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53270" ref_url="https://www.suse.com/security/cve/CVE-2023-53270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix i_disksize exceeding i_size problem in paritally written case

It is possible for i_disksize can exceed i_size, triggering a warning.

generic_perform_write
 copied = iov_iter_copy_from_user_atomic(len) // copied &lt; len
 ext4_da_write_end
 | ext4_update_i_disksize
 |  new_i_size = pos + copied;
 |  WRITE_ONCE(EXT4_I(inode)-&gt;i_disksize, newsize) // update i_disksize
 | generic_write_end
 |  copied = block_write_end(copied, len) // copied = 0
 |   if (unlikely(copied &lt; len))
 |    if (!PageUptodate(page))
 |     copied = 0;
 |  if (pos + copied &gt; inode-&gt;i_size) // return false
 if (unlikely(copied == 0))
  goto again;
 if (unlikely(iov_iter_fault_in_readable(i, bytes))) {
  status = -EFAULT;
  break;
 }

We get i_disksize greater than i_size here, which could trigger WARNING
check 'i_size_read(inode) &lt; EXT4_I(inode)-&gt;i_disksize' while doing dio:

ext4_dio_write_iter
 iomap_dio_rw
  __iomap_dio_rw // return err, length is not aligned to 512
 ext4_handle_inode_extension
  WARN_ON_ONCE(i_size_read(inode) &lt; EXT4_I(inode)-&gt;i_disksize) // Oops

 WARNING: CPU: 2 PID: 2609 at fs/ext4/file.c:319
 CPU: 2 PID: 2609 Comm: aa Not tainted 6.3.0-rc2
 RIP: 0010:ext4_file_write_iter+0xbc7
 Call Trace:
  vfs_write+0x3b1
  ksys_write+0x77
  do_syscall_64+0x39

Fix it by updating 'copied' value before updating i_disksize just like
ext4_write_inline_data_end() does.

A reproducer can be found in the buganizer link below.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53270/">CVE-2023-53270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53270">CVE-2023-53270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249872">SUSE bug 1249872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53285</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53285" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53285" ref_url="https://www.suse.com/security/cve/CVE-2023-53285" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: add bounds checking in get_max_inline_xattr_value_size()

Normally the extended attributes in the inode body would have been
checked when the inode is first opened, but if someone is writing to
the block device while the file system is mounted, it's possible for
the inode table to get corrupted.  Add bounds checking to avoid
reading beyond the end of allocated memory if this happens.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53285/">CVE-2023-53285 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53285">CVE-2023-53285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249855">SUSE bug 1249855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250195">SUSE bug 1250195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53295</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53295" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53295" ref_url="https://www.suse.com/security/cve/CVE-2023-53295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udf: Do not update file length for failed writes to inline files

When write to inline file fails (or happens only partly), we still
updated length of inline data as if the whole write succeeded. Fix the
update of length of inline data to happen only if the write succeeds.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53295/">CVE-2023-53295 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53295">CVE-2023-53295 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250324">SUSE bug 1250324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53298</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53298" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53298" ref_url="https://www.suse.com/security/cve/CVE-2023-53298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: fix memory leak of se_io context in nfc_genl_se_io

The callback context for sending/receiving APDUs to/from the selected
secure element is allocated inside nfc_genl_se_io and supposed to be
eventually freed in se_io_cb callback function. However, there are several
error paths where the bwi_timer is not charged to call se_io_cb later, and
the cb_context is leaked.

The patch proposes to free the cb_context explicitly on those error paths.

At the moment we can't simply check 'dev-&gt;ops-&gt;se_io()' return value as it
may be negative in both cases: when the timer was charged and was not.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53298/">CVE-2023-53298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53298">CVE-2023-53298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249944">SUSE bug 1249944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53299</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53299" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53299" ref_url="https://www.suse.com/security/cve/CVE-2023-53299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix leak of 'r10bio-&gt;remaining' for recovery

raid10_sync_request() will add 'r10bio-&gt;remaining' for both rdev and
replacement rdev. However, if the read io fails, recovery_request_write()
returns without issuing the write io, in this case, end_sync_request()
is only called once and 'remaining' is leaked, cause an io hang.

Fix the problem by decreasing 'remaining' according to if 'bio' and
'repl_bio' is valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53299/">CVE-2023-53299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53299">CVE-2023-53299 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249927">SUSE bug 1249927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53302</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53302" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53302" ref_url="https://www.suse.com/security/cve/CVE-2023-53302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwl4965: Add missing check for create_singlethread_workqueue()

Add the check for the return value of the create_singlethread_workqueue()
in order to avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53302/">CVE-2023-53302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53302">CVE-2023-53302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249958">SUSE bug 1249958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53307</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53307" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53307" ref_url="https://www.suse.com/security/cve/CVE-2023-53307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails

If getting an ID or setting up a work queue in rbd_dev_create() fails,
use-after-free on rbd_dev-&gt;rbd_client, rbd_dev-&gt;spec and rbd_dev-&gt;opts
is triggered in do_rbd_add().  The root cause is that the ownership of
these structures is transfered to rbd_dev prematurely and they all end
up getting freed when rbd_dev_create() calls rbd_dev_free() prior to
returning to do_rbd_add().

Found by Linux Verification Center (linuxtesting.org) with SVACE, an
incomplete patch submitted by Natalia Petrova &lt;n.petrova@fintech.ru&gt;.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53307/">CVE-2023-53307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53307">CVE-2023-53307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250043">SUSE bug 1250043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53309</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53309" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53309" ref_url="https://www.suse.com/security/cve/CVE-2023-53309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Fix integer overflow in radeon_cs_parser_init

The type of size is unsigned, if size is 0x40000000, there will be an
integer overflow, size will be zero after size *= sizeof(uint32_t),
will cause uninitialized memory to be referenced later
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53309/">CVE-2023-53309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53309">CVE-2023-53309 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250055">SUSE bug 1250055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53317</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53317" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53317" ref_url="https://www.suse.com/security/cve/CVE-2023-53317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix WARNING in mb_find_extent

Syzbot found the following issue:

EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support!
EXT4-fs (loop0): orphan cleanup on readonly fs
------------[ cut here ]------------
WARNING: CPU: 1 PID: 5067 at fs/ext4/mballoc.c:1869 mb_find_extent+0x8a1/0xe30
Modules linked in:
CPU: 1 PID: 5067 Comm: syz-executor307 Not tainted 6.2.0-rc1-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
RIP: 0010:mb_find_extent+0x8a1/0xe30 fs/ext4/mballoc.c:1869
RSP: 0018:ffffc90003c9e098 EFLAGS: 00010293
RAX: ffffffff82405731 RBX: 0000000000000041 RCX: ffff8880783457c0
RDX: 0000000000000000 RSI: 0000000000000041 RDI: 0000000000000040
RBP: 0000000000000040 R08: ffffffff82405723 R09: ffffed10053c9402
R10: ffffed10053c9402 R11: 1ffff110053c9401 R12: 0000000000000000
R13: ffffc90003c9e538 R14: dffffc0000000000 R15: ffffc90003c9e2cc
FS:  0000555556665300(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000056312f6796f8 CR3: 0000000022437000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ext4_mb_complex_scan_group+0x353/0x1100 fs/ext4/mballoc.c:2307
 ext4_mb_regular_allocator+0x1533/0x3860 fs/ext4/mballoc.c:2735
 ext4_mb_new_blocks+0xddf/0x3db0 fs/ext4/mballoc.c:5605
 ext4_ext_map_blocks+0x1868/0x6880 fs/ext4/extents.c:4286
 ext4_map_blocks+0xa49/0x1cc0 fs/ext4/inode.c:651
 ext4_getblk+0x1b9/0x770 fs/ext4/inode.c:864
 ext4_bread+0x2a/0x170 fs/ext4/inode.c:920
 ext4_quota_write+0x225/0x570 fs/ext4/super.c:7105
 write_blk fs/quota/quota_tree.c:64 [inline]
 get_free_dqblk+0x34a/0x6d0 fs/quota/quota_tree.c:130
 do_insert_tree+0x26b/0x1aa0 fs/quota/quota_tree.c:340
 do_insert_tree+0x722/0x1aa0 fs/quota/quota_tree.c:375
 do_insert_tree+0x722/0x1aa0 fs/quota/quota_tree.c:375
 do_insert_tree+0x722/0x1aa0 fs/quota/quota_tree.c:375
 dq_insert_tree fs/quota/quota_tree.c:401 [inline]
 qtree_write_dquot+0x3b6/0x530 fs/quota/quota_tree.c:420
 v2_write_dquot+0x11b/0x190 fs/quota/quota_v2.c:358
 dquot_acquire+0x348/0x670 fs/quota/dquot.c:444
 ext4_acquire_dquot+0x2dc/0x400 fs/ext4/super.c:6740
 dqget+0x999/0xdc0 fs/quota/dquot.c:914
 __dquot_initialize+0x3d0/0xcf0 fs/quota/dquot.c:1492
 ext4_process_orphan+0x57/0x2d0 fs/ext4/orphan.c:329
 ext4_orphan_cleanup+0xb60/0x1340 fs/ext4/orphan.c:474
 __ext4_fill_super fs/ext4/super.c:5516 [inline]
 ext4_fill_super+0x81cd/0x8700 fs/ext4/super.c:5644
 get_tree_bdev+0x400/0x620 fs/super.c:1282
 vfs_get_tree+0x88/0x270 fs/super.c:1489
 do_new_mount+0x289/0xad0 fs/namespace.c:3145
 do_mount fs/namespace.c:3488 [inline]
 __do_sys_mount fs/namespace.c:3697 [inline]
 __se_sys_mount+0x2d3/0x3c0 fs/namespace.c:3674
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Add some debug information:
mb_find_extent: mb_find_extent block=41, order=0 needed=64 next=0 ex=0/41/1@3735929054 64 64 7
block_bitmap: ff 3f 0c 00 fc 01 00 00 d2 3d 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff

Acctually, blocks per group is 64, but block bitmap indicate at least has
128 blocks. Now, ext4_validate_block_bitmap() didn't check invalid block's
bitmap if set.
To resolve above issue, add check like fsck "Padding at end of block bitmap is
not set".
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53317/">CVE-2023-53317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53317">CVE-2023-53317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250081">SUSE bug 1250081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250194">SUSE bug 1250194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53335</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53335" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53335" ref_url="https://www.suse.com/security/cve/CVE-2023-53335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/cxgb4: Fix potential null-ptr-deref in pass_establish()

If get_ep_from_tid() fails to lookup non-NULL value for ep, ep is
dereferenced later regardless of whether it is empty.
This patch adds a simple sanity check to fix the issue.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53335/">CVE-2023-53335 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53335">CVE-2023-53335 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250072">SUSE bug 1250072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53339</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53339" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53339" ref_url="https://www.suse.com/security/cve/CVE-2023-53339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix BUG_ON condition in btrfs_cancel_balance

Pausing and canceling balance can race to interrupt balance lead to BUG_ON
panic in btrfs_cancel_balance. The BUG_ON condition in btrfs_cancel_balance
does not take this race scenario into account.

However, the race condition has no other side effects. We can fix that.

Reproducing it with panic trace like this:

  kernel BUG at fs/btrfs/volumes.c:4618!
  RIP: 0010:btrfs_cancel_balance+0x5cf/0x6a0
  Call Trace:
   &lt;TASK&gt;
   ? do_nanosleep+0x60/0x120
   ? hrtimer_nanosleep+0xb7/0x1a0
   ? sched_core_clone_cookie+0x70/0x70
   btrfs_ioctl_balance_ctl+0x55/0x70
   btrfs_ioctl+0xa46/0xd20
   __x64_sys_ioctl+0x7d/0xa0
   do_syscall_64+0x38/0x80
   entry_SYSCALL_64_after_hwframe+0x63/0xcd

  Race scenario as follows:
  &gt; mutex_unlock(&amp;fs_info-&gt;balance_mutex);
  &gt; --------------------
  &gt; .......issue pause and cancel req in another thread
  &gt; --------------------
  &gt; ret = __btrfs_balance(fs_info);
  &gt;
  &gt; mutex_lock(&amp;fs_info-&gt;balance_mutex);
  &gt; if (ret == -ECANCELED &amp;&amp; atomic_read(&amp;fs_info-&gt;balance_pause_req)) {
  &gt;         btrfs_info(fs_info, "balance: paused");
  &gt;         btrfs_exclop_balance(fs_info, BTRFS_EXCLOP_BALANCE_PAUSED);
  &gt; }
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53339/">CVE-2023-53339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53339">CVE-2023-53339 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250329">SUSE bug 1250329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53348</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53348" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53348" ref_url="https://www.suse.com/security/cve/CVE-2023-53348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix deadlock when aborting transaction during relocation with scrub

Before relocating a block group we pause scrub, then do the relocation and
then unpause scrub. The relocation process requires starting and committing
a transaction, and if we have a failure in the critical section of the
transaction commit path (transaction state &gt;= TRANS_STATE_COMMIT_START),
we will deadlock if there is a paused scrub.

That results in stack traces like the following:

  [42.479] BTRFS info (device sdc): relocating block group 53876686848 flags metadata|raid6
  [42.936] BTRFS warning (device sdc): Skipping commit of aborted transaction.
  [42.936] ------------[ cut here ]------------
  [42.936] BTRFS: Transaction aborted (error -28)
  [42.936] WARNING: CPU: 11 PID: 346822 at fs/btrfs/transaction.c:1977 btrfs_commit_transaction+0xcc8/0xeb0 [btrfs]
  [42.936] Modules linked in: dm_flakey dm_mod loop btrfs (...)
  [42.936] CPU: 11 PID: 346822 Comm: btrfs Tainted: G        W          6.3.0-rc2-btrfs-next-127+ #1
  [42.936] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
  [42.936] RIP: 0010:btrfs_commit_transaction+0xcc8/0xeb0 [btrfs]
  [42.936] Code: ff ff 45 8b (...)
  [42.936] RSP: 0018:ffffb58649633b48 EFLAGS: 00010282
  [42.936] RAX: 0000000000000000 RBX: ffff8be6ef4d5bd8 RCX: 0000000000000000
  [42.936] RDX: 0000000000000002 RSI: ffffffffb35e7782 RDI: 00000000ffffffff
  [42.936] RBP: ffff8be6ef4d5c98 R08: 0000000000000000 R09: ffffb586496339e8
  [42.936] R10: 0000000000000001 R11: 0000000000000001 R12: ffff8be6d38c7c00
  [42.936] R13: 00000000ffffffe4 R14: ffff8be6c268c000 R15: ffff8be6ef4d5cf0
  [42.936] FS:  00007f381a82b340(0000) GS:ffff8beddfcc0000(0000) knlGS:0000000000000000
  [42.936] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [42.936] CR2: 00007f1e35fb7638 CR3: 0000000117680006 CR4: 0000000000370ee0
  [42.936] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  [42.936] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  [42.936] Call Trace:
  [42.936]  &lt;TASK&gt;
  [42.936]  ? start_transaction+0xcb/0x610 [btrfs]
  [42.936]  prepare_to_relocate+0x111/0x1a0 [btrfs]
  [42.936]  relocate_block_group+0x57/0x5d0 [btrfs]
  [42.936]  ? btrfs_wait_nocow_writers+0x25/0xb0 [btrfs]
  [42.936]  btrfs_relocate_block_group+0x248/0x3c0 [btrfs]
  [42.936]  ? __pfx_autoremove_wake_function+0x10/0x10
  [42.936]  btrfs_relocate_chunk+0x3b/0x150 [btrfs]
  [42.936]  btrfs_balance+0x8ff/0x11d0 [btrfs]
  [42.936]  ? __kmem_cache_alloc_node+0x14a/0x410
  [42.936]  btrfs_ioctl+0x2334/0x32c0 [btrfs]
  [42.937]  ? mod_objcg_state+0xd2/0x360
  [42.937]  ? refill_obj_stock+0xb0/0x160
  [42.937]  ? seq_release+0x25/0x30
  [42.937]  ? __rseq_handle_notify_resume+0x3b5/0x4b0
  [42.937]  ? percpu_counter_add_batch+0x2e/0xa0
  [42.937]  ? __x64_sys_ioctl+0x88/0xc0
  [42.937]  __x64_sys_ioctl+0x88/0xc0
  [42.937]  do_syscall_64+0x38/0x90
  [42.937]  entry_SYSCALL_64_after_hwframe+0x72/0xdc
  [42.937] RIP: 0033:0x7f381a6ffe9b
  [42.937] Code: 00 48 89 44 24 (...)
  [42.937] RSP: 002b:00007ffd45ecf060 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
  [42.937] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f381a6ffe9b
  [42.937] RDX: 00007ffd45ecf150 RSI: 00000000c4009420 RDI: 0000000000000003
  [42.937] RBP: 0000000000000003 R08: 0000000000000013 R09: 0000000000000000
  [42.937] R10: 00007f381a60c878 R11: 0000000000000246 R12: 00007ffd45ed0423
  [42.937] R13: 00007ffd45ecf150 R14: 0000000000000000 R15: 00007ffd45ecf148
  [42.937]  &lt;/TASK&gt;
  [42.937] ---[ end trace 0000000000000000 ]---
  [42.937] BTRFS: error (device sdc: state A) in cleanup_transaction:1977: errno=-28 No space left
  [59.196] INFO: task btrfs:346772 blocked for more than 120 seconds.
  [59.196]       Tainted: G        W          6.3.0-rc2-btrfs-next-127+ #1
  [59.196] "echo 0 &gt; /proc/sys/kernel/hung_
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53348/">CVE-2023-53348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53348">CVE-2023-53348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250018">SUSE bug 1250018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53365</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53365" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53365" ref_url="https://www.suse.com/security/cve/CVE-2023-53365" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002461.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22910" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip6mr: Fix skb_under_panic in ip6mr_cache_report()

skbuff: skb_under_panic: text:ffffffff88771f69 len:56 put:-4
 head:ffff88805f86a800 data:ffff887f5f86a850 tail:0x88 end:0x2c0 dev:pim6reg
 ------------[ cut here ]------------
 kernel BUG at net/core/skbuff.c:192!
 invalid opcode: 0000 [#1] PREEMPT SMP KASAN
 CPU: 2 PID: 22968 Comm: kworker/2:11 Not tainted 6.5.0-rc3-00044-g0a8db05b571a #236
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
 Workqueue: ipv6_addrconf addrconf_dad_work
 RIP: 0010:skb_panic+0x152/0x1d0
 Call Trace:
  &lt;TASK&gt;
  skb_push+0xc4/0xe0
  ip6mr_cache_report+0xd69/0x19b0
  reg_vif_xmit+0x406/0x690
  dev_hard_start_xmit+0x17e/0x6e0
  __dev_queue_xmit+0x2d6a/0x3d20
  vlan_dev_hard_start_xmit+0x3ab/0x5c0
  dev_hard_start_xmit+0x17e/0x6e0
  __dev_queue_xmit+0x2d6a/0x3d20
  neigh_connected_output+0x3ed/0x570
  ip6_finish_output2+0x5b5/0x1950
  ip6_finish_output+0x693/0x11c0
  ip6_output+0x24b/0x880
  NF_HOOK.constprop.0+0xfd/0x530
  ndisc_send_skb+0x9db/0x1400
  ndisc_send_rs+0x12a/0x6c0
  addrconf_dad_completed+0x3c9/0xea0
  addrconf_dad_work+0x849/0x1420
  process_one_work+0xa22/0x16e0
  worker_thread+0x679/0x10c0
  ret_from_fork+0x28/0x60
  ret_from_fork_asm+0x11/0x20

When setup a vlan device on dev pim6reg, DAD ns packet may sent on reg_vif_xmit().
reg_vif_xmit()
    ip6mr_cache_report()
        skb_push(skb, -skb_network_offset(pkt));//skb_network_offset(pkt) is 4
And skb_push declared as:
	void *skb_push(struct sk_buff *skb, unsigned int len);
		skb-&gt;data -= len;
		//0xffff88805f86a84c - 0xfffffffc = 0xffff887f5f86a850
skb-&gt;data is set to 0xffff887f5f86a850, which is invalid mem addr, lead to skb_push() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53365/">CVE-2023-53365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53365">CVE-2023-53365 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249988">SUSE bug 1249988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53369</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53369" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53369" ref_url="https://www.suse.com/security/cve/CVE-2023-53369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dcb: choose correct policy to parse DCB_ATTR_BCN

The dcbnl_bcn_setcfg uses erroneous policy to parse tb[DCB_ATTR_BCN],
which is introduced in commit 859ee3c43812 ("DCB: Add support for DCB
BCN"). Please see the comment in below code

static int dcbnl_bcn_setcfg(...)
{
  ...
  ret = nla_parse_nested_deprecated(..., dcbnl_pfc_up_nest, .. )
  // !!! dcbnl_pfc_up_nest for attributes
  //  DCB_PFC_UP_ATTR_0 to DCB_PFC_UP_ATTR_ALL in enum dcbnl_pfc_up_attrs
  ...
  for (i = DCB_BCN_ATTR_RP_0; i &lt;= DCB_BCN_ATTR_RP_7; i++) {
  // !!! DCB_BCN_ATTR_RP_0 to DCB_BCN_ATTR_RP_7 in enum dcbnl_bcn_attrs
    ...
    value_byte = nla_get_u8(data[i]);
    ...
  }
  ...
  for (i = DCB_BCN_ATTR_BCNA_0; i &lt;= DCB_BCN_ATTR_RI; i++) {
  // !!! DCB_BCN_ATTR_BCNA_0 to DCB_BCN_ATTR_RI in enum dcbnl_bcn_attrs
  ...
    value_int = nla_get_u32(data[i]);
  ...
  }
  ...
}

That is, the nla_parse_nested_deprecated uses dcbnl_pfc_up_nest
attributes to parse nlattr defined in dcbnl_pfc_up_attrs. But the
following access code fetch each nlattr as dcbnl_bcn_attrs attributes.
By looking up the associated nla_policy for dcbnl_bcn_attrs. We can find
the beginning part of these two policies are "same".

static const struct nla_policy dcbnl_pfc_up_nest[...] = {
        [DCB_PFC_UP_ATTR_0]   = {.type = NLA_U8},
        [DCB_PFC_UP_ATTR_1]   = {.type = NLA_U8},
        [DCB_PFC_UP_ATTR_2]   = {.type = NLA_U8},
        [DCB_PFC_UP_ATTR_3]   = {.type = NLA_U8},
        [DCB_PFC_UP_ATTR_4]   = {.type = NLA_U8},
        [DCB_PFC_UP_ATTR_5]   = {.type = NLA_U8},
        [DCB_PFC_UP_ATTR_6]   = {.type = NLA_U8},
        [DCB_PFC_UP_ATTR_7]   = {.type = NLA_U8},
        [DCB_PFC_UP_ATTR_ALL] = {.type = NLA_FLAG},
};

static const struct nla_policy dcbnl_bcn_nest[...] = {
        [DCB_BCN_ATTR_RP_0]         = {.type = NLA_U8},
        [DCB_BCN_ATTR_RP_1]         = {.type = NLA_U8},
        [DCB_BCN_ATTR_RP_2]         = {.type = NLA_U8},
        [DCB_BCN_ATTR_RP_3]         = {.type = NLA_U8},
        [DCB_BCN_ATTR_RP_4]         = {.type = NLA_U8},
        [DCB_BCN_ATTR_RP_5]         = {.type = NLA_U8},
        [DCB_BCN_ATTR_RP_6]         = {.type = NLA_U8},
        [DCB_BCN_ATTR_RP_7]         = {.type = NLA_U8},
        [DCB_BCN_ATTR_RP_ALL]       = {.type = NLA_FLAG},
        // from here is somewhat different
        [DCB_BCN_ATTR_BCNA_0]       = {.type = NLA_U32},
        ...
        [DCB_BCN_ATTR_ALL]          = {.type = NLA_FLAG},
};

Therefore, the current code is buggy and this
nla_parse_nested_deprecated could overflow the dcbnl_pfc_up_nest and use
the adjacent nla_policy to parse attributes from DCB_BCN_ATTR_BCNA_0.

Hence use the correct policy dcbnl_bcn_nest to parse the nested
tb[DCB_ATTR_BCN] TLV.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53369/">CVE-2023-53369 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53369">CVE-2023-53369 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250206">SUSE bug 1250206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53373</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53373" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53373" ref_url="https://www.suse.com/security/cve/CVE-2023-53373" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002101.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18297" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002123.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: seqiv - Handle EBUSY correctly

As it is seqiv only handles the special return value of EINPROGERSS,
which means that in all other cases it will free data related to the
request.

However, as the caller of seqiv may specify MAY_BACKLOG, we also need
to expect EBUSY and treat it in the same way.  Otherwise backlogged
requests will trigger a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53373/">CVE-2023-53373 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53373">CVE-2023-53373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250137">SUSE bug 1250137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53384</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53384" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53384" ref_url="https://www.suse.com/security/cve/CVE-2023-53384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: avoid possible NULL skb pointer dereference

In 'mwifiex_handle_uap_rx_forward()', always check the value
returned by 'skb_copy()' to avoid potential NULL pointer
dereference in 'mwifiex_uap_queue_bridged_pkt()', and drop
original skb in case of copying failure.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53384/">CVE-2023-53384 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53384">CVE-2023-53384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250127">SUSE bug 1250127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53387</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53387" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53387" ref_url="https://www.suse.com/security/cve/CVE-2023-53387" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Fix device management cmd timeout flow

In the UFS error handling flow, the host will send a device management cmd
(NOP OUT) to the device for link recovery. If this cmd times out and
clearing the doorbell fails, ufshcd_wait_for_dev_cmd() will do nothing and
return. hba-&gt;dev_cmd.complete struct is not set to NULL.

When this happens, if cmd has been completed by device, then we will call
complete() in __ufshcd_transfer_req_compl(). Because the complete struct is
allocated on the stack, the following crash will occur:

  ipanic_die+0x24/0x38 [mrdump]
  die+0x344/0x748
  arm64_notify_die+0x44/0x104
  do_debug_exception+0x104/0x1e0
  el1_dbg+0x38/0x54
  el1_sync_handler+0x40/0x88
  el1_sync+0x8c/0x140
  queued_spin_lock_slowpath+0x2e4/0x3c0
  __ufshcd_transfer_req_compl+0x3b0/0x1164
  ufshcd_trc_handler+0x15c/0x308
  ufshcd_host_reset_and_restore+0x54/0x260
  ufshcd_reset_and_restore+0x28c/0x57c
  ufshcd_err_handler+0xeb8/0x1b6c
  process_one_work+0x288/0x964
  worker_thread+0x4bc/0xc7c
  kthread+0x15c/0x264
  ret_from_fork+0x10/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53387/">CVE-2023-53387 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53387">CVE-2023-53387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250321">SUSE bug 1250321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53391</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53391" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53391" ref_url="https://www.suse.com/security/cve/CVE-2023-53391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs

As the ramfs-based tmpfs uses ramfs_init_fs_context() for the
init_fs_context method, which allocates fc-&gt;s_fs_info, use ramfs_kill_sb()
to free it and avoid a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53391/">CVE-2023-53391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53391">CVE-2023-53391 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250117">SUSE bug 1250117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53397</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53397" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53397" ref_url="https://www.suse.com/security/cve/CVE-2023-53397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

modpost: fix off by one in is_executable_section()

The &gt; comparison should be &gt;= to prevent an out of bounds array
access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53397/">CVE-2023-53397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53397">CVE-2023-53397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250125">SUSE bug 1250125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53400</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53400" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53400" ref_url="https://www.suse.com/security/cve/CVE-2023-53400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: Fix Oops by 9.1 surround channel names

get_line_out_pfx() may trigger an Oops by overflowing the static array
with more than 8 channels.  This was reported for MacBookPro 12,1 with
Cirrus codec.

As a workaround, extend for the 9.1 channels and also fix the
potential Oops by unifying the code paths accessing the same array
with the proper size check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53400/">CVE-2023-53400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53400">CVE-2023-53400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250328">SUSE bug 1250328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53436</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53436" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53436" ref_url="https://www.suse.com/security/cve/CVE-2023-53436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: snic: Fix possible memory leak if device_add() fails

If device_add() returns error, the name allocated by dev_set_name() needs
be freed. As the comment of device_add() says, put_device() should be used
to give up the reference in the error path. So fix this by calling
put_device(), then the name can be freed in kobject_cleanp().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53436/">CVE-2023-53436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53436">CVE-2023-53436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250156">SUSE bug 1250156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53454</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53454" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53454" ref_url="https://www.suse.com/security/cve/CVE-2023-53454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: multitouch: Correct devm device reference for hidinput input_dev name

Reference the HID device rather than the input device for the devm
allocation of the input_dev name. Referencing the input_dev would lead to a
use-after-free when the input_dev was unregistered and subsequently fires a
uevent that depends on the name. At the point of firing the uevent, the
name would be freed by devres management.

Use devm_kasprintf to simplify the logic for allocating memory and
formatting the input_dev name string.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53454/">CVE-2023-53454 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53454">CVE-2023-53454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250759">SUSE bug 1250759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53456</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53456" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53456" ref_url="https://www.suse.com/security/cve/CVE-2023-53456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla4xxx: Add length check when parsing nlattrs

There are three places that qla4xxx parses nlattrs:

 - qla4xxx_set_chap_entry()

 - qla4xxx_iface_set_param()

 - qla4xxx_sysfs_ddb_set_param()

and each of them directly converts the nlattr to specific pointer of
structure without length checking. This could be dangerous as those
attributes are not validated and a malformed nlattr (e.g., length 0) could
result in an OOB read that leaks heap dirty data.

Add the nla_len check before accessing the nlattr data and return EINVAL if
the length check fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53456/">CVE-2023-53456 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53456">CVE-2023-53456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250765">SUSE bug 1250765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53484</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53484" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53484" ref_url="https://www.suse.com/security/cve/CVE-2023-53484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib: cpu_rmap: Avoid use after free on rmap-&gt;obj array entries

When calling irq_set_affinity_notifier() with NULL at the notify
argument, it will cause freeing of the glue pointer in the
corresponding array entry but will leave the pointer in the array. A
subsequent call to free_irq_cpu_rmap() will try to free this entry again
leading to possible use after free.

Fix that by setting NULL to the array entry and checking that we have
non-zero at the array entry when iterating over the array in
free_irq_cpu_rmap().

The current code does not suffer from this since there are no cases
where irq_set_affinity_notifier(irq, NULL) (note the NULL passed for the
notify arg) is called, followed by a call to free_irq_cpu_rmap() so we
don't hit and issue. Subsequent patches in this series excersize this
flow, hence the required fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53484/">CVE-2023-53484 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53484">CVE-2023-53484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250895">SUSE bug 1250895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53491</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53491" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53491" ref_url="https://www.suse.com/security/cve/CVE-2023-53491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

start_kernel: Add __no_stack_protector function attribute

Back during the discussion of
commit a9a3ed1eff36 ("x86: Fix early boot crash on gcc-10, third try")
we discussed the need for a function attribute to control the omission
of stack protectors on a per-function basis; at the time Clang had
support for no_stack_protector but GCC did not. This was fixed in
gcc-11. Now that the function attribute is available, let's start using
it.

Callers of boot_init_stack_canary need to use this function attribute
unless they're compiled with -fno-stack-protector, otherwise the canary
stored in the stack slot of the caller will differ upon the call to
boot_init_stack_canary. This will lead to a call to __stack_chk_fail()
then panic.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53491/">CVE-2023-53491 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53491">CVE-2023-53491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250942">SUSE bug 1250942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53506</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53506" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53506" ref_url="https://www.suse.com/security/cve/CVE-2023-53506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udf: Do not bother merging very long extents

When merging very long extents we try to push as much length as possible
to the first extent. However this is unnecessarily complicated and not
really worth the trouble. Furthermore there was a bug in the logic
resulting in corrupting extents in the file as syzbot reproducer shows.
So just don't bother with the merging of extents that are too long
together.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53506/">CVE-2023-53506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53506">CVE-2023-53506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250963">SUSE bug 1250963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53517</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53517" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53517" ref_url="https://www.suse.com/security/cve/CVE-2023-53517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: do not update mtu if msg_max is too small in mtu negotiation

When doing link mtu negotiation, a malicious peer may send Activate msg
with a very small mtu, e.g. 4 in Shuang's testing, without checking for
the minimum mtu, l-&gt;mtu will be set to 4 in tipc_link_proto_rcv(), then
n-&gt;links[bearer_id].mtu is set to 4294967228, which is a overflow of
'4 - INT_H_SIZE - EMSG_OVERHEAD' in tipc_link_mss().

With tipc_link.mtu = 4, tipc_link_xmit() kept printing the warning:

 tipc: Too large msg, purging xmit list 1 5 0 40 4!
 tipc: Too large msg, purging xmit list 1 15 0 60 4!

And with tipc_link_entry.mtu 4294967228, a huge skb was allocated in
named_distribute(), and when purging it in tipc_link_xmit(), a crash
was even caused:

  general protection fault, probably for non-canonical address 0x2100001011000dd: 0000 [#1] PREEMPT SMP PTI
  CPU: 0 PID: 0 Comm: swapper/0 Kdump: loaded Not tainted 6.3.0.neta #19
  RIP: 0010:kfree_skb_list_reason+0x7e/0x1f0
  Call Trace:
   &lt;IRQ&gt;
   skb_release_data+0xf9/0x1d0
   kfree_skb_reason+0x40/0x100
   tipc_link_xmit+0x57a/0x740 [tipc]
   tipc_node_xmit+0x16c/0x5c0 [tipc]
   tipc_named_node_up+0x27f/0x2c0 [tipc]
   tipc_node_write_unlock+0x149/0x170 [tipc]
   tipc_rcv+0x608/0x740 [tipc]
   tipc_udp_recv+0xdc/0x1f0 [tipc]
   udp_queue_rcv_one_skb+0x33e/0x620
   udp_unicast_rcv_skb.isra.72+0x75/0x90
   __udp4_lib_rcv+0x56d/0xc20
   ip_protocol_deliver_rcu+0x100/0x2d0

This patch fixes it by checking the new mtu against tipc_bearer_min_mtu(),
and not updating mtu if it is too small.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53517/">CVE-2023-53517 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53517">CVE-2023-53517 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250919">SUSE bug 1250919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53519</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53519" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53519" ref_url="https://www.suse.com/security/cve/CVE-2023-53519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-mem2mem: add lock to protect parameter num_rdy

Getting below error when using KCSAN to check the driver. Adding lock to
protect parameter num_rdy when getting the value with function:
v4l2_m2m_num_src_bufs_ready/v4l2_m2m_num_dst_bufs_ready.

kworker/u16:3: [name:report&amp;]BUG: KCSAN: data-race in v4l2_m2m_buf_queue
kworker/u16:3: [name:report&amp;]

kworker/u16:3: [name:report&amp;]read-write to 0xffffff8105f35b94 of 1 bytes by task 20865 on cpu 7:
kworker/u16:3:   v4l2_m2m_buf_queue+0xd8/0x10c
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53519/">CVE-2023-53519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53519">CVE-2023-53519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250964">SUSE bug 1250964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53521</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53521" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53521" ref_url="https://www.suse.com/security/cve/CVE-2023-53521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ses: Fix slab-out-of-bounds in ses_intf_remove()

A fix for:

BUG: KASAN: slab-out-of-bounds in ses_intf_remove+0x23f/0x270 [ses]
Read of size 8 at addr ffff88a10d32e5d8 by task rmmod/12013

When edev-&gt;components is zero, accessing edev-&gt;component[0] members is
wrong.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53521/">CVE-2023-53521 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53521">CVE-2023-53521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250965">SUSE bug 1250965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53545</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53545" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53545" ref_url="https://www.suse.com/security/cve/CVE-2023-53545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: unmap and remove csa_va properly

Root PD BO should be reserved before unmap and remove
a bo_va from VM otherwise lockdep will complain.

v2: check fpriv-&gt;csa_va is not NULL instead of amdgpu_mcbp (christian)

[14616.936827] WARNING: CPU: 6 PID: 1711 at drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:1762 amdgpu_vm_bo_del+0x399/0x3f0 [amdgpu]
[14616.937096] Call Trace:
[14616.937097]  &lt;TASK&gt;
[14616.937102]  amdgpu_driver_postclose_kms+0x249/0x2f0 [amdgpu]
[14616.937187]  drm_file_free+0x1d6/0x300 [drm]
[14616.937207]  drm_close_helper.isra.0+0x62/0x70 [drm]
[14616.937220]  drm_release+0x5e/0x100 [drm]
[14616.937234]  __fput+0x9f/0x280
[14616.937239]  ____fput+0xe/0x20
[14616.937241]  task_work_run+0x61/0x90
[14616.937246]  exit_to_user_mode_prepare+0x215/0x220
[14616.937251]  syscall_exit_to_user_mode+0x2a/0x60
[14616.937254]  do_syscall_64+0x48/0x90
[14616.937257]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53545/">CVE-2023-53545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53545">CVE-2023-53545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251084">SUSE bug 1251084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53548</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53548" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53548" ref_url="https://www.suse.com/security/cve/CVE-2023-53548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb

The syzbot fuzzer identified a problem in the usbnet driver:

usb 1-1: BOGUS urb xfer, pipe 3 != type 1
WARNING: CPU: 0 PID: 754 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504
Modules linked in:
CPU: 0 PID: 754 Comm: kworker/0:2 Not tainted 6.4.0-rc7-syzkaller-00014-g692b7dc87ca6 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023
Workqueue: mld mld_ifc_work
RIP: 0010:usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504
Code: 7c 24 18 e8 2c b4 5b fb 48 8b 7c 24 18 e8 42 07 f0 fe 41 89 d8 44 89 e1 4c 89 ea 48 89 c6 48 c7 c7 a0 c9 fc 8a e8 5a 6f 23 fb &lt;0f&gt; 0b e9 58 f8 ff ff e8 fe b3 5b fb 48 81 c5 c0 05 00 00 e9 84 f7
RSP: 0018:ffffc9000463f568 EFLAGS: 00010086
RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000
RDX: ffff88801eb28000 RSI: ffffffff814c03b7 RDI: 0000000000000001
RBP: ffff8881443b7190 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000003
R13: ffff88802a77cb18 R14: 0000000000000003 R15: ffff888018262500
FS:  0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000556a99c15a18 CR3: 0000000028c71000 CR4: 0000000000350ef0
Call Trace:
 &lt;TASK&gt;
 usbnet_start_xmit+0xfe5/0x2190 drivers/net/usb/usbnet.c:1453
 __netdev_start_xmit include/linux/netdevice.h:4918 [inline]
 netdev_start_xmit include/linux/netdevice.h:4932 [inline]
 xmit_one net/core/dev.c:3578 [inline]
 dev_hard_start_xmit+0x187/0x700 net/core/dev.c:3594
...

This bug is caused by the fact that usbnet trusts the bulk endpoint
addresses its probe routine receives in the driver_info structure, and
it does not check to see that these endpoints actually exist and have
the expected type and directions.

The fix is simply to add such a check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53548/">CVE-2023-53548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53548">CVE-2023-53548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251066">SUSE bug 1251066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53556</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53556" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53556" ref_url="https://www.suse.com/security/cve/CVE-2023-53556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: Fix use-after-free in free_netdev

We do netif_napi_add() for all allocated q_vectors[], but potentially
do netif_napi_del() for part of them, then kfree q_vectors and leave
invalid pointers at dev-&gt;napi_list.

Reproducer:

  [root@host ~]# cat repro.sh
  #!/bin/bash

  pf_dbsf="0000:41:00.0"
  vf0_dbsf="0000:41:02.0"
  g_pids=()

  function do_set_numvf()
  {
      echo 2 &gt;/sys/bus/pci/devices/${pf_dbsf}/sriov_numvfs
      sleep $((RANDOM%3+1))
      echo 0 &gt;/sys/bus/pci/devices/${pf_dbsf}/sriov_numvfs
      sleep $((RANDOM%3+1))
  }

  function do_set_channel()
  {
      local nic=$(ls -1 --indicator-style=none /sys/bus/pci/devices/${vf0_dbsf}/net/)
      [ -z "$nic" ] &amp;&amp; { sleep $((RANDOM%3)) ; return 1; }
      ifconfig $nic 192.168.18.5 netmask 255.255.255.0
      ifconfig $nic up
      ethtool -L $nic combined 1
      ethtool -L $nic combined 4
      sleep $((RANDOM%3))
  }

  function on_exit()
  {
      local pid
      for pid in "${g_pids[@]}"; do
          kill -0 "$pid" &amp;&gt;/dev/null &amp;&amp; kill "$pid" &amp;&gt;/dev/null
      done
      g_pids=()
  }

  trap "on_exit; exit" EXIT

  while :; do do_set_numvf ; done &amp;
  g_pids+=($!)
  while :; do do_set_channel ; done &amp;
  g_pids+=($!)

  wait

Result:

[ 4093.900222] ==================================================================
[ 4093.900230] BUG: KASAN: use-after-free in free_netdev+0x308/0x390
[ 4093.900232] Read of size 8 at addr ffff88b4dc145640 by task repro.sh/6699
[ 4093.900233]
[ 4093.900236] CPU: 10 PID: 6699 Comm: repro.sh Kdump: loaded Tainted: G           O     --------- -t - 4.18.0 #1
[ 4093.900238] Hardware name: Powerleader PR2008AL/H12DSi-N6, BIOS 2.0 04/09/2021
[ 4093.900239] Call Trace:
[ 4093.900244]  dump_stack+0x71/0xab
[ 4093.900249]  print_address_description+0x6b/0x290
[ 4093.900251]  ? free_netdev+0x308/0x390
[ 4093.900252]  kasan_report+0x14a/0x2b0
[ 4093.900254]  free_netdev+0x308/0x390
[ 4093.900261]  iavf_remove+0x825/0xd20 [iavf]
[ 4093.900265]  pci_device_remove+0xa8/0x1f0
[ 4093.900268]  device_release_driver_internal+0x1c6/0x460
[ 4093.900271]  pci_stop_bus_device+0x101/0x150
[ 4093.900273]  pci_stop_and_remove_bus_device+0xe/0x20
[ 4093.900275]  pci_iov_remove_virtfn+0x187/0x420
[ 4093.900277]  ? pci_iov_add_virtfn+0xe10/0xe10
[ 4093.900278]  ? pci_get_subsys+0x90/0x90
[ 4093.900280]  sriov_disable+0xed/0x3e0
[ 4093.900282]  ? bus_find_device+0x12d/0x1a0
[ 4093.900290]  i40e_free_vfs+0x754/0x1210 [i40e]
[ 4093.900298]  ? i40e_reset_all_vfs+0x880/0x880 [i40e]
[ 4093.900299]  ? pci_get_device+0x7c/0x90
[ 4093.900300]  ? pci_get_subsys+0x90/0x90
[ 4093.900306]  ? pci_vfs_assigned.part.7+0x144/0x210
[ 4093.900309]  ? __mutex_lock_slowpath+0x10/0x10
[ 4093.900315]  i40e_pci_sriov_configure+0x1fa/0x2e0 [i40e]
[ 4093.900318]  sriov_numvfs_store+0x214/0x290
[ 4093.900320]  ? sriov_totalvfs_show+0x30/0x30
[ 4093.900321]  ? __mutex_lock_slowpath+0x10/0x10
[ 4093.900323]  ? __check_object_size+0x15a/0x350
[ 4093.900326]  kernfs_fop_write+0x280/0x3f0
[ 4093.900329]  vfs_write+0x145/0x440
[ 4093.900330]  ksys_write+0xab/0x160
[ 4093.900332]  ? __ia32_sys_read+0xb0/0xb0
[ 4093.900334]  ? fput_many+0x1a/0x120
[ 4093.900335]  ? filp_close+0xf0/0x130
[ 4093.900338]  do_syscall_64+0xa0/0x370
[ 4093.900339]  ? page_fault+0x8/0x30
[ 4093.900341]  entry_SYSCALL_64_after_hwframe+0x65/0xca
[ 4093.900357] RIP: 0033:0x7f16ad4d22c0
[ 4093.900359] Code: 73 01 c3 48 8b 0d d8 cb 2c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 89 24 2d 00 00 75 10 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 fe dd 01 00 48 89 04 24
[ 4093.900360] RSP: 002b:00007ffd6491b7f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 4093.900362] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f16ad4d22c0
[ 4093.900363] RDX: 0000000000000002 RSI: 0000000001a41408 RDI: 0000000000000001
[ 4093.900364] RBP: 0000000001a41408 R08: 00007f16ad7a1780 R09: 00007f16ae1f2700
[ 4093.9003
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53556/">CVE-2023-53556 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53556">CVE-2023-53556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251059">SUSE bug 1251059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53559</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53559" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53559" ref_url="https://www.suse.com/security/cve/CVE-2023-53559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip_vti: fix potential slab-use-after-free in decode_session6

When ip_vti device is set to the qdisc of the sfb type, the cb field
of the sent skb may be modified during enqueuing. Then,
slab-use-after-free may occur when ip_vti device sends IPv6 packets.
As commit f855691975bb ("xfrm6: Fix the nexthdr offset in
_decode_session6.") showed, xfrm_decode_session was originally intended
only for the receive path. IP6CB(skb)-&gt;nhoff is not set during
transmission. Therefore, set the cb field in the skb to 0 before
sending packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53559/">CVE-2023-53559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53559">CVE-2023-53559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251052">SUSE bug 1251052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53587</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53587" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53587" ref_url="https://www.suse.com/security/cve/CVE-2023-53587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Sync IRQ works before buffer destruction

If something was written to the buffer just before destruction,
it may be possible (maybe not in a real system, but it did
happen in ARCH=um with time-travel) to destroy the ringbuffer
before the IRQ work ran, leading this KASAN report (or a crash
without KASAN):

    BUG: KASAN: slab-use-after-free in irq_work_run_list+0x11a/0x13a
    Read of size 8 at addr 000000006d640a48 by task swapper/0

    CPU: 0 PID: 0 Comm: swapper Tainted: G        W  O       6.3.0-rc1 #7
    Stack:
     60c4f20f 0c203d48 41b58ab3 60f224fc
     600477fa 60f35687 60c4f20f 601273dd
     00000008 6101eb00 6101eab0 615be548
    Call Trace:
     [&lt;60047a58&gt;] show_stack+0x25e/0x282
     [&lt;60c609e0&gt;] dump_stack_lvl+0x96/0xfd
     [&lt;60c50d4c&gt;] print_report+0x1a7/0x5a8
     [&lt;603078d3&gt;] kasan_report+0xc1/0xe9
     [&lt;60308950&gt;] __asan_report_load8_noabort+0x1b/0x1d
     [&lt;60232844&gt;] irq_work_run_list+0x11a/0x13a
     [&lt;602328b4&gt;] irq_work_tick+0x24/0x34
     [&lt;6017f9dc&gt;] update_process_times+0x162/0x196
     [&lt;6019f335&gt;] tick_sched_handle+0x1a4/0x1c3
     [&lt;6019fd9e&gt;] tick_sched_timer+0x79/0x10c
     [&lt;601812b9&gt;] __hrtimer_run_queues.constprop.0+0x425/0x695
     [&lt;60182913&gt;] hrtimer_interrupt+0x16c/0x2c4
     [&lt;600486a3&gt;] um_timer+0x164/0x183
     [...]

    Allocated by task 411:
     save_stack_trace+0x99/0xb5
     stack_trace_save+0x81/0x9b
     kasan_save_stack+0x2d/0x54
     kasan_set_track+0x34/0x3e
     kasan_save_alloc_info+0x25/0x28
     ____kasan_kmalloc+0x8b/0x97
     __kasan_kmalloc+0x10/0x12
     __kmalloc+0xb2/0xe8
     load_elf_phdrs+0xee/0x182
     [...]

    The buggy address belongs to the object at 000000006d640800
     which belongs to the cache kmalloc-1k of size 1024
    The buggy address is located 584 bytes inside of
     freed 1024-byte region [000000006d640800, 000000006d640c00)

Add the appropriate irq_work_sync() so the work finishes before
the buffers are destroyed.

Prior to the commit in the Fixes tag below, there was only a
single global IRQ work, so this issue didn't exist.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53587/">CVE-2023-53587 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53587">CVE-2023-53587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251128">SUSE bug 1251128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53593</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53593" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53593" ref_url="https://www.suse.com/security/cve/CVE-2023-53593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Release folio lock on fscache read hit.

Under the current code, when cifs_readpage_worker is called, the call
contract is that the callee should unlock the page. This is documented
in the read_folio section of Documentation/filesystems/vfs.rst as:

&gt; The filesystem should unlock the folio once the read has completed,
&gt; whether it was successful or not.

Without this change, when fscache is in use and cache hit occurs during
a read, the page lock is leaked, producing the following stack on
subsequent reads (via mmap) to the page:

$ cat /proc/3890/task/12864/stack
[&lt;0&gt;] folio_wait_bit_common+0x124/0x350
[&lt;0&gt;] filemap_read_folio+0xad/0xf0
[&lt;0&gt;] filemap_fault+0x8b1/0xab0
[&lt;0&gt;] __do_fault+0x39/0x150
[&lt;0&gt;] do_fault+0x25c/0x3e0
[&lt;0&gt;] __handle_mm_fault+0x6ca/0xc70
[&lt;0&gt;] handle_mm_fault+0xe9/0x350
[&lt;0&gt;] do_user_addr_fault+0x225/0x6c0
[&lt;0&gt;] exc_page_fault+0x84/0x1b0
[&lt;0&gt;] asm_exc_page_fault+0x27/0x30

This requires a reboot to resolve; it is a deadlock.

Note however that the call to cifs_readpage_from_fscache does mark the
page clean, but does not free the folio lock. This happens in
__cifs_readpage_from_fscache on success. Releasing the lock at that
point however is not appropriate as cifs_readahead also calls
cifs_readpage_from_fscache and *does* unconditionally release the lock
after its return. This change therefore effectively makes
cifs_readpage_worker work like cifs_readahead.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53593/">CVE-2023-53593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53593">CVE-2023-53593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251132">SUSE bug 1251132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53594</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53594" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53594" ref_url="https://www.suse.com/security/cve/CVE-2023-53594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

driver core: fix resource leak in device_add()

When calling kobject_add() failed in device_add(), it will call
cleanup_glue_dir() to free resource. But in kobject_add(),
dev-&gt;kobj.parent has been set to NULL. This will cause resource leak.

The process is as follows:
device_add()
	get_device_parent()
		class_dir_create_and_add()
			kobject_add()		//kobject_get()
	...
	dev-&gt;kobj.parent = kobj;
	...
	kobject_add()		//failed, but set dev-&gt;kobj.parent = NULL
	...
	glue_dir = get_glue_dir(dev)	//glue_dir = NULL, and goto
					//"Error" label
	...
	cleanup_glue_dir()	//becaues glue_dir is NULL, not call
				//kobject_put()

The preceding problem may cause insmod mac80211_hwsim.ko to failed.
sysfs: cannot create duplicate filename '/devices/virtual/mac80211_hwsim'
Call Trace:
&lt;TASK&gt;
dump_stack_lvl+0x8e/0xd1
sysfs_warn_dup.cold+0x1c/0x29
sysfs_create_dir_ns+0x224/0x280
kobject_add_internal+0x2aa/0x880
kobject_add+0x135/0x1a0
get_device_parent+0x3d7/0x590
device_add+0x2aa/0x1cb0
device_create_groups_vargs+0x1eb/0x260
device_create+0xdc/0x110
mac80211_hwsim_new_radio+0x31e/0x4790 [mac80211_hwsim]
init_mac80211_hwsim+0x48d/0x1000 [mac80211_hwsim]
do_one_initcall+0x10f/0x630
do_init_module+0x19f/0x5e0
load_module+0x64b7/0x6eb0
__do_sys_finit_module+0x140/0x200
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x46/0xb0
&lt;/TASK&gt;
kobject_add_internal failed for mac80211_hwsim with -EEXIST, don't try to
register things with the same name in the same directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53594/">CVE-2023-53594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53594">CVE-2023-53594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251166">SUSE bug 1251166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53596</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53596" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53596" ref_url="https://www.suse.com/security/cve/CVE-2023-53596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers: base: Free devm resources when unregistering a device

In the current code, devres_release_all() only gets called if the device
has a bus and has been probed.

This leads to issues when using bus-less or driver-less devices where
the device might never get freed if a managed resource holds a reference
to the device. This is happening in the DRM framework for example.

We should thus call devres_release_all() in the device_del() function to
make sure that the device-managed actions are properly executed when the
device is unregistered, even if it has neither a bus nor a driver.

This is effectively the same change than commit 2f8d16a996da ("devres:
release resources on device_del()") that got reverted by commit
a525a3ddeaca ("driver core: free devres in device_release") over
memory leaks concerns.

This patch effectively combines the two commits mentioned above to
release the resources both on device_del() and device_release() and get
the best of both worlds.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53596/">CVE-2023-53596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53596">CVE-2023-53596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251161">SUSE bug 1251161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53597</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53597" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53597" ref_url="https://www.suse.com/security/cve/CVE-2023-53597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix mid leak during reconnection after timeout threshold

When the number of responses with status of STATUS_IO_TIMEOUT
exceeds a specified threshold (NUM_STATUS_IO_TIMEOUT), we reconnect
the connection. But we do not return the mid, or the credits
returned for the mid, or reduce the number of in-flight requests.

This bug could result in the server-&gt;in_flight count to go bad,
and also cause a leak in the mids.

This change moves the check to a few lines below where the
response is decrypted, even of the response is read from the
transform header. This way, the code for returning the mids
can be reused.

Also, the cifs_reconnect was reconnecting just the transport
connection before. In case of multi-channel, this may not be
what we want to do after several timeouts. Changed that to
reconnect the session and the tree too.

Also renamed NUM_STATUS_IO_TIMEOUT to a more appropriate name
MAX_STATUS_IO_TIMEOUT.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53597/">CVE-2023-53597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53597">CVE-2023-53597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251159">SUSE bug 1251159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53619</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53619" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53619" ref_url="https://www.suse.com/security/cve/CVE-2023-53619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: conntrack: Avoid nf_ct_helper_hash uses after free

If nf_conntrack_init_start() fails (for example due to a
register_nf_conntrack_bpf() failure), the nf_conntrack_helper_fini()
clean-up path frees the nf_ct_helper_hash map.

When built with NF_CONNTRACK=y, further netfilter modules (e.g:
netfilter_conntrack_ftp) can still be loaded and call
nf_conntrack_helpers_register(), independently of whether nf_conntrack
initialized correctly. This accesses the nf_ct_helper_hash dangling
pointer and causes a uaf, possibly leading to random memory corruption.

This patch guards nf_conntrack_helper_register() from accessing a freed
or uninitialized nf_ct_helper_hash pointer and fixes possible
uses-after-free when loading a conntrack module.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53619/">CVE-2023-53619 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53619">CVE-2023-53619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251743">SUSE bug 1251743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251745">SUSE bug 1251745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53620</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53620" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53620" ref_url="https://www.suse.com/security/cve/CVE-2023-53620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: fix soft lockup in status_resync

status_resync() will calculate 'curr_resync - recovery_active' to show
user a progress bar like following:

[============&gt;........]  resync = 61.4%

'curr_resync' and 'recovery_active' is updated in md_do_sync(), and
status_resync() can read them concurrently, hence it's possible that
'curr_resync - recovery_active' can overflow to a huge number. In this
case status_resync() will be stuck in the loop to print a large amount
of '=', which will end up soft lockup.

Fix the problem by setting 'resync' to MD_RESYNC_ACTIVE in this case,
this way resync in progress will be reported to user.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53620/">CVE-2023-53620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53620">CVE-2023-53620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251318">SUSE bug 1251318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53624</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53624" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53624" ref_url="https://www.suse.com/security/cve/CVE-2023-53624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_fq: fix integer overflow of "credit"

if sch_fq is configured with "initial quantum" having values greater than
INT_MAX, the first assignment of "credit" does signed integer overflow to
a very negative value.
In this situation, the syzkaller script provided by Cristoph triggers the
CPU soft-lockup warning even with few sockets. It's not an infinite loop,
but "credit" wasn't probably meant to be minus 2Gb for each new flow.
Capping "initial quantum" to INT_MAX proved to fix the issue.

v2: validation of "initial quantum" is done in fq_policy, instead of open
    coding in fq_change() _ suggested by Jakub Kicinski
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53624/">CVE-2023-53624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53624">CVE-2023-53624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251333">SUSE bug 1251333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53627</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53627" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53627" ref_url="https://www.suse.com/security/cve/CVE-2023-53627" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: hisi_sas: Grab sas_dev lock when traversing the members of sas_dev.list

When freeing slots in function slot_complete_v3_hw(), it is possible that
sas_dev.list is being traversed elsewhere, and it may trigger a NULL
pointer exception, such as follows:

==&gt;cq thread                    ==&gt;scsi_eh_6

                                ==&gt;scsi_error_handler()
				  ==&gt;sas_eh_handle_sas_errors()
				    ==&gt;sas_scsi_find_task()
				      ==&gt;lldd_abort_task()
==&gt;slot_complete_v3_hw()              ==&gt;hisi_sas_abort_task()
  ==&gt;hisi_sas_slot_task_free()	        ==&gt;dereg_device_v3_hw()
    ==&gt;list_del_init()        		  ==&gt;list_for_each_entry_safe()

[ 7165.434918] sas: Enter sas_scsi_recover_host busy: 32 failed: 32
[ 7165.434926] sas: trying to find task 0x00000000769b5ba5
[ 7165.434927] sas: sas_scsi_find_task: aborting task 0x00000000769b5ba5
[ 7165.434940] hisi_sas_v3_hw 0000:b4:02.0: slot complete: task(00000000769b5ba5) aborted
[ 7165.434964] hisi_sas_v3_hw 0000:b4:02.0: slot complete: task(00000000c9f7aa07) ignored
[ 7165.434965] hisi_sas_v3_hw 0000:b4:02.0: slot complete: task(00000000e2a1cf01) ignored
[ 7165.434968] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
[ 7165.434972] hisi_sas_v3_hw 0000:b4:02.0: slot complete: task(0000000022d52d93) ignored
[ 7165.434975] hisi_sas_v3_hw 0000:b4:02.0: slot complete: task(0000000066a7516c) ignored
[ 7165.434976] Mem abort info:
[ 7165.434982]   ESR = 0x96000004
[ 7165.434991]   Exception class = DABT (current EL), IL = 32 bits
[ 7165.434992]   SET = 0, FnV = 0
[ 7165.434993]   EA = 0, S1PTW = 0
[ 7165.434994] Data abort info:
[ 7165.434994]   ISV = 0, ISS = 0x00000004
[ 7165.434995]   CM = 0, WnR = 0
[ 7165.434997] user pgtable: 4k pages, 48-bit VAs, pgdp = 00000000f29543f2
[ 7165.434998] [0000000000000000] pgd=0000000000000000
[ 7165.435003] Internal error: Oops: 96000004 [#1] SMP
[ 7165.439863] Process scsi_eh_6 (pid: 4109, stack limit = 0x00000000c43818d5)
[ 7165.468862] pstate: 00c00009 (nzcv daif +PAN +UAO)
[ 7165.473637] pc : dereg_device_v3_hw+0x68/0xa8 [hisi_sas_v3_hw]
[ 7165.479443] lr : dereg_device_v3_hw+0x2c/0xa8 [hisi_sas_v3_hw]
[ 7165.485247] sp : ffff00001d623bc0
[ 7165.488546] x29: ffff00001d623bc0 x28: ffffa027d03b9508
[ 7165.493835] x27: ffff80278ed50af0 x26: ffffa027dd31e0a8
[ 7165.499123] x25: ffffa027d9b27f88 x24: ffffa027d9b209f8
[ 7165.504411] x23: ffffa027c45b0d60 x22: ffff80278ec07c00
[ 7165.509700] x21: 0000000000000008 x20: ffffa027d9b209f8
[ 7165.514988] x19: ffffa027d9b27f88 x18: ffffffffffffffff
[ 7165.520276] x17: 0000000000000000 x16: 0000000000000000
[ 7165.525564] x15: ffff0000091d9708 x14: ffff0000093b7dc8
[ 7165.530852] x13: ffff0000093b7a23 x12: 6e7265746e692067
[ 7165.536140] x11: 0000000000000000 x10: 0000000000000bb0
[ 7165.541429] x9 : ffff00001d6238f0 x8 : ffffa027d877af00
[ 7165.546718] x7 : ffffa027d6329600 x6 : ffff7e809f58ca00
[ 7165.552006] x5 : 0000000000001f8a x4 : 000000000000088e
[ 7165.557295] x3 : ffffa027d9b27fa8 x2 : 0000000000000000
[ 7165.562583] x1 : 0000000000000000 x0 : 000000003000188e
[ 7165.567872] Call trace:
[ 7165.570309]  dereg_device_v3_hw+0x68/0xa8 [hisi_sas_v3_hw]
[ 7165.575775]  hisi_sas_abort_task+0x248/0x358 [hisi_sas_main]
[ 7165.581415]  sas_eh_handle_sas_errors+0x258/0x8e0 [libsas]
[ 7165.586876]  sas_scsi_recover_host+0x134/0x458 [libsas]
[ 7165.592082]  scsi_error_handler+0xb4/0x488
[ 7165.596163]  kthread+0x134/0x138
[ 7165.599380]  ret_from_fork+0x10/0x18
[ 7165.602940] Code: d5033e9f b9000040 aa0103e2 eb03003f (f9400021)
[ 7165.609004] kernel fault(0x1) notification starting on CPU 75
[ 7165.700728] ---[ end trace fc042cbbea224efc ]---
[ 7165.705326] Kernel panic - not syncing: Fatal exception

To fix the issue, grab sas_dev lock when traversing the members of
sas_dev.list in dereg_device_v3_hw() and hisi_sas_release_tasks() to avoid
concurrency of adding and deleting member. When 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53627/">CVE-2023-53627 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53627">CVE-2023-53627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251317">SUSE bug 1251317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53641</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53641" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53641" ref_url="https://www.suse.com/security/cve/CVE-2023-53641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: hif_usb: fix memory leak of remain_skbs

hif_dev-&gt;remain_skb is allocated and used exclusively in
ath9k_hif_usb_rx_stream(). It is implied that an allocated remain_skb is
processed and subsequently freed (in error paths) only during the next
call of ath9k_hif_usb_rx_stream().

So, if the urbs are deallocated between those two calls due to the device
deinitialization or suspend, it is possible that ath9k_hif_usb_rx_stream()
is not called next time and the allocated remain_skb is leaked. Our local
Syzkaller instance was able to trigger that.

remain_skb makes sense when receiving two consecutive urbs which are
logically linked together, i.e. a specific data field from the first skb
indicates a cached skb to be allocated, memcpy'd with some data and
subsequently processed in the next call to ath9k_hif_usb_rx_stream(). Urbs
deallocation supposedly makes that link irrelevant so we need to free the
cached skb in those cases.

Fix the leak by introducing a function to explicitly free remain_skb (if
it is not NULL) when the rx urbs have been deallocated. remain_skb is NULL
when it has not been allocated at all (hif_dev struct is kzalloced) or
when it has been processed in next call to ath9k_hif_usb_rx_stream().

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53641/">CVE-2023-53641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53641">CVE-2023-53641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251728">SUSE bug 1251728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53647</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53647" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53647" ref_url="https://www.suse.com/security/cve/CVE-2023-53647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Drivers: hv: vmbus: Don't dereference ACPI root object handle

Since the commit referenced in the Fixes: tag below the VMBus client driver
is walking the ACPI namespace up from the VMBus ACPI device to the ACPI
namespace root object trying to find Hyper-V MMIO ranges.

However, if it is not able to find them it ends trying to walk resources of
the ACPI namespace root object itself.
This object has all-ones handle, which causes a NULL pointer dereference
in the ACPI code (from dereferencing this pointer with an offset).

This in turn causes an oops on boot with VMBus host implementations that do
not provide Hyper-V MMIO ranges in their VMBus ACPI device or its
ancestors.
The QEMU VMBus implementation is an example of such implementation.

I guess providing these ranges is optional, since all tested Windows
versions seem to be able to use VMBus devices without them.

Fix this by explicitly terminating the lookup at the ACPI namespace root
object.

Note that Linux guests under KVM/QEMU do not use the Hyper-V PV interface
by default - they only do so if the KVM PV interface is missing or
disabled.

Example stack trace of such oops:
[ 3.710827] ? __die+0x1f/0x60
[ 3.715030] ? page_fault_oops+0x159/0x460
[ 3.716008] ? exc_page_fault+0x73/0x170
[ 3.716959] ? asm_exc_page_fault+0x22/0x30
[ 3.717957] ? acpi_ns_lookup+0x7a/0x4b0
[ 3.718898] ? acpi_ns_internalize_name+0x79/0xc0
[ 3.720018] acpi_ns_get_node_unlocked+0xb5/0xe0
[ 3.721120] ? acpi_ns_check_object_type+0xfe/0x200
[ 3.722285] ? acpi_rs_convert_aml_to_resource+0x37/0x6e0
[ 3.723559] ? down_timeout+0x3a/0x60
[ 3.724455] ? acpi_ns_get_node+0x3a/0x60
[ 3.725412] acpi_ns_get_node+0x3a/0x60
[ 3.726335] acpi_ns_evaluate+0x1c3/0x2c0
[ 3.727295] acpi_ut_evaluate_object+0x64/0x1b0
[ 3.728400] acpi_rs_get_method_data+0x2b/0x70
[ 3.729476] ? vmbus_platform_driver_probe+0x1d0/0x1d0 [hv_vmbus]
[ 3.730940] ? vmbus_platform_driver_probe+0x1d0/0x1d0 [hv_vmbus]
[ 3.732411] acpi_walk_resources+0x78/0xd0
[ 3.733398] vmbus_platform_driver_probe+0x9f/0x1d0 [hv_vmbus]
[ 3.734802] platform_probe+0x3d/0x90
[ 3.735684] really_probe+0x19b/0x400
[ 3.736570] ? __device_attach_driver+0x100/0x100
[ 3.737697] __driver_probe_device+0x78/0x160
[ 3.738746] driver_probe_device+0x1f/0x90
[ 3.739743] __driver_attach+0xc2/0x1b0
[ 3.740671] bus_for_each_dev+0x70/0xc0
[ 3.741601] bus_add_driver+0x10e/0x210
[ 3.742527] driver_register+0x55/0xf0
[ 3.744412] ? 0xffffffffc039a000
[ 3.745207] hv_acpi_init+0x3c/0x1000 [hv_vmbus]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53647/">CVE-2023-53647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53647">CVE-2023-53647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251732">SUSE bug 1251732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53648</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53648" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53648" ref_url="https://www.suse.com/security/cve/CVE-2023-53648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: ac97: Fix possible NULL dereference in snd_ac97_mixer

smatch error:
sound/pci/ac97/ac97_codec.c:2354 snd_ac97_mixer() error:
we previously assumed 'rac97' could be null (see line 2072)

remove redundant assignment, return error if rac97 is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53648/">CVE-2023-53648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53648">CVE-2023-53648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251750">SUSE bug 1251750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53659</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53659" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53659" ref_url="https://www.suse.com/security/cve/CVE-2023-53659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: Fix out-of-bounds when setting channels on remove

If we set channels greater during iavf_remove(), and waiting reset done
would be timeout, then returned with error but changed num_active_queues
directly, that will lead to OOB like the following logs. Because the
num_active_queues is greater than tx/rx_rings[] allocated actually.

Reproducer:

  [root@host ~]# cat repro.sh
  #!/bin/bash

  pf_dbsf="0000:41:00.0"
  vf0_dbsf="0000:41:02.0"
  g_pids=()

  function do_set_numvf()
  {
      echo 2 &gt;/sys/bus/pci/devices/${pf_dbsf}/sriov_numvfs
      sleep $((RANDOM%3+1))
      echo 0 &gt;/sys/bus/pci/devices/${pf_dbsf}/sriov_numvfs
      sleep $((RANDOM%3+1))
  }

  function do_set_channel()
  {
      local nic=$(ls -1 --indicator-style=none /sys/bus/pci/devices/${vf0_dbsf}/net/)
      [ -z "$nic" ] &amp;&amp; { sleep $((RANDOM%3)) ; return 1; }
      ifconfig $nic 192.168.18.5 netmask 255.255.255.0
      ifconfig $nic up
      ethtool -L $nic combined 1
      ethtool -L $nic combined 4
      sleep $((RANDOM%3))
  }

  function on_exit()
  {
      local pid
      for pid in "${g_pids[@]}"; do
          kill -0 "$pid" &amp;&gt;/dev/null &amp;&amp; kill "$pid" &amp;&gt;/dev/null
      done
      g_pids=()
  }

  trap "on_exit; exit" EXIT

  while :; do do_set_numvf ; done &amp;
  g_pids+=($!)
  while :; do do_set_channel ; done &amp;
  g_pids+=($!)

  wait

Result:

[ 3506.152887] iavf 0000:41:02.0: Removing device
[ 3510.400799] ==================================================================
[ 3510.400820] BUG: KASAN: slab-out-of-bounds in iavf_free_all_tx_resources+0x156/0x160 [iavf]
[ 3510.400823] Read of size 8 at addr ffff88b6f9311008 by task repro.sh/55536
[ 3510.400823]
[ 3510.400830] CPU: 101 PID: 55536 Comm: repro.sh Kdump: loaded Tainted: G           O     --------- -t - 4.18.0 #1
[ 3510.400832] Hardware name: Powerleader PR2008AL/H12DSi-N6, BIOS 2.0 04/09/2021
[ 3510.400835] Call Trace:
[ 3510.400851]  dump_stack+0x71/0xab
[ 3510.400860]  print_address_description+0x6b/0x290
[ 3510.400865]  ? iavf_free_all_tx_resources+0x156/0x160 [iavf]
[ 3510.400868]  kasan_report+0x14a/0x2b0
[ 3510.400873]  iavf_free_all_tx_resources+0x156/0x160 [iavf]
[ 3510.400880]  iavf_remove+0x2b6/0xc70 [iavf]
[ 3510.400884]  ? iavf_free_all_rx_resources+0x160/0x160 [iavf]
[ 3510.400891]  ? wait_woken+0x1d0/0x1d0
[ 3510.400895]  ? notifier_call_chain+0xc1/0x130
[ 3510.400903]  pci_device_remove+0xa8/0x1f0
[ 3510.400910]  device_release_driver_internal+0x1c6/0x460
[ 3510.400916]  pci_stop_bus_device+0x101/0x150
[ 3510.400919]  pci_stop_and_remove_bus_device+0xe/0x20
[ 3510.400924]  pci_iov_remove_virtfn+0x187/0x420
[ 3510.400927]  ? pci_iov_add_virtfn+0xe10/0xe10
[ 3510.400929]  ? pci_get_subsys+0x90/0x90
[ 3510.400932]  sriov_disable+0xed/0x3e0
[ 3510.400936]  ? bus_find_device+0x12d/0x1a0
[ 3510.400953]  i40e_free_vfs+0x754/0x1210 [i40e]
[ 3510.400966]  ? i40e_reset_all_vfs+0x880/0x880 [i40e]
[ 3510.400968]  ? pci_get_device+0x7c/0x90
[ 3510.400970]  ? pci_get_subsys+0x90/0x90
[ 3510.400982]  ? pci_vfs_assigned.part.7+0x144/0x210
[ 3510.400987]  ? __mutex_lock_slowpath+0x10/0x10
[ 3510.400996]  i40e_pci_sriov_configure+0x1fa/0x2e0 [i40e]
[ 3510.401001]  sriov_numvfs_store+0x214/0x290
[ 3510.401005]  ? sriov_totalvfs_show+0x30/0x30
[ 3510.401007]  ? __mutex_lock_slowpath+0x10/0x10
[ 3510.401011]  ? __check_object_size+0x15a/0x350
[ 3510.401018]  kernfs_fop_write+0x280/0x3f0
[ 3510.401022]  vfs_write+0x145/0x440
[ 3510.401025]  ksys_write+0xab/0x160
[ 3510.401028]  ? __ia32_sys_read+0xb0/0xb0
[ 3510.401031]  ? fput_many+0x1a/0x120
[ 3510.401032]  ? filp_close+0xf0/0x130
[ 3510.401038]  do_syscall_64+0xa0/0x370
[ 3510.401041]  ? page_fault+0x8/0x30
[ 3510.401043]  entry_SYSCALL_64_after_hwframe+0x65/0xca
[ 3510.401073] RIP: 0033:0x7f3a9bb842c0
[ 3510.401079] Code: 73 01 c3 48 8b 0d d8 cb 2c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 89 24 2d 00 00 75 10 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53659/">CVE-2023-53659 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53659">CVE-2023-53659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251247">SUSE bug 1251247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251248">SUSE bug 1251248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53667</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53667" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53667" ref_url="https://www.suse.com/security/cve/CVE-2023-53667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: cdc_ncm: Deal with too low values of dwNtbOutMaxSize

Currently in cdc_ncm_check_tx_max(), if dwNtbOutMaxSize is lower than
the calculated "min" value, but greater than zero, the logic sets
tx_max to dwNtbOutMaxSize. This is then used to allocate a new SKB in
cdc_ncm_fill_tx_frame() where all the data is handled.

For small values of dwNtbOutMaxSize the memory allocated during
alloc_skb(dwNtbOutMaxSize, GFP_ATOMIC) will have the same size, due to
how size is aligned at alloc time:
	size = SKB_DATA_ALIGN(size);
        size += SKB_DATA_ALIGN(sizeof(struct skb_shared_info));
Thus we hit the same bug that we tried to squash with
commit 2be6d4d16a084 ("net: cdc_ncm: Allow for dwNtbOutMaxSize to be unset or zero")

Low values of dwNtbOutMaxSize do not cause an issue presently because at
alloc_skb() time more memory (512b) is allocated than required for the
SKB headers alone (320b), leaving some space (512b - 320b = 192b)
for CDC data (172b).

However, if more elements (for example 3 x u64 = [24b]) were added to
one of the SKB header structs, say 'struct skb_shared_info',
increasing its original size (320b [320b aligned]) to something larger
(344b [384b aligned]), then suddenly the CDC data (172b) no longer
fits in the spare SKB data area (512b - 384b = 128b).

Consequently the SKB bounds checking semantics fails and panics:

skbuff: skb_over_panic: text:ffffffff831f755b len:184 put:172 head:ffff88811f1c6c00 data:ffff88811f1c6c00 tail:0xb8 end:0x80 dev:&lt;NULL&gt;
------------[ cut here ]------------
kernel BUG at net/core/skbuff.c:113!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 57 Comm: kworker/0:2 Not tainted 5.15.106-syzkaller-00249-g19c0ed55a470 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023
Workqueue: mld mld_ifc_work
RIP: 0010:skb_panic net/core/skbuff.c:113 [inline]
RIP: 0010:skb_over_panic+0x14c/0x150 net/core/skbuff.c:118
[snip]
Call Trace:
 &lt;TASK&gt;
 skb_put+0x151/0x210 net/core/skbuff.c:2047
 skb_put_zero include/linux/skbuff.h:2422 [inline]
 cdc_ncm_ndp16 drivers/net/usb/cdc_ncm.c:1131 [inline]
 cdc_ncm_fill_tx_frame+0x11ab/0x3da0 drivers/net/usb/cdc_ncm.c:1308
 cdc_ncm_tx_fixup+0xa3/0x100

Deal with too low values of dwNtbOutMaxSize, clamp it in the range
[USB_CDC_NCM_NTB_MIN_OUT_SIZE, CDC_NCM_NTB_MAX_SIZE_TX]. We ensure
enough data space is allocated to handle CDC data by making sure
dwNtbOutMaxSize is not smaller than USB_CDC_NCM_NTB_MIN_OUT_SIZE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53667/">CVE-2023-53667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53667">CVE-2023-53667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251761">SUSE bug 1251761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53668</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53668" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53668" ref_url="https://www.suse.com/security/cve/CVE-2023-53668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Fix deadloop issue on reading trace_pipe

Soft lockup occurs when reading file 'trace_pipe':

  watchdog: BUG: soft lockup - CPU#6 stuck for 22s! [cat:4488]
  [...]
  RIP: 0010:ring_buffer_empty_cpu+0xed/0x170
  RSP: 0018:ffff88810dd6fc48 EFLAGS: 00000246
  RAX: 0000000000000000 RBX: 0000000000000246 RCX: ffffffff93d1aaeb
  RDX: ffff88810a280040 RSI: 0000000000000008 RDI: ffff88811164b218
  RBP: ffff88811164b218 R08: 0000000000000000 R09: ffff88815156600f
  R10: ffffed102a2acc01 R11: 0000000000000001 R12: 0000000051651901
  R13: 0000000000000000 R14: ffff888115e49500 R15: 0000000000000000
  [...]
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f8d853c2000 CR3: 000000010dcd8000 CR4: 00000000000006e0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
   __find_next_entry+0x1a8/0x4b0
   ? peek_next_entry+0x250/0x250
   ? down_write+0xa5/0x120
   ? down_write_killable+0x130/0x130
   trace_find_next_entry_inc+0x3b/0x1d0
   tracing_read_pipe+0x423/0xae0
   ? tracing_splice_read_pipe+0xcb0/0xcb0
   vfs_read+0x16b/0x490
   ksys_read+0x105/0x210
   ? __ia32_sys_pwrite64+0x200/0x200
   ? switch_fpu_return+0x108/0x220
   do_syscall_64+0x33/0x40
   entry_SYSCALL_64_after_hwframe+0x61/0xc6

Through the vmcore, I found it's because in tracing_read_pipe(),
ring_buffer_empty_cpu() found some buffer is not empty but then it
cannot read anything due to "rb_num_of_entries() == 0" always true,
Then it infinitely loop the procedure due to user buffer not been
filled, see following code path:

  tracing_read_pipe() {
    ... ...
    waitagain:
      tracing_wait_pipe() // 1. find non-empty buffer here
      trace_find_next_entry_inc()  // 2. loop here try to find an entry
        __find_next_entry()
          ring_buffer_empty_cpu();  // 3. find non-empty buffer
          peek_next_entry()  // 4. but peek always return NULL
            ring_buffer_peek()
              rb_buffer_peek()
                rb_get_reader_page()
                  // 5. because rb_num_of_entries() == 0 always true here
                  //    then return NULL
      // 6. user buffer not been filled so goto 'waitgain'
      //    and eventually leads to an deadloop in kernel!!!
  }

By some analyzing, I found that when resetting ringbuffer, the 'entries'
of its pages are not all cleared (see rb_reset_cpu()). Then when reducing
the ringbuffer, and if some reduced pages exist dirty 'entries' data, they
will be added into 'cpu_buffer-&gt;overrun' (see rb_remove_pages()), which
cause wrong 'overrun' count and eventually cause the deadloop issue.

To fix it, we need to clear every pages in rb_reset_cpu().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53668/">CVE-2023-53668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53668">CVE-2023-53668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251286">SUSE bug 1251286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53675</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53675" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53675" ref_url="https://www.suse.com/security/cve/CVE-2023-53675" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0755" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ses: Fix possible desc_ptr out-of-bounds accesses

Sanitize possible desc_ptr out-of-bounds accesses in
ses_enclosure_data_process().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53675/">CVE-2023-53675 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53675">CVE-2023-53675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251325">SUSE bug 1251325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53676</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53676" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53676" ref_url="https://www.suse.com/security/cve/CVE-2023-53676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()

The function lio_target_nacl_info_show() uses sprintf() in a loop to print
details for every iSCSI connection in a session without checking for the
buffer length. With enough iSCSI connections it's possible to overflow the
buffer provided by configfs and corrupt the memory.

This patch replaces sprintf() with sysfs_emit_at() that checks for buffer
boundries.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53676/">CVE-2023-53676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53676">CVE-2023-53676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251786">SUSE bug 1251786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251787">SUSE bug 1251787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53681</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53681" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53681" ref_url="https://www.suse.com/security/cve/CVE-2023-53681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent

In some specific situations, the return value of __bch_btree_node_alloc
may be NULL. This may lead to a potential NULL pointer dereference in
caller function like a calling chain :
btree_split-&gt;bch_btree_node_alloc-&gt;__bch_btree_node_alloc.

Fix it by initializing the return value in __bch_btree_node_alloc.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53681/">CVE-2023-53681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53681">CVE-2023-53681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251769">SUSE bug 1251769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53685</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53685" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53685" ref_url="https://www.suse.com/security/cve/CVE-2023-53685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tun: Fix memory leak for detached NAPI queue.

syzkaller reported [0] memory leaks of sk and skb related to the TUN
device with no repro, but we can reproduce it easily with:

  struct ifreq ifr = {}
  int fd_tun, fd_tmp;
  char buf[4] = {};

  fd_tun = openat(AT_FDCWD, "/dev/net/tun", O_WRONLY, 0);
  ifr.ifr_flags = IFF_TUN | IFF_NAPI | IFF_MULTI_QUEUE;
  ioctl(fd_tun, TUNSETIFF, &amp;ifr);

  ifr.ifr_flags = IFF_DETACH_QUEUE;
  ioctl(fd_tun, TUNSETQUEUE, &amp;ifr);

  fd_tmp = socket(AF_PACKET, SOCK_PACKET, 0);
  ifr.ifr_flags = IFF_UP;
  ioctl(fd_tmp, SIOCSIFFLAGS, &amp;ifr);

  write(fd_tun, buf, sizeof(buf));
  close(fd_tun);

If we enable NAPI and multi-queue on a TUN device, we can put skb into
tfile-&gt;sk.sk_write_queue after the queue is detached.  We should prevent
it by checking tfile-&gt;detached before queuing skb.

Note this must be done under tfile-&gt;sk.sk_write_queue.lock because write()
and ioctl(IFF_DETACH_QUEUE) can run concurrently.  Otherwise, there would
be a small race window:

  write()                             ioctl(IFF_DETACH_QUEUE)
  `- tun_get_user                     `- __tun_detach
     |- if (tfile-&gt;detached)             |- tun_disable_queue
     |  `-&gt; false                        |  `- tfile-&gt;detached = tun
     |                                   `- tun_queue_purge
     |- spin_lock_bh(&amp;queue-&gt;lock)
     `- __skb_queue_tail(queue, skb)

Another solution is to call tun_queue_purge() when closing and
reattaching the detached queue, but it could paper over another
problems.  Also, we do the same kind of test for IFF_NAPI_FRAGS.

[0]:
unreferenced object 0xffff88801edbc800 (size 2048):
  comm "syz-executor.1", pid 33269, jiffies 4295743834 (age 18.756s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00  ...@............
  backtrace:
    [&lt;000000008c16ea3d&gt;] __do_kmalloc_node mm/slab_common.c:965 [inline]
    [&lt;000000008c16ea3d&gt;] __kmalloc+0x4a/0x130 mm/slab_common.c:979
    [&lt;000000003addde56&gt;] kmalloc include/linux/slab.h:563 [inline]
    [&lt;000000003addde56&gt;] sk_prot_alloc+0xef/0x1b0 net/core/sock.c:2035
    [&lt;000000003e20621f&gt;] sk_alloc+0x36/0x2f0 net/core/sock.c:2088
    [&lt;0000000028e43843&gt;] tun_chr_open+0x3d/0x190 drivers/net/tun.c:3438
    [&lt;000000001b0f1f28&gt;] misc_open+0x1a6/0x1f0 drivers/char/misc.c:165
    [&lt;000000004376f706&gt;] chrdev_open+0x111/0x300 fs/char_dev.c:414
    [&lt;00000000614d379f&gt;] do_dentry_open+0x2f9/0x750 fs/open.c:920
    [&lt;000000008eb24774&gt;] do_open fs/namei.c:3636 [inline]
    [&lt;000000008eb24774&gt;] path_openat+0x143f/0x1a30 fs/namei.c:3791
    [&lt;00000000955077b5&gt;] do_filp_open+0xce/0x1c0 fs/namei.c:3818
    [&lt;00000000b78973b0&gt;] do_sys_openat2+0xf0/0x260 fs/open.c:1356
    [&lt;00000000057be699&gt;] do_sys_open fs/open.c:1372 [inline]
    [&lt;00000000057be699&gt;] __do_sys_openat fs/open.c:1388 [inline]
    [&lt;00000000057be699&gt;] __se_sys_openat fs/open.c:1383 [inline]
    [&lt;00000000057be699&gt;] __x64_sys_openat+0x83/0xf0 fs/open.c:1383
    [&lt;00000000a7d2182d&gt;] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [&lt;00000000a7d2182d&gt;] do_syscall_64+0x3c/0x90 arch/x86/entry/common.c:80
    [&lt;000000004cc4e8c4&gt;] entry_SYSCALL_64_after_hwframe+0x72/0xdc

unreferenced object 0xffff88802f671700 (size 240):
  comm "syz-executor.1", pid 33269, jiffies 4295743854 (age 18.736s)
  hex dump (first 32 bytes):
    68 c9 db 1e 80 88 ff ff 68 c9 db 1e 80 88 ff ff  h.......h.......
    00 c0 7b 2f 80 88 ff ff 00 c8 db 1e 80 88 ff ff  ..{/............
  backtrace:
    [&lt;00000000e9d9fdb6&gt;] __alloc_skb+0x223/0x250 net/core/skbuff.c:644
    [&lt;000000002c3e4e0b&gt;] alloc_skb include/linux/skbuff.h:1288 [inline]
    [&lt;000000002c3e4e0b&gt;] alloc_skb_with_frags+0x6f/0x350 net/core/skbuff.c:6378
    [&lt;00000000825f98d7&gt;] sock_alloc_send_pskb+0x3ac/0x3e0 net/core/sock.c:2729
    [&lt;00000000e9eb3df3&gt;] tun_alloc_skb drivers/net/tun.c:1529 [inline]
    [&lt;
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53685/">CVE-2023-53685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53685">CVE-2023-53685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251770">SUSE bug 1251770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53687</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53687" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53687" ref_url="https://www.suse.com/security/cve/CVE-2023-53687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() when iterating clk

When the best clk is searched, we iterate over all possible clk.

If we find a better match, the previous one, if any, needs to be freed.
If a better match has already been found, we still need to free the new
one, otherwise it leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53687/">CVE-2023-53687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53687">CVE-2023-53687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251772">SUSE bug 1251772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53718</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53718" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53718" ref_url="https://www.suse.com/security/cve/CVE-2023-53718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Do not swap cpu_buffer during resize process

When ring_buffer_swap_cpu was called during resize process,
the cpu buffer was swapped in the middle, resulting in incorrect state.
Continuing to run in the wrong state will result in oops.

This issue can be easily reproduced using the following two scripts:
/tmp # cat test1.sh
//#! /bin/sh
for i in `seq 0 100000`
do
         echo 2000 &gt; /sys/kernel/debug/tracing/buffer_size_kb
         sleep 0.5
         echo 5000 &gt; /sys/kernel/debug/tracing/buffer_size_kb
         sleep 0.5
done
/tmp # cat test2.sh
//#! /bin/sh
for i in `seq 0 100000`
do
        echo irqsoff &gt; /sys/kernel/debug/tracing/current_tracer
        sleep 1
        echo nop &gt; /sys/kernel/debug/tracing/current_tracer
        sleep 1
done
/tmp # ./test1.sh &amp;
/tmp # ./test2.sh &amp;

A typical oops log is as follows, sometimes with other different oops logs.

[  231.711293] WARNING: CPU: 0 PID: 9 at kernel/trace/ring_buffer.c:2026 rb_update_pages+0x378/0x3f8
[  231.713375] Modules linked in:
[  231.714735] CPU: 0 PID: 9 Comm: kworker/0:1 Tainted: G        W          6.5.0-rc1-00276-g20edcec23f92 #15
[  231.716750] Hardware name: linux,dummy-virt (DT)
[  231.718152] Workqueue: events update_pages_handler
[  231.719714] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  231.721171] pc : rb_update_pages+0x378/0x3f8
[  231.722212] lr : rb_update_pages+0x25c/0x3f8
[  231.723248] sp : ffff800082b9bd50
[  231.724169] x29: ffff800082b9bd50 x28: ffff8000825f7000 x27: 0000000000000000
[  231.726102] x26: 0000000000000001 x25: fffffffffffff010 x24: 0000000000000ff0
[  231.728122] x23: ffff0000c3a0b600 x22: ffff0000c3a0b5c0 x21: fffffffffffffe0a
[  231.730203] x20: ffff0000c3a0b600 x19: ffff0000c0102400 x18: 0000000000000000
[  231.732329] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffe7aa8510
[  231.734212] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000002
[  231.736291] x11: ffff8000826998a8 x10: ffff800082b9baf0 x9 : ffff800081137558
[  231.738195] x8 : fffffc00030e82c8 x7 : 0000000000000000 x6 : 0000000000000001
[  231.740192] x5 : ffff0000ffbafe00 x4 : 0000000000000000 x3 : 0000000000000000
[  231.742118] x2 : 00000000000006aa x1 : 0000000000000001 x0 : ffff0000c0007208
[  231.744196] Call trace:
[  231.744892]  rb_update_pages+0x378/0x3f8
[  231.745893]  update_pages_handler+0x1c/0x38
[  231.746893]  process_one_work+0x1f0/0x468
[  231.747852]  worker_thread+0x54/0x410
[  231.748737]  kthread+0x124/0x138
[  231.749549]  ret_from_fork+0x10/0x20
[  231.750434] ---[ end trace 0000000000000000 ]---
[  233.720486] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
[  233.721696] Mem abort info:
[  233.721935]   ESR = 0x0000000096000004
[  233.722283]   EC = 0x25: DABT (current EL), IL = 32 bits
[  233.722596]   SET = 0, FnV = 0
[  233.722805]   EA = 0, S1PTW = 0
[  233.723026]   FSC = 0x04: level 0 translation fault
[  233.723458] Data abort info:
[  233.723734]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[  233.724176]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[  233.724589]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[  233.725075] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000104943000
[  233.725592] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000
[  233.726231] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[  233.726720] Modules linked in:
[  233.727007] CPU: 0 PID: 9 Comm: kworker/0:1 Tainted: G        W          6.5.0-rc1-00276-g20edcec23f92 #15
[  233.727777] Hardware name: linux,dummy-virt (DT)
[  233.728225] Workqueue: events update_pages_handler
[  233.728655] pstate: 200000c5 (nzCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  233.729054] pc : rb_update_pages+0x1a8/0x3f8
[  233.729334] lr : rb_update_pages+0x154/0x3f8
[  233.729592] sp : ffff800082b9bd50
[  233.729792] x29: ffff800082b9bd50 x28: ffff8000825f7000 x27: 00000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53718/">CVE-2023-53718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53718">CVE-2023-53718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252564">SUSE bug 1252564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53748</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53748" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53748" ref_url="https://www.suse.com/security/cve/CVE-2023-53748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mediatek: vcodec: Fix potential array out-of-bounds in decoder queue_setup

variable *nplanes is provided by user via system call argument. The
possible value of q_data-&gt;fmt-&gt;num_planes is 1-3, while the value
of *nplanes can be 1-8. The array access by index i can cause array
out-of-bounds.

Fix this bug by checking *nplanes against the array size.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53748/">CVE-2023-53748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53748">CVE-2023-53748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254907">SUSE bug 1254907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53749</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53749" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53749" ref_url="https://www.suse.com/security/cve/CVE-2023-53749" source="SUSE CVE"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53749/">CVE-2023-53749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53749">CVE-2023-53749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254612">SUSE bug 1254612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53756</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53756" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53756" ref_url="https://www.suse.com/security/cve/CVE-2023-53756" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: VMX: Fix crash due to uninitialized current_vmcs

KVM enables 'Enlightened VMCS' and 'Enlightened MSR Bitmap' when running as
a nested hypervisor on top of Hyper-V. When MSR bitmap is updated,
evmcs_touch_msr_bitmap function uses current_vmcs per-cpu variable to mark
that the msr bitmap was changed.

vmx_vcpu_create() modifies the msr bitmap via vmx_disable_intercept_for_msr
-&gt; vmx_msr_bitmap_l01_changed which in the end calls this function. The
function checks for current_vmcs if it is null but the check is
insufficient because current_vmcs is not initialized. Because of this, the
code might incorrectly write to the structure pointed by current_vmcs value
left by another task. Preemption is not disabled, the current task can be
preempted and moved to another CPU while current_vmcs is accessed multiple
times from evmcs_touch_msr_bitmap() which leads to crash.

The manipulation of MSR bitmaps by callers happens only for vmcs01 so the
solution is to use vmx-&gt;vmcs01.vmcs instead of current_vmcs.

  BUG: kernel NULL pointer dereference, address: 0000000000000338
  PGD 4e1775067 P4D 0
  Oops: 0002 [#1] PREEMPT SMP NOPTI
  ...
  RIP: 0010:vmx_msr_bitmap_l01_changed+0x39/0x50 [kvm_intel]
  ...
  Call Trace:
   vmx_disable_intercept_for_msr+0x36/0x260 [kvm_intel]
   vmx_vcpu_create+0xe6/0x540 [kvm_intel]
   kvm_arch_vcpu_create+0x1d1/0x2e0 [kvm]
   kvm_vm_ioctl_create_vcpu+0x178/0x430 [kvm]
   kvm_vm_ioctl+0x53f/0x790 [kvm]
   __x64_sys_ioctl+0x8a/0xc0
   do_syscall_64+0x5c/0x90
   entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53756/">CVE-2023-53756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53756">CVE-2023-53756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254822">SUSE bug 1254822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53757</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53757" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53757" ref_url="https://www.suse.com/security/cve/CVE-2023-53757" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/irq-mvebu-gicp: Fix refcount leak in mvebu_gicp_probe

of_irq_find_parent() returns a node pointer with refcount incremented,
We should use of_node_put() on it when not needed anymore.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53757/">CVE-2023-53757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53757">CVE-2023-53757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254607">SUSE bug 1254607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53763</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53763" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53763" ref_url="https://www.suse.com/security/cve/CVE-2023-53763" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "f2fs: fix to do sanity check on extent cache correctly"

syzbot reports a f2fs bug as below:

UBSAN: array-index-out-of-bounds in fs/f2fs/f2fs.h:3275:19
index 1409 is out of range for type '__le32[923]' (aka 'unsigned int[923]')
Call Trace:
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106
 ubsan_epilogue lib/ubsan.c:217 [inline]
 __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348
 inline_data_addr fs/f2fs/f2fs.h:3275 [inline]
 __recover_inline_status fs/f2fs/inode.c:113 [inline]
 do_read_inode fs/f2fs/inode.c:480 [inline]
 f2fs_iget+0x4730/0x48b0 fs/f2fs/inode.c:604
 f2fs_fill_super+0x640e/0x80c0 fs/f2fs/super.c:4601
 mount_bdev+0x276/0x3b0 fs/super.c:1391
 legacy_get_tree+0xef/0x190 fs/fs_context.c:611
 vfs_get_tree+0x8c/0x270 fs/super.c:1519
 do_new_mount+0x28f/0xae0 fs/namespace.c:3335
 do_mount fs/namespace.c:3675 [inline]
 __do_sys_mount fs/namespace.c:3884 [inline]
 __se_sys_mount+0x2d9/0x3c0 fs/namespace.c:3861
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

The issue was bisected to:

commit d48a7b3a72f121655d95b5157c32c7d555e44c05
Author: Chao Yu &lt;chao@kernel.org&gt;
Date:   Mon Jan 9 03:49:20 2023 +0000

    f2fs: fix to do sanity check on extent cache correctly

The root cause is we applied both v1 and v2 of the patch, v2 is the right
fix, so it needs to revert v1 in order to fix reported issue.

v1:
commit d48a7b3a72f1 ("f2fs: fix to do sanity check on extent cache correctly")
https://lore.kernel.org/lkml/20230109034920.492914-1-chao@kernel.org/

v2:
commit 269d11948100 ("f2fs: fix to do sanity check on extent cache correctly")
https://lore.kernel.org/lkml/20230207134808.1827869-1-chao@kernel.org/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53763/">CVE-2023-53763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53763">CVE-2023-53763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254600">SUSE bug 1254600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53765</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53765" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53765" ref_url="https://www.suse.com/security/cve/CVE-2023-53765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm cache: free background tracker's queued work in btracker_destroy

Otherwise the kernel can BUG with:

[ 2245.426978] =============================================================================
[ 2245.435155] BUG bt_work (Tainted: G    B   W         ): Objects remaining in bt_work on __kmem_cache_shutdown()
[ 2245.445233] -----------------------------------------------------------------------------
[ 2245.445233]
[ 2245.454879] Slab 0x00000000b0ce2b30 objects=64 used=2 fp=0x000000000a3c6a4e flags=0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff)
[ 2245.467300] CPU: 7 PID: 10805 Comm: lvm Kdump: loaded Tainted: G    B   W          6.0.0-rc2 #19
[ 2245.476078] Hardware name: Dell Inc. PowerEdge R7525/0590KW, BIOS 2.5.6 10/06/2021
[ 2245.483646] Call Trace:
[ 2245.486100]  &lt;TASK&gt;
[ 2245.488206]  dump_stack_lvl+0x34/0x48
[ 2245.491878]  slab_err+0x95/0xcd
[ 2245.495028]  __kmem_cache_shutdown.cold+0x31/0x136
[ 2245.499821]  kmem_cache_destroy+0x49/0x130
[ 2245.503928]  btracker_destroy+0x12/0x20 [dm_cache]
[ 2245.508728]  smq_destroy+0x15/0x60 [dm_cache_smq]
[ 2245.513435]  dm_cache_policy_destroy+0x12/0x20 [dm_cache]
[ 2245.518834]  destroy+0xc0/0x110 [dm_cache]
[ 2245.522933]  dm_table_destroy+0x5c/0x120 [dm_mod]
[ 2245.527649]  __dm_destroy+0x10e/0x1c0 [dm_mod]
[ 2245.532102]  dev_remove+0x117/0x190 [dm_mod]
[ 2245.536384]  ctl_ioctl+0x1a2/0x290 [dm_mod]
[ 2245.540579]  dm_ctl_ioctl+0xa/0x20 [dm_mod]
[ 2245.544773]  __x64_sys_ioctl+0x8a/0xc0
[ 2245.548524]  do_syscall_64+0x5c/0x90
[ 2245.552104]  ? syscall_exit_to_user_mode+0x12/0x30
[ 2245.556897]  ? do_syscall_64+0x69/0x90
[ 2245.560648]  ? do_syscall_64+0x69/0x90
[ 2245.564394]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 2245.569447] RIP: 0033:0x7fe52583ec6b
...
[ 2245.646771] ------------[ cut here ]------------
[ 2245.651395] kmem_cache_destroy bt_work: Slab cache still has objects when called from btracker_destroy+0x12/0x20 [dm_cache]
[ 2245.651408] WARNING: CPU: 7 PID: 10805 at mm/slab_common.c:478 kmem_cache_destroy+0x128/0x130

Found using: lvm2-testsuite --only "cache-single-split.sh"

Ben bisected and found that commit 0495e337b703 ("mm/slab_common:
Deleting kobject in kmem_cache_destroy() without holding
slab_mutex/cpu_hotplug_lock") first exposed dm-cache's incomplete
cleanup of its background tracker work objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53765/">CVE-2023-53765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53765">CVE-2023-53765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254912">SUSE bug 1254912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53781</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53781" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53781" ref_url="https://www.suse.com/security/cve/CVE-2023-53781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smc: Fix use-after-free in tcp_write_timer_handler().

With Eric's ref tracker, syzbot finally found a repro for
use-after-free in tcp_write_timer_handler() by kernel TCP
sockets. [0]

If SMC creates a kernel socket in __smc_create(), the kernel
socket is supposed to be freed in smc_clcsock_release() by
calling sock_release() when we close() the parent SMC socket.

However, at the end of smc_clcsock_release(), the kernel
socket's sk_state might not be TCP_CLOSE.  This means that
we have not called inet_csk_destroy_sock() in __tcp_close()
and have not stopped the TCP timers.

The kernel socket's TCP timers can be fired later, so we
need to hold a refcnt for net as we do for MPTCP subflows
in mptcp_subflow_create_socket().

[0]:
leaked reference.
 sk_alloc (./include/net/net_namespace.h:335 net/core/sock.c:2108)
 inet_create (net/ipv4/af_inet.c:319 net/ipv4/af_inet.c:244)
 __sock_create (net/socket.c:1546)
 smc_create (net/smc/af_smc.c:3269 net/smc/af_smc.c:3284)
 __sock_create (net/socket.c:1546)
 __sys_socket (net/socket.c:1634 net/socket.c:1618 net/socket.c:1661)
 __x64_sys_socket (net/socket.c:1672)
 do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)
 entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:120)
==================================================================
BUG: KASAN: slab-use-after-free in tcp_write_timer_handler (net/ipv4/tcp_timer.c:378 net/ipv4/tcp_timer.c:624 net/ipv4/tcp_timer.c:594)
Read of size 1 at addr ffff888052b65e0d by task syzrepro/18091

CPU: 0 PID: 18091 Comm: syzrepro Tainted: G        W          6.3.0-rc4-01174-gb5d54eb5899a #7
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-1.amzn2022.0.1 04/01/2014
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl (lib/dump_stack.c:107)
 print_report (mm/kasan/report.c:320 mm/kasan/report.c:430)
 kasan_report (mm/kasan/report.c:538)
 tcp_write_timer_handler (net/ipv4/tcp_timer.c:378 net/ipv4/tcp_timer.c:624 net/ipv4/tcp_timer.c:594)
 tcp_write_timer (./include/linux/spinlock.h:390 net/ipv4/tcp_timer.c:643)
 call_timer_fn (./arch/x86/include/asm/jump_label.h:27 ./include/linux/jump_label.h:207 ./include/trace/events/timer.h:127 kernel/time/timer.c:1701)
 __run_timers.part.0 (kernel/time/timer.c:1752 kernel/time/timer.c:2022)
 run_timer_softirq (kernel/time/timer.c:2037)
 __do_softirq (./arch/x86/include/asm/jump_label.h:27 ./include/linux/jump_label.h:207 ./include/trace/events/irq.h:142 kernel/softirq.c:572)
 __irq_exit_rcu (kernel/softirq.c:445 kernel/softirq.c:650)
 irq_exit_rcu (kernel/softirq.c:664)
 sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1107 (discriminator 14))
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53781/">CVE-2023-53781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53781">CVE-2023-53781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254751">SUSE bug 1254751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254755">SUSE bug 1254755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53782</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53782" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53782" ref_url="https://www.suse.com/security/cve/CVE-2023-53782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dccp: Fix out of bounds access in DCCP error handler

There was a previous attempt to fix an out-of-bounds access in the DCCP
error handlers, but that fix assumed that the error handlers only want
to access the first 8 bytes of the DCCP header. Actually, they also look
at the DCCP sequence number, which is stored beyond 8 bytes, so an
explicit pskb_may_pull() is required.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53782/">CVE-2023-53782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53782">CVE-2023-53782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254758">SUSE bug 1254758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53786</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53786" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53786" ref_url="https://www.suse.com/security/cve/CVE-2023-53786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm flakey: fix a crash with invalid table line

This command will crash with NULL pointer dereference:
 dmsetup create flakey --table \
  "0 `blockdev --getsize /dev/ram0` flakey /dev/ram0 0 0 1 2 corrupt_bio_byte 512"

Fix the crash by checking if arg_name is non-NULL before comparing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53786/">CVE-2023-53786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53786">CVE-2023-53786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254916">SUSE bug 1254916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53788</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53788" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53788" ref_url="https://www.suse.com/security/cve/CVE-2023-53788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set()

tuning_ctl_set() might have buffer overrun at (X) if it didn't break
from loop by matching (A).

	static int tuning_ctl_set(...)
	{
		for (i = 0; i &lt; TUNING_CTLS_COUNT; i++)
(A)			if (nid == ca0132_tuning_ctls[i].nid)
				break;

		snd_hda_power_up(...);
(X)		dspio_set_param(..., ca0132_tuning_ctls[i].mid, ...);
		snd_hda_power_down(...);                ^

		return 1;
	}

We will get below error by cppcheck

	sound/pci/hda/patch_ca0132.c:4229:2: note: After for loop, i has value 12
	 for (i = 0; i &lt; TUNING_CTLS_COUNT; i++)
	 ^
	sound/pci/hda/patch_ca0132.c:4234:43: note: Array index out of bounds
	 dspio_set_param(codec, ca0132_tuning_ctls[i].mid, 0x20,
	                                           ^
This patch cares non match case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53788/">CVE-2023-53788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53788">CVE-2023-53788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254917">SUSE bug 1254917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53794</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53794" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53794" ref_url="https://www.suse.com/security/cve/CVE-2023-53794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1285-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1287-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1288-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix session state check in reconnect to avoid use-after-free issue

Don't collect exiting session in smb2_reconnect_server(), because it
will be released soon.

Note that the exiting session will stay in server-&gt;smb_ses_list until
it complete the cifs_free_ipc() and logoff() and then delete itself
from the list.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53794/">CVE-2023-53794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53794">CVE-2023-53794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255163">SUSE bug 1255163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255235">SUSE bug 1255235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53796</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53796" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53796" ref_url="https://www.suse.com/security/cve/CVE-2023-53796" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix information leak in f2fs_move_inline_dirents()

When converting an inline directory to a regular one, f2fs is leaking
uninitialized memory to disk because it doesn't initialize the entire
directory block.  Fix this by zero-initializing the block.

This bug was introduced by commit 4ec17d688d74 ("f2fs: avoid unneeded
initializing when converting inline dentry"), which didn't consider the
security implications of leaking uninitialized memory to disk.

This was found by running xfstest generic/435 on a KMSAN-enabled kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53796/">CVE-2023-53796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53796">CVE-2023-53796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254741">SUSE bug 1254741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53799</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53799" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53799" ref_url="https://www.suse.com/security/cve/CVE-2023-53799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: api - Use work queue in crypto_destroy_instance

The function crypto_drop_spawn expects to be called in process
context.  However, when an instance is unregistered while it still
has active users, the last user may cause the instance to be freed
in atomic context.

Fix this by delaying the freeing to a work queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53799/">CVE-2023-53799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53799">CVE-2023-53799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254732">SUSE bug 1254732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53800</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53800" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53800" ref_url="https://www.suse.com/security/cve/CVE-2023-53800" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ubi: Fix use-after-free when volume resizing failed

There is an use-after-free problem reported by KASAN:
  ==================================================================
  BUG: KASAN: use-after-free in ubi_eba_copy_table+0x11f/0x1c0 [ubi]
  Read of size 8 at addr ffff888101eec008 by task ubirsvol/4735

  CPU: 2 PID: 4735 Comm: ubirsvol
  Not tainted 6.1.0-rc1-00003-g84fa3304a7fc-dirty #14
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
  BIOS 1.14.0-1.fc33 04/01/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x34/0x44
   print_report+0x171/0x472
   kasan_report+0xad/0x130
   ubi_eba_copy_table+0x11f/0x1c0 [ubi]
   ubi_resize_volume+0x4f9/0xbc0 [ubi]
   ubi_cdev_ioctl+0x701/0x1850 [ubi]
   __x64_sys_ioctl+0x11d/0x170
   do_syscall_64+0x35/0x80
   entry_SYSCALL_64_after_hwframe+0x46/0xb0
   &lt;/TASK&gt;

When ubi_change_vtbl_record() returns an error in ubi_resize_volume(),
"new_eba_tbl" will be freed on error handing path, but it is holded
by "vol-&gt;eba_tbl" in ubi_eba_replace_table(). It means that the liftcycle
of "vol-&gt;eba_tbl" and "vol" are different, so when resizing volume in
next time, it causing an use-after-free fault.

Fix it by not freeing "new_eba_tbl" after it replaced in
ubi_eba_replace_table(), while will be freed in next volume resizing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53800/">CVE-2023-53800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53800">CVE-2023-53800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254727">SUSE bug 1254727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53802</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53802" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53802" ref_url="https://www.suse.com/security/cve/CVE-2023-53802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function

It is stated that ath9k_htc_rx_msg() either frees the provided skb or
passes its management to another callback function. However, the skb is
not freed in case there is no another callback function, and Syzkaller was
able to cause a memory leak. Also minor comment fix.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53802/">CVE-2023-53802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53802">CVE-2023-53802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254725">SUSE bug 1254725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53803</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53803" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53803" ref_url="https://www.suse.com/security/cve/CVE-2023-53803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process()

A fix for:

BUG: KASAN: slab-out-of-bounds in ses_enclosure_data_process+0x949/0xe30 [ses]
Read of size 1 at addr ffff88a1b043a451 by task systemd-udevd/3271

Checking after (and before in next loop) addl_desc_ptr[1] is sufficient, we
expect the size to be sanitized before first access to addl_desc_ptr[1].
Make sure we don't walk beyond end of page.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53803/">CVE-2023-53803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53803">CVE-2023-53803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255165">SUSE bug 1255165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53804</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53804" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53804" ref_url="https://www.suse.com/security/cve/CVE-2023-53804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode()

During unmount process of nilfs2, nothing holds nilfs_root structure after
nilfs2 detaches its writer in nilfs_detach_log_writer().  However, since
nilfs_evict_inode() uses nilfs_root for some cleanup operations, it may
cause use-after-free read if inodes are left in "garbage_list" and
released by nilfs_dispose_list() at the end of nilfs_detach_log_writer().

Fix this issue by modifying nilfs_evict_inode() to only clear inode
without additional metadata changes that use nilfs_root if the file system
is degraded to read-only or the writer is detached.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53804/">CVE-2023-53804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53804">CVE-2023-53804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254920">SUSE bug 1254920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53808</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53808" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53808" ref_url="https://www.suse.com/security/cve/CVE-2023-53808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: fix memory leak in mwifiex_histogram_read()

Always free the zeroed page on return from 'mwifiex_histogram_read()'.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53808/">CVE-2023-53808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53808">CVE-2023-53808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254723">SUSE bug 1254723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53817</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53817" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53817" ref_url="https://www.suse.com/security/cve/CVE-2023-53817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()

During NVMeTCP Authentication a controller can trigger a kernel
oops by specifying the 8192 bit Diffie Hellman group and passing
a correctly sized, but zeroed Diffie Hellamn value.
mpi_cmp_ui() was detecting this if the second parameter was 0,
but 1 is passed from dh_is_pubkey_valid(). This causes the null
pointer u-&gt;d to be dereferenced towards the end of mpi_cmp_ui()
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53817/">CVE-2023-53817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53817">CVE-2023-53817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254992">SUSE bug 1254992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53818</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53818" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53818" ref_url="https://www.suse.com/security/cve/CVE-2023-53818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ARM: zynq: Fix refcount leak in zynq_early_slcr_init

of_find_compatible_node() returns a node pointer with refcount incremented,
we should use of_node_put() on error path.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53818/">CVE-2023-53818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53818">CVE-2023-53818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254714">SUSE bug 1254714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53819</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53819" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53819" ref_url="https://www.suse.com/security/cve/CVE-2023-53819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

amdgpu: validate offset_in_bo of drm_amdgpu_gem_va

This is motivated by OOB access in amdgpu_vm_update_range when
offset_in_bo+map_size overflows.

v2: keep the validations in amdgpu_vm_bo_map
v3: add the validations to amdgpu_vm_bo_map/amdgpu_vm_bo_replace_map
    rather than to amdgpu_gem_va_ioctl
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53819/">CVE-2023-53819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53819">CVE-2023-53819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254712">SUSE bug 1254712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53820</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53820" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53820" ref_url="https://www.suse.com/security/cve/CVE-2023-53820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

loop: loop_set_status_from_info() check before assignment

In loop_set_status_from_info(), lo-&gt;lo_offset and lo-&gt;lo_sizelimit should
be checked before reassignment, because if an overflow error occurs, the
original correct value will be changed to the wrong value, and it will not
be changed back.

More, the original patch did not solve the problem, the value was set and
ioctl returned an error, but the subsequent io used the value in the loop
driver, which still caused an alarm:

loop_handle_cmd
 do_req_filebacked
  loff_t pos = ((loff_t) blk_rq_pos(rq) &lt;&lt; 9) + lo-&gt;lo_offset;
  lo_rw_aio
   cmd-&gt;iocb.ki_pos = pos
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53820/">CVE-2023-53820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53820">CVE-2023-53820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254706">SUSE bug 1254706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53821</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53821" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53821" ref_url="https://www.suse.com/security/cve/CVE-2023-53821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip6_vti: fix slab-use-after-free in decode_session6

When ipv6_vti device is set to the qdisc of the sfb type, the cb field
of the sent skb may be modified during enqueuing. Then,
slab-use-after-free may occur when ipv6_vti device sends IPv6 packets.

The stack information is as follows:
BUG: KASAN: slab-use-after-free in decode_session6+0x103f/0x1890
Read of size 1 at addr ffff88802e08edc2 by task swapper/0/0
CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.4.0-next-20230707-00001-g84e2cad7f979 #410
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 04/01/2014
Call Trace:
&lt;IRQ&gt;
dump_stack_lvl+0xd9/0x150
print_address_description.constprop.0+0x2c/0x3c0
kasan_report+0x11d/0x130
decode_session6+0x103f/0x1890
__xfrm_decode_session+0x54/0xb0
vti6_tnl_xmit+0x3e6/0x1ee0
dev_hard_start_xmit+0x187/0x700
sch_direct_xmit+0x1a3/0xc30
__qdisc_run+0x510/0x17a0
__dev_queue_xmit+0x2215/0x3b10
neigh_connected_output+0x3c2/0x550
ip6_finish_output2+0x55a/0x1550
ip6_finish_output+0x6b9/0x1270
ip6_output+0x1f1/0x540
ndisc_send_skb+0xa63/0x1890
ndisc_send_rs+0x132/0x6f0
addrconf_rs_timer+0x3f1/0x870
call_timer_fn+0x1a0/0x580
expire_timers+0x29b/0x4b0
run_timer_softirq+0x326/0x910
__do_softirq+0x1d4/0x905
irq_exit_rcu+0xb7/0x120
sysvec_apic_timer_interrupt+0x97/0xc0
&lt;/IRQ&gt;
Allocated by task 9176:
kasan_save_stack+0x22/0x40
kasan_set_track+0x25/0x30
__kasan_slab_alloc+0x7f/0x90
kmem_cache_alloc_node+0x1cd/0x410
kmalloc_reserve+0x165/0x270
__alloc_skb+0x129/0x330
netlink_sendmsg+0x9b1/0xe30
sock_sendmsg+0xde/0x190
____sys_sendmsg+0x739/0x920
___sys_sendmsg+0x110/0x1b0
__sys_sendmsg+0xf7/0x1c0
do_syscall_64+0x39/0xb0
entry_SYSCALL_64_after_hwframe+0x63/0xcd
Freed by task 9176:
kasan_save_stack+0x22/0x40
kasan_set_track+0x25/0x30
kasan_save_free_info+0x2b/0x40
____kasan_slab_free+0x160/0x1c0
slab_free_freelist_hook+0x11b/0x220
kmem_cache_free+0xf0/0x490
skb_free_head+0x17f/0x1b0
skb_release_data+0x59c/0x850
consume_skb+0xd2/0x170
netlink_unicast+0x54f/0x7f0
netlink_sendmsg+0x926/0xe30
sock_sendmsg+0xde/0x190
____sys_sendmsg+0x739/0x920
___sys_sendmsg+0x110/0x1b0
__sys_sendmsg+0xf7/0x1c0
do_syscall_64+0x39/0xb0
entry_SYSCALL_64_after_hwframe+0x63/0xcd
The buggy address belongs to the object at ffff88802e08ed00
which belongs to the cache skbuff_small_head of size 640
The buggy address is located 194 bytes inside of
freed 640-byte region [ffff88802e08ed00, ffff88802e08ef80)

As commit f855691975bb ("xfrm6: Fix the nexthdr offset in
_decode_session6.") showed, xfrm_decode_session was originally intended
only for the receive path. IP6CB(skb)-&gt;nhoff is not set during
transmission. Therefore, set the cb field in the skb to 0 before
sending packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53821/">CVE-2023-53821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53821">CVE-2023-53821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254669">SUSE bug 1254669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53824</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53824" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53824" ref_url="https://www.suse.com/security/cve/CVE-2023-53824" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netlink: annotate lockless accesses to nlk-&gt;max_recvmsg_len

syzbot reported a data-race in data-race in netlink_recvmsg() [1]

Indeed, netlink_recvmsg() can be run concurrently,
and netlink_dump() also needs protection.

[1]
BUG: KCSAN: data-race in netlink_recvmsg / netlink_recvmsg

read to 0xffff888141840b38 of 8 bytes by task 23057 on cpu 0:
netlink_recvmsg+0xea/0x730 net/netlink/af_netlink.c:1988
sock_recvmsg_nosec net/socket.c:1017 [inline]
sock_recvmsg net/socket.c:1038 [inline]
__sys_recvfrom+0x1ee/0x2e0 net/socket.c:2194
__do_sys_recvfrom net/socket.c:2212 [inline]
__se_sys_recvfrom net/socket.c:2208 [inline]
__x64_sys_recvfrom+0x78/0x90 net/socket.c:2208
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

write to 0xffff888141840b38 of 8 bytes by task 23037 on cpu 1:
netlink_recvmsg+0x114/0x730 net/netlink/af_netlink.c:1989
sock_recvmsg_nosec net/socket.c:1017 [inline]
sock_recvmsg net/socket.c:1038 [inline]
____sys_recvmsg+0x156/0x310 net/socket.c:2720
___sys_recvmsg net/socket.c:2762 [inline]
do_recvmmsg+0x2e5/0x710 net/socket.c:2856
__sys_recvmmsg net/socket.c:2935 [inline]
__do_sys_recvmmsg net/socket.c:2958 [inline]
__se_sys_recvmmsg net/socket.c:2951 [inline]
__x64_sys_recvmmsg+0xe2/0x160 net/socket.c:2951
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

value changed: 0x0000000000000000 -&gt; 0x0000000000001000

Reported by Kernel Concurrency Sanitizer on:
CPU: 1 PID: 23037 Comm: syz-executor.2 Not tainted 6.3.0-rc4-syzkaller-00195-g5a57b48fdfcb #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53824/">CVE-2023-53824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53824">CVE-2023-53824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254687">SUSE bug 1254687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53825</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53825" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53825" ref_url="https://www.suse.com/security/cve/CVE-2023-53825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kcm: Fix error handling for SOCK_DGRAM in kcm_sendmsg().

syzkaller found a memory leak in kcm_sendmsg(), and commit c821a88bd720
("kcm: Fix memory leak in error path of kcm_sendmsg()") suppressed it by
updating kcm_tx_msg(head)-&gt;last_skb if partial data is copied so that the
following sendmsg() will resume from the skb.

However, we cannot know how many bytes were copied when we get the error.
Thus, we could mess up the MSG_MORE queue.

When kcm_sendmsg() fails for SOCK_DGRAM, we should purge the queue as we
do so for UDP by udp_flush_pending_frames().

Even without this change, when the error occurred, the following sendmsg()
resumed from a wrong skb and the queue was messed up.  However, we have
yet to get such a report, and only syzkaller stumbled on it.  So, this
can be changed safely.

Note this does not change SOCK_SEQPACKET behaviour.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53825/">CVE-2023-53825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53825">CVE-2023-53825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254707">SUSE bug 1254707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53826</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53826" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53826" ref_url="https://www.suse.com/security/cve/CVE-2023-53826" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ubi: Fix UAF wear-leveling entry in eraseblk_count_seq_show()

Wear-leveling entry could be freed in error path, which may be accessed
again in eraseblk_count_seq_show(), for example:

__erase_worker                eraseblk_count_seq_show
                                wl = ubi-&gt;lookuptbl[*block_number]
				if (wl)
  wl_entry_destroy
    ubi-&gt;lookuptbl[e-&gt;pnum] = NULL
    kmem_cache_free(ubi_wl_entry_slab, e)
		                   erase_count = wl-&gt;ec  // UAF!

Wear-leveling entry updating/accessing in ubi-&gt;lookuptbl should be
protected by ubi-&gt;wl_lock, fix it by adding ubi-&gt;wl_lock to serialize
wl entry accessing between wl_entry_destroy() and
eraseblk_count_seq_show().

Fetch a reproducer in [Link].
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53826/">CVE-2023-53826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53826">CVE-2023-53826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254667">SUSE bug 1254667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53829</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53829" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53829" ref_url="https://www.suse.com/security/cve/CVE-2023-53829" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: flush inode if atomic file is aborted

Let's flush the inode being aborted atomic operation to avoid stale dirty
inode during eviction in this call stack:

  f2fs_mark_inode_dirty_sync+0x22/0x40 [f2fs]
  f2fs_abort_atomic_write+0xc4/0xf0 [f2fs]
  f2fs_evict_inode+0x3f/0x690 [f2fs]
  ? sugov_start+0x140/0x140
  evict+0xc3/0x1c0
  evict_inodes+0x17b/0x210
  generic_shutdown_super+0x32/0x120
  kill_block_super+0x21/0x50
  deactivate_locked_super+0x31/0x90
  cleanup_mnt+0x100/0x160
  task_work_run+0x59/0x90
  do_exit+0x33b/0xa50
  do_group_exit+0x2d/0x80
  __x64_sys_exit_group+0x14/0x20
  do_syscall_64+0x3b/0x90
  entry_SYSCALL_64_after_hwframe+0x63/0xcd

This triggers f2fs_bug_on() in f2fs_evict_inode:
 f2fs_bug_on(sbi, is_inode_flag_set(inode, FI_DIRTY_INODE));

This fixes the syzbot report:

loop0: detected capacity change from 0 to 131072
F2FS-fs (loop0): invalid crc value
F2FS-fs (loop0): Found nat_bits in checkpoint
F2FS-fs (loop0): Mounted with checkpoint version = 48b305e4
------------[ cut here ]------------
kernel BUG at fs/f2fs/inode.c:869!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 5014 Comm: syz-executor220 Not tainted 6.4.0-syzkaller-11479-g6cd06ab12d1a #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023
RIP: 0010:f2fs_evict_inode+0x172d/0x1e00 fs/f2fs/inode.c:869
Code: ff df 48 c1 ea 03 80 3c 02 00 0f 85 6a 06 00 00 8b 75 40 ba 01 00 00 00 4c 89 e7 e8 6d ce 06 00 e9 aa fc ff ff e8 63 22 e2 fd &lt;0f&gt; 0b e8 5c 22 e2 fd 48 c7 c0 a8 3a 18 8d 48 ba 00 00 00 00 00 fc
RSP: 0018:ffffc90003a6fa00 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000
RDX: ffff8880273b8000 RSI: ffffffff83a2bd0d RDI: 0000000000000007
RBP: ffff888077db91b0 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffff888029a3c000
R13: ffff888077db9660 R14: ffff888029a3c0b8 R15: ffff888077db9c50
FS:  0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1909bb9000 CR3: 00000000276a9000 CR4: 0000000000350ef0
Call Trace:
 &lt;TASK&gt;
 evict+0x2ed/0x6b0 fs/inode.c:665
 dispose_list+0x117/0x1e0 fs/inode.c:698
 evict_inodes+0x345/0x440 fs/inode.c:748
 generic_shutdown_super+0xaf/0x480 fs/super.c:478
 kill_block_super+0x64/0xb0 fs/super.c:1417
 kill_f2fs_super+0x2af/0x3c0 fs/f2fs/super.c:4704
 deactivate_locked_super+0x98/0x160 fs/super.c:330
 deactivate_super+0xb1/0xd0 fs/super.c:361
 cleanup_mnt+0x2ae/0x3d0 fs/namespace.c:1254
 task_work_run+0x16f/0x270 kernel/task_work.c:179
 exit_task_work include/linux/task_work.h:38 [inline]
 do_exit+0xa9a/0x29a0 kernel/exit.c:874
 do_group_exit+0xd4/0x2a0 kernel/exit.c:1024
 __do_sys_exit_group kernel/exit.c:1035 [inline]
 __se_sys_exit_group kernel/exit.c:1033 [inline]
 __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1033
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f309be71a09
Code: Unable to access opcode bytes at 0x7f309be719df.
RSP: 002b:00007fff171df518 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 00007f309bef7330 RCX: 00007f309be71a09
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001
RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 00007f309bef1e40
R10: 0000000000010600 R11: 0000000000000246 R12: 00007f309bef7330
R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
 &lt;/TASK&gt;
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:f2fs_evict_inode+0x172d/0x1e00 fs/f2fs/inode.c:869
Code: ff df 48 c1 ea 03 80 3c 02 00 0f 85 6a 06 00 00 8b 75 40 ba 01 00 00 00 4c 89 e7 e8 6d ce 06 00 e9 aa fc ff ff e8 63 22 e2 fd &lt;0f&gt; 0b e8 5c 22 e2 fd 48 c7 c0 a8 3a 18 8d 48 ba 00 00 00 00 00 fc
RSP: 0018:ffffc90003a6fa00 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 0000000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53829/">CVE-2023-53829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53829">CVE-2023-53829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255010">SUSE bug 1255010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53831</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53831" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53831" ref_url="https://www.suse.com/security/cve/CVE-2023-53831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: read sk-&gt;sk_family once in sk_mc_loop()

syzbot is playing with IPV6_ADDRFORM quite a lot these days,
and managed to hit the WARN_ON_ONCE(1) in sk_mc_loop()

We have many more similar issues to fix.

WARNING: CPU: 1 PID: 1593 at net/core/sock.c:782 sk_mc_loop+0x165/0x260
Modules linked in:
CPU: 1 PID: 1593 Comm: kworker/1:3 Not tainted 6.1.40-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
Workqueue: events_power_efficient gc_worker
RIP: 0010:sk_mc_loop+0x165/0x260 net/core/sock.c:782
Code: 34 1b fd 49 81 c7 18 05 00 00 4c 89 f8 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 ff e8 25 36 6d fd 4d 8b 37 eb 13 e8 db 33 1b fd &lt;0f&gt; 0b b3 01 eb 34 e8 d0 33 1b fd 45 31 f6 49 83 c6 38 4c 89 f0 48
RSP: 0018:ffffc90000388530 EFLAGS: 00010246
RAX: ffffffff846d9b55 RBX: 0000000000000011 RCX: ffff88814f884980
RDX: 0000000000000102 RSI: ffffffff87ae5160 RDI: 0000000000000011
RBP: ffffc90000388550 R08: 0000000000000003 R09: ffffffff846d9a65
R10: 0000000000000002 R11: ffff88814f884980 R12: dffffc0000000000
R13: ffff88810dbee000 R14: 0000000000000010 R15: ffff888150084000
FS: 0000000000000000(0000) GS:ffff8881f6b00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000180 CR3: 000000014ee5b000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;IRQ&gt;
[&lt;ffffffff8507734f&gt;] ip6_finish_output2+0x33f/0x1ae0 net/ipv6/ip6_output.c:83
[&lt;ffffffff85062766&gt;] __ip6_finish_output net/ipv6/ip6_output.c:200 [inline]
[&lt;ffffffff85062766&gt;] ip6_finish_output+0x6c6/0xb10 net/ipv6/ip6_output.c:211
[&lt;ffffffff85061f8c&gt;] NF_HOOK_COND include/linux/netfilter.h:298 [inline]
[&lt;ffffffff85061f8c&gt;] ip6_output+0x2bc/0x3d0 net/ipv6/ip6_output.c:232
[&lt;ffffffff852071cf&gt;] dst_output include/net/dst.h:444 [inline]
[&lt;ffffffff852071cf&gt;] ip6_local_out+0x10f/0x140 net/ipv6/output_core.c:161
[&lt;ffffffff83618fb4&gt;] ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:483 [inline]
[&lt;ffffffff83618fb4&gt;] ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:529 [inline]
[&lt;ffffffff83618fb4&gt;] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]
[&lt;ffffffff83618fb4&gt;] ipvlan_queue_xmit+0x1174/0x1be0 drivers/net/ipvlan/ipvlan_core.c:677
[&lt;ffffffff8361ddd9&gt;] ipvlan_start_xmit+0x49/0x100 drivers/net/ipvlan/ipvlan_main.c:229
[&lt;ffffffff84763fc0&gt;] netdev_start_xmit include/linux/netdevice.h:4925 [inline]
[&lt;ffffffff84763fc0&gt;] xmit_one net/core/dev.c:3644 [inline]
[&lt;ffffffff84763fc0&gt;] dev_hard_start_xmit+0x320/0x980 net/core/dev.c:3660
[&lt;ffffffff8494c650&gt;] sch_direct_xmit+0x2a0/0x9c0 net/sched/sch_generic.c:342
[&lt;ffffffff8494d883&gt;] qdisc_restart net/sched/sch_generic.c:407 [inline]
[&lt;ffffffff8494d883&gt;] __qdisc_run+0xb13/0x1e70 net/sched/sch_generic.c:415
[&lt;ffffffff8478c426&gt;] qdisc_run+0xd6/0x260 include/net/pkt_sched.h:125
[&lt;ffffffff84796eac&gt;] net_tx_action+0x7ac/0x940 net/core/dev.c:5247
[&lt;ffffffff858002bd&gt;] __do_softirq+0x2bd/0x9bd kernel/softirq.c:599
[&lt;ffffffff814c3fe8&gt;] invoke_softirq kernel/softirq.c:430 [inline]
[&lt;ffffffff814c3fe8&gt;] __irq_exit_rcu+0xc8/0x170 kernel/softirq.c:683
[&lt;ffffffff814c3f09&gt;] irq_exit_rcu+0x9/0x20 kernel/softirq.c:695
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53831/">CVE-2023-53831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53831">CVE-2023-53831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254701">SUSE bug 1254701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53832</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53832" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53832" ref_url="https://www.suse.com/security/cve/CVE-2023-53832" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix null-ptr-deref in raid10_sync_request

init_resync() inits mempool and sets conf-&gt;have_replacemnt at the beginning
of sync, close_sync() frees the mempool when sync is completed.

After [1] recovery might be skipped and init_resync() is called but
close_sync() is not. null-ptr-deref occurs with r10bio-&gt;dev[i].repl_bio.

The following is one way to reproduce the issue.

  1) create a array, wait for resync to complete, mddev-&gt;recovery_cp is set
     to MaxSector.
  2) recovery is woken and it is skipped. conf-&gt;have_replacement is set to
     0 in init_resync(). close_sync() not called.
  3) some io errors and rdev A is set to WantReplacement.
  4) a new device is added and set to A's replacement.
  5) recovery is woken, A have replacement, but conf-&gt;have_replacemnt is
     0. r10bio-&gt;dev[i].repl_bio will not be alloced and null-ptr-deref
     occurs.

Fix it by not calling init_resync() if recovery skipped.

[1] commit 7e83ccbecd60 ("md/raid10: Allow skipping recovery when clean arrays are assembled")
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53832/">CVE-2023-53832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53832">CVE-2023-53832 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254671">SUSE bug 1254671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53834</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53834" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53834" ref_url="https://www.suse.com/security/cve/CVE-2023-53834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: ina2xx: avoid NULL pointer dereference on OF device match

The affected lines were resulting in a NULL pointer dereference on our
platform because the device tree contained the following list of
compatible strings:

    power-sensor@40 {
        compatible = "ti,ina232", "ti,ina231";
        ...
    };

Since the driver doesn't declare a compatible string "ti,ina232", the OF
matching succeeds on "ti,ina231". But the I2C device ID info is
populated via the first compatible string, cf. modalias population in
of_i2c_get_board_info(). Since there is no "ina232" entry in the legacy
I2C device ID table either, the struct i2c_device_id *id pointer in the
probe function is NULL.

Fix this by using the already populated type variable instead, which
points to the proper driver data. Since the name is also wanted, add a
generic one to the ina2xx_config table.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53834/">CVE-2023-53834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53834">CVE-2023-53834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254660">SUSE bug 1254660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53839</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53839" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53839" ref_url="https://www.suse.com/security/cve/CVE-2023-53839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dccp: fix data-race around dp-&gt;dccps_mss_cache

dccp_sendmsg() reads dp-&gt;dccps_mss_cache before locking the socket.
Same thing in do_dccp_getsockopt().

Add READ_ONCE()/WRITE_ONCE() annotations,
and change dccp_sendmsg() to check again dccps_mss_cache
after socket is locked.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53839/">CVE-2023-53839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53839">CVE-2023-53839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254655">SUSE bug 1254655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53845</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53845" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53845" ref_url="https://www.suse.com/security/cve/CVE-2023-53845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix infinite loop in nilfs_mdt_get_block()

If the disk image that nilfs2 mounts is corrupted and a virtual block
address obtained by block lookup for a metadata file is invalid,
nilfs_bmap_lookup_at_level() may return the same internal return code as
-ENOENT, meaning the block does not exist in the metadata file.

This duplication of return codes confuses nilfs_mdt_get_block(), causing
it to read and create a metadata block indefinitely.

In particular, if this happens to the inode metadata file, ifile,
semaphore i_rwsem can be left held, causing task hangs in lock_mount.

Fix this issue by making nilfs_bmap_lookup_at_level() treat virtual block
address translation failures with -ENOENT as metadata corruption instead
of returning the error code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53845/">CVE-2023-53845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53845">CVE-2023-53845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255007">SUSE bug 1255007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53847</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53847" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53847" ref_url="https://www.suse.com/security/cve/CVE-2023-53847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb-storage: alauda: Fix uninit-value in alauda_check_media()

Syzbot got KMSAN to complain about access to an uninitialized value in
the alauda subdriver of usb-storage:

BUG: KMSAN: uninit-value in alauda_transport+0x462/0x57f0
drivers/usb/storage/alauda.c:1137
CPU: 0 PID: 12279 Comm: usb-storage Not tainted 5.3.0-rc7+ #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
  __dump_stack lib/dump_stack.c:77 [inline]
  dump_stack+0x191/0x1f0 lib/dump_stack.c:113
  kmsan_report+0x13a/0x2b0 mm/kmsan/kmsan_report.c:108
  __msan_warning+0x73/0xe0 mm/kmsan/kmsan_instr.c:250
  alauda_check_media+0x344/0x3310 drivers/usb/storage/alauda.c:460

The problem is that alauda_check_media() doesn't verify that its USB
transfer succeeded before trying to use the received data.  What
should happen if the transfer fails isn't entirely clear, but a
reasonably conservative approach is to pretend that no media is
present.

A similar problem exists in a usb_stor_dbg() call in
alauda_get_media_status().  In this case, when an error occurs the
call is redundant, because usb_stor_ctrl_transfer() already will print
a debugging message.

Finally, unrelated to the uninitialized memory access, is the fact
that alauda_check_media() performs DMA to a buffer on the stack.
Fortunately usb-storage provides a general purpose DMA-able buffer for
uses like this.  We'll use it instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53847/">CVE-2023-53847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53847">CVE-2023-53847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254698">SUSE bug 1254698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53849</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53849" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53849" ref_url="https://www.suse.com/security/cve/CVE-2023-53849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: fix workqueue leak on bind errors

Make sure to destroy the workqueue also in case of early errors during
bind (e.g. a subcomponent failing to bind).

Since commit c3b790ea07a1 ("drm: Manage drm_mode_config_init with
drmm_") the mode config will be freed when the drm device is released
also when using the legacy interface, but add an explicit cleanup for
consistency and to facilitate backporting.

Patchwork: https://patchwork.freedesktop.org/patch/525093/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53849/">CVE-2023-53849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53849">CVE-2023-53849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254651">SUSE bug 1254651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53850</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53850" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53850" ref_url="https://www.suse.com/security/cve/CVE-2023-53850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: use internal state to free traffic IRQs

If the system tries to close the netdev while iavf_reset_task() is
running, __LINK_STATE_START will be cleared and netif_running() will
return false in iavf_reinit_interrupt_scheme(). This will result in
iavf_free_traffic_irqs() not being called and a leak as follows:

    [7632.489326] remove_proc_entry: removing non-empty directory 'irq/999', leaking at least 'iavf-enp24s0f0v0-TxRx-0'
    [7632.490214] WARNING: CPU: 0 PID: 10 at fs/proc/generic.c:718 remove_proc_entry+0x19b/0x1b0

is shown when pci_disable_msix() is later called. Fix by using the
internal adapter state. The traffic IRQs will always exist if
state == __IAVF_RUNNING.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53850/">CVE-2023-53850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53850">CVE-2023-53850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254677">SUSE bug 1254677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53853</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53853" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53853" ref_url="https://www.suse.com/security/cve/CVE-2023-53853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netlink: annotate accesses to nlk-&gt;cb_running

Both netlink_recvmsg() and netlink_native_seq_show() read
nlk-&gt;cb_running locklessly. Use READ_ONCE() there.

Add corresponding WRITE_ONCE() to netlink_dump() and
__netlink_dump_start()

syzbot reported:
BUG: KCSAN: data-race in __netlink_dump_start / netlink_recvmsg

write to 0xffff88813ea4db59 of 1 bytes by task 28219 on cpu 0:
__netlink_dump_start+0x3af/0x4d0 net/netlink/af_netlink.c:2399
netlink_dump_start include/linux/netlink.h:308 [inline]
rtnetlink_rcv_msg+0x70f/0x8c0 net/core/rtnetlink.c:6130
netlink_rcv_skb+0x126/0x220 net/netlink/af_netlink.c:2577
rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:6192
netlink_unicast_kernel net/netlink/af_netlink.c:1339 [inline]
netlink_unicast+0x56f/0x640 net/netlink/af_netlink.c:1365
netlink_sendmsg+0x665/0x770 net/netlink/af_netlink.c:1942
sock_sendmsg_nosec net/socket.c:724 [inline]
sock_sendmsg net/socket.c:747 [inline]
sock_write_iter+0x1aa/0x230 net/socket.c:1138
call_write_iter include/linux/fs.h:1851 [inline]
new_sync_write fs/read_write.c:491 [inline]
vfs_write+0x463/0x760 fs/read_write.c:584
ksys_write+0xeb/0x1a0 fs/read_write.c:637
__do_sys_write fs/read_write.c:649 [inline]
__se_sys_write fs/read_write.c:646 [inline]
__x64_sys_write+0x42/0x50 fs/read_write.c:646
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

read to 0xffff88813ea4db59 of 1 bytes by task 28222 on cpu 1:
netlink_recvmsg+0x3b4/0x730 net/netlink/af_netlink.c:2022
sock_recvmsg_nosec+0x4c/0x80 net/socket.c:1017
____sys_recvmsg+0x2db/0x310 net/socket.c:2718
___sys_recvmsg net/socket.c:2762 [inline]
do_recvmmsg+0x2e5/0x710 net/socket.c:2856
__sys_recvmmsg net/socket.c:2935 [inline]
__do_sys_recvmmsg net/socket.c:2958 [inline]
__se_sys_recvmmsg net/socket.c:2951 [inline]
__x64_sys_recvmmsg+0xe2/0x160 net/socket.c:2951
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

value changed: 0x00 -&gt; 0x01
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53853/">CVE-2023-53853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53853">CVE-2023-53853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254673">SUSE bug 1254673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53858</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53858" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53858" ref_url="https://www.suse.com/security/cve/CVE-2023-53858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() in case of error

If clk_get_rate() fails, the clk that has just been allocated needs to be
freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53858/">CVE-2023-53858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53858">CVE-2023-53858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254704">SUSE bug 1254704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53859</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53859" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53859" ref_url="https://www.suse.com/security/cve/CVE-2023-53859" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/idle: mark arch_cpu_idle() noinstr

linux-next commit ("cpuidle: tracing: Warn about !rcu_is_watching()")
adds a new warning which hits on s390's arch_cpu_idle() function:

RCU not on for: arch_cpu_idle+0x0/0x28
WARNING: CPU: 2 PID: 0 at include/linux/trace_recursion.h:162 arch_ftrace_ops_list_func+0x24c/0x258
Modules linked in:
CPU: 2 PID: 0 Comm: swapper/2 Not tainted 6.2.0-rc6-next-20230202 #4
Hardware name: IBM 8561 T01 703 (z/VM 7.3.0)
Krnl PSW : 0404d00180000000 00000000002b55c0 (arch_ftrace_ops_list_func+0x250/0x258)
           R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:1 PM:0 RI:0 EA:3
Krnl GPRS: c0000000ffffbfff 0000000080000002 0000000000000026 0000000000000000
           0000037ffffe3a28 0000037ffffe3a20 0000000000000000 0000000000000000
           0000000000000000 0000000000f4acf6 00000000001044f0 0000037ffffe3cb0
           0000000000000000 0000000000000000 00000000002b55bc 0000037ffffe3bb8
Krnl Code: 00000000002b55b0: c02000840051        larl    %r2,0000000001335652
           00000000002b55b6: c0e5fff512d1        brasl   %r14,0000000000157b58
          #00000000002b55bc: af000000            mc      0,0
          &gt;00000000002b55c0: a7f4ffe7            brc     15,00000000002b558e
           00000000002b55c4: 0707                bcr     0,%r7
           00000000002b55c6: 0707                bcr     0,%r7
           00000000002b55c8: eb6ff0480024        stmg    %r6,%r15,72(%r15)
           00000000002b55ce: b90400ef            lgr     %r14,%r15
Call Trace:
 [&lt;00000000002b55c0&gt;] arch_ftrace_ops_list_func+0x250/0x258
([&lt;00000000002b55bc&gt;] arch_ftrace_ops_list_func+0x24c/0x258)
 [&lt;0000000000f5f0fc&gt;] ftrace_common+0x1c/0x20
 [&lt;00000000001044f6&gt;] arch_cpu_idle+0x6/0x28
 [&lt;0000000000f4acf6&gt;] default_idle_call+0x76/0x128
 [&lt;00000000001cc374&gt;] do_idle+0xf4/0x1b0
 [&lt;00000000001cc6ce&gt;] cpu_startup_entry+0x36/0x40
 [&lt;0000000000119d00&gt;] smp_start_secondary+0x140/0x150
 [&lt;0000000000f5d2ae&gt;] restart_int_handler+0x6e/0x90

Mark arch_cpu_idle() noinstr like all other architectures with
CONFIG_ARCH_WANTS_NO_INSTR (should) have it to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53859/">CVE-2023-53859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53859">CVE-2023-53859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255168">SUSE bug 1255168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53862</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53862" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53862" ref_url="https://www.suse.com/security/cve/CVE-2023-53862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hfs: fix missing hfs_bnode_get() in __hfs_bnode_create

Syzbot found a kernel BUG in hfs_bnode_put():

 kernel BUG at fs/hfs/bnode.c:466!
 invalid opcode: 0000 [#1] PREEMPT SMP KASAN
 CPU: 0 PID: 3634 Comm: kworker/u4:5 Not tainted 6.1.0-rc7-syzkaller-00190-g97ee9d1c1696 #0
 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
 Workqueue: writeback wb_workfn (flush-7:0)
 RIP: 0010:hfs_bnode_put+0x46f/0x480 fs/hfs/bnode.c:466
 Code: 8a 80 ff e9 73 fe ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a0 fe ff ff 48 89 df e8 db 8a 80 ff e9 93 fe ff ff e8 a1 68 2c ff &lt;0f&gt; 0b e8 9a 68 2c ff 0f 0b 0f 1f 84 00 00 00 00 00 55 41 57 41 56
 RSP: 0018:ffffc90003b4f258 EFLAGS: 00010293
 RAX: ffffffff825e318f RBX: 0000000000000000 RCX: ffff8880739dd7c0
 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
 RBP: ffffc90003b4f430 R08: ffffffff825e2d9b R09: ffffed10045157d1
 R10: ffffed10045157d1 R11: 1ffff110045157d0 R12: ffff8880228abe80
 R13: ffff88807016c000 R14: dffffc0000000000 R15: ffff8880228abe00
 FS:  0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007fa6ebe88718 CR3: 000000001e93d000 CR4: 00000000003506f0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;TASK&gt;
  hfs_write_inode+0x1bc/0xb40
  write_inode fs/fs-writeback.c:1440 [inline]
  __writeback_single_inode+0x4d6/0x670 fs/fs-writeback.c:1652
  writeback_sb_inodes+0xb3b/0x18f0 fs/fs-writeback.c:1878
  __writeback_inodes_wb+0x125/0x420 fs/fs-writeback.c:1949
  wb_writeback+0x440/0x7b0 fs/fs-writeback.c:2054
  wb_check_start_all fs/fs-writeback.c:2176 [inline]
  wb_do_writeback fs/fs-writeback.c:2202 [inline]
  wb_workfn+0x827/0xef0 fs/fs-writeback.c:2235
  process_one_work+0x877/0xdb0 kernel/workqueue.c:2289
  worker_thread+0xb14/0x1330 kernel/workqueue.c:2436
  kthread+0x266/0x300 kernel/kthread.c:376
  ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306
  &lt;/TASK&gt;

The BUG_ON() is triggered at here:

/* Dispose of resources used by a node */
void hfs_bnode_put(struct hfs_bnode *node)
{
	if (node) {
 		&lt;skipped&gt;
 		BUG_ON(!atomic_read(&amp;node-&gt;refcnt)); &lt;- we have issue here!!!!
 		&lt;skipped&gt;
 	}
}

By tracing the refcnt, I found the node is created by hfs_bmap_alloc()
with refcnt 1.  Then the node is used by hfs_btree_write().  There is a
missing of hfs_bnode_get() after find the node.  The issue happened in
following path:

&lt;alloc&gt;
 hfs_bmap_alloc
   hfs_bnode_find
     __hfs_bnode_create   &lt;- allocate a new node with refcnt 1.
   hfs_bnode_put          &lt;- decrease the refcnt

&lt;write&gt;
 hfs_btree_write
   hfs_bnode_find
     __hfs_bnode_create
       hfs_bnode_findhash &lt;- find the node without refcnt increased.
   hfs_bnode_put	  &lt;- trigger the BUG_ON() since refcnt is 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53862/">CVE-2023-53862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53862">CVE-2023-53862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254994">SUSE bug 1254994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53863</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53863" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53863" ref_url="https://www.suse.com/security/cve/CVE-2023-53863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netlink: do not hard code device address lenth in fdb dumps

syzbot reports that some netdev devices do not have a six bytes
address [1]

Replace ETH_ALEN by dev-&gt;addr_len.

[1] (Case of a device where dev-&gt;addr_len = 4)

BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]
BUG: KMSAN: kernel-infoleak in copyout+0xb8/0x100 lib/iov_iter.c:169
instrument_copy_to_user include/linux/instrumented.h:114 [inline]
copyout+0xb8/0x100 lib/iov_iter.c:169
_copy_to_iter+0x6d8/0x1d00 lib/iov_iter.c:536
copy_to_iter include/linux/uio.h:206 [inline]
simple_copy_to_iter+0x68/0xa0 net/core/datagram.c:513
__skb_datagram_iter+0x123/0xdc0 net/core/datagram.c:419
skb_copy_datagram_iter+0x5c/0x200 net/core/datagram.c:527
skb_copy_datagram_msg include/linux/skbuff.h:3960 [inline]
netlink_recvmsg+0x4ae/0x15a0 net/netlink/af_netlink.c:1970
sock_recvmsg_nosec net/socket.c:1019 [inline]
sock_recvmsg net/socket.c:1040 [inline]
____sys_recvmsg+0x283/0x7f0 net/socket.c:2722
___sys_recvmsg+0x223/0x840 net/socket.c:2764
do_recvmmsg+0x4f9/0xfd0 net/socket.c:2858
__sys_recvmmsg net/socket.c:2937 [inline]
__do_sys_recvmmsg net/socket.c:2960 [inline]
__se_sys_recvmmsg net/socket.c:2953 [inline]
__x64_sys_recvmmsg+0x397/0x490 net/socket.c:2953
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

Uninit was stored to memory at:
__nla_put lib/nlattr.c:1009 [inline]
nla_put+0x1c6/0x230 lib/nlattr.c:1067
nlmsg_populate_fdb_fill+0x2b8/0x600 net/core/rtnetlink.c:4071
nlmsg_populate_fdb net/core/rtnetlink.c:4418 [inline]
ndo_dflt_fdb_dump+0x616/0x840 net/core/rtnetlink.c:4456
rtnl_fdb_dump+0x14ff/0x1fc0 net/core/rtnetlink.c:4629
netlink_dump+0x9d1/0x1310 net/netlink/af_netlink.c:2268
netlink_recvmsg+0xc5c/0x15a0 net/netlink/af_netlink.c:1995
sock_recvmsg_nosec+0x7a/0x120 net/socket.c:1019
____sys_recvmsg+0x664/0x7f0 net/socket.c:2720
___sys_recvmsg+0x223/0x840 net/socket.c:2764
do_recvmmsg+0x4f9/0xfd0 net/socket.c:2858
__sys_recvmmsg net/socket.c:2937 [inline]
__do_sys_recvmmsg net/socket.c:2960 [inline]
__se_sys_recvmmsg net/socket.c:2953 [inline]
__x64_sys_recvmmsg+0x397/0x490 net/socket.c:2953
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

Uninit was created at:
slab_post_alloc_hook+0x12d/0xb60 mm/slab.h:716
slab_alloc_node mm/slub.c:3451 [inline]
__kmem_cache_alloc_node+0x4ff/0x8b0 mm/slub.c:3490
kmalloc_trace+0x51/0x200 mm/slab_common.c:1057
kmalloc include/linux/slab.h:559 [inline]
__hw_addr_create net/core/dev_addr_lists.c:60 [inline]
__hw_addr_add_ex+0x2e5/0x9e0 net/core/dev_addr_lists.c:118
__dev_mc_add net/core/dev_addr_lists.c:867 [inline]
dev_mc_add+0x9a/0x130 net/core/dev_addr_lists.c:885
igmp6_group_added+0x267/0xbc0 net/ipv6/mcast.c:680
ipv6_mc_up+0x296/0x3b0 net/ipv6/mcast.c:2754
ipv6_mc_remap+0x1e/0x30 net/ipv6/mcast.c:2708
addrconf_type_change net/ipv6/addrconf.c:3731 [inline]
addrconf_notify+0x4d3/0x1d90 net/ipv6/addrconf.c:3699
notifier_call_chain kernel/notifier.c:93 [inline]
raw_notifier_call_chain+0xe4/0x430 kernel/notifier.c:461
call_netdevice_notifiers_info net/core/dev.c:1935 [inline]
call_netdevice_notifiers_extack net/core/dev.c:1973 [inline]
call_netdevice_notifiers+0x1ee/0x2d0 net/core/dev.c:1987
bond_enslave+0xccd/0x53f0 drivers/net/bonding/bond_main.c:1906
do_set_master net/core/rtnetlink.c:2626 [inline]
rtnl_newlink_create net/core/rtnetlink.c:3460 [inline]
__rtnl_newlink net/core/rtnetlink.c:3660 [inline]
rtnl_newlink+0x378c/0x40e0 net/core/rtnetlink.c:3673
rtnetlink_rcv_msg+0x16a6/0x1840 net/core/rtnetlink.c:6395
netlink_rcv_skb+0x371/0x650 net/netlink/af_netlink.c:2546
rtnetlink_rcv+0x34/0x40 net/core/rtnetlink.c:6413
netlink_unicast_kernel net/netlink/af_netlink.c:1339 [inline]
netlink_unicast+0xf28/0x1230 net/netlink/af_
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53863/">CVE-2023-53863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53863">CVE-2023-53863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254657">SUSE bug 1254657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53867</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53867" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53867" ref_url="https://www.suse.com/security/cve/CVE-2023-53867" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix potential use-after-free bug when trimming caps

When trimming the caps and just after the 'session-&gt;s_cap_lock' is
released in ceph_iterate_session_caps() the cap maybe removed by
another thread, and when using the stale cap memory in the callbacks
it will trigger use-after-free crash.

We need to check the existence of the cap just after the 'ci-&gt;i_ceph_lock'
being acquired. And do nothing if it's already removed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53867/">CVE-2023-53867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53867">CVE-2023-53867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256055">SUSE bug 1256055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53986</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53986" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53986" ref_url="https://www.suse.com/security/cve/CVE-2023-53986" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mips: bmips: BCM6358: disable RAC flush for TP1

RAC flush causes kernel panics on BCM6358 with EHCI/OHCI when booting from TP1:
[    3.881739] usb 1-1: new high-speed USB device number 2 using ehci-platform
[    3.895011] Reserved instruction in kernel code[#1]:
[    3.900113] CPU: 0 PID: 1 Comm: init Not tainted 5.10.16 #0
[    3.905829] $ 0   : 00000000 10008700 00000000 77d94060
[    3.911238] $ 4   : 7fd1f088 00000000 81431cac 81431ca0
[    3.916641] $ 8   : 00000000 ffffefff 8075cd34 00000000
[    3.922043] $12   : 806f8d40 f3e812b7 00000000 000d9aaa
[    3.927446] $16   : 7fd1f068 7fd1f080 7ff559b8 81428470
[    3.932848] $20   : 00000000 00000000 55590000 77d70000
[    3.938251] $24   : 00000018 00000010
[    3.943655] $28   : 81430000 81431e60 81431f28 800157fc
[    3.949058] Hi    : 00000000
[    3.952013] Lo    : 00000000
[    3.955019] epc   : 80015808 setup_sigcontext+0x54/0x24c
[    3.960464] ra    : 800157fc setup_sigcontext+0x48/0x24c
[    3.965913] Status: 10008703	KERNEL EXL IE
[    3.970216] Cause : 00800028 (ExcCode 0a)
[    3.974340] PrId  : 0002a010 (Broadcom BMIPS4350)
[    3.979170] Modules linked in: ohci_platform ohci_hcd fsl_mph_dr_of ehci_platform ehci_fsl ehci_hcd gpio_button_hotplug usbcore nls_base usb_common
[    3.992907] Process init (pid: 1, threadinfo=(ptrval), task=(ptrval), tls=77e22ec8)
[    4.000776] Stack : 81431ef4 7fd1f080 81431f28 81428470 7fd1f068 81431edc 7ff559b8 81428470
[    4.009467]         81431f28 7fd1f080 55590000 77d70000 77d5498c 80015c70 806f0000 8063ae74
[    4.018149]         08100002 81431f28 0000000a 08100002 81431f28 0000000a 77d6b418 00000003
[    4.026831]         ffffffff 80016414 80080734 81431ecc 81431ecc 00000001 00000000 04000000
[    4.035512]         77d54874 00000000 00000000 00000000 00000000 00000012 00000002 00000000
[    4.044196]         ...
[    4.046706] Call Trace:
[    4.049238] [&lt;80015808&gt;] setup_sigcontext+0x54/0x24c
[    4.054356] [&lt;80015c70&gt;] setup_frame+0xdc/0x124
[    4.059015] [&lt;80016414&gt;] do_notify_resume+0x1dc/0x288
[    4.064207] [&lt;80011b50&gt;] work_notifysig+0x10/0x18
[    4.069036]
[    4.070538] Code: 8fc300b4  00001025  26240008 &lt;ac820000&gt; ac830004  3c048063  0c0228aa  24846a00  26240010
[    4.080686]
[    4.082517] ---[ end trace 22a8edb41f5f983b ]---
[    4.087374] Kernel panic - not syncing: Fatal exception
[    4.092753] Rebooting in 1 seconds..

Because the bootloader (CFE) is not initializing the Read-ahead cache properly
on the second thread (TP1). Since the RAC was not initialized properly, we
should avoid flushing it at the risk of corrupting the instruction stream as
seen in the trace above.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-26"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53986/">CVE-2023-53986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53986">CVE-2023-53986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255551">SUSE bug 1255551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53987</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53987" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53987" ref_url="https://www.suse.com/security/cve/CVE-2023-53987" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ping: Fix potentail NULL deref for /proc/net/icmp.

After commit dbca1596bbb0 ("ping: convert to RCU lookups, get rid
of rwlock"), we use RCU for ping sockets, but we should use spinlock
for /proc/net/icmp to avoid a potential NULL deref mentioned in
the previous patch.

Let's go back to using spinlock there.

Note we can convert ping sockets to use hlist instead of hlist_nulls
because we do not use SLAB_TYPESAFE_BY_RCU for ping sockets.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53987/">CVE-2023-53987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53987">CVE-2023-53987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255633">SUSE bug 1255633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53988</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53988" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53988" ref_url="https://www.suse.com/security/cve/CVE-2023-53988" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fix slab-out-of-bounds read in hdr_delete_de()

Here is a BUG report from syzbot:

BUG: KASAN: slab-out-of-bounds in hdr_delete_de+0xe0/0x150 fs/ntfs3/index.c:806
Read of size 16842960 at addr ffff888079cc0600 by task syz-executor934/3631

Call Trace:
 memmove+0x25/0x60 mm/kasan/shadow.c:54
 hdr_delete_de+0xe0/0x150 fs/ntfs3/index.c:806
 indx_delete_entry+0x74f/0x3670 fs/ntfs3/index.c:2193
 ni_remove_name+0x27a/0x980 fs/ntfs3/frecord.c:2910
 ntfs_unlink_inode+0x3d4/0x720 fs/ntfs3/inode.c:1712
 ntfs_rename+0x41a/0xcb0 fs/ntfs3/namei.c:276

Before using the meta-data in struct INDEX_HDR, we need to
check index header valid or not. Otherwise, the corruptedi
(or malicious) fs image can cause out-of-bounds access which
could make kernel panic.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53988/">CVE-2023-53988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53988">CVE-2023-53988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255613">SUSE bug 1255613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53989</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53989" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53989" ref_url="https://www.suse.com/security/cve/CVE-2023-53989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: mm: fix VA-range sanity check

Both create_mapping_noalloc() and update_mapping_prot() sanity-check
their 'virt' parameter, but the check itself doesn't make much sense.
The condition used today appears to be a historical accident.

The sanity-check condition:

	if ((virt &gt;= PAGE_END) &amp;&amp; (virt &lt; VMALLOC_START)) {
		[ ... warning here ... ]
		return;
	}

... can only be true for the KASAN shadow region or the module region,
and there's no reason to exclude these specifically for creating and
updateing mappings.

When arm64 support was first upstreamed in commit:

  c1cc1552616d0f35 ("arm64: MMU initialisation")

... the condition was:

	if (virt &lt; VMALLOC_START) {
		[ ... warning here ... ]
		return;
	}

At the time, VMALLOC_START was the lowest kernel address, and this was
checking whether 'virt' would be translated via TTBR1.

Subsequently in commit:

  14c127c957c1c607 ("arm64: mm: Flip kernel VA space")

... the condition was changed to:

	if ((virt &gt;= VA_START) &amp;&amp; (virt &lt; VMALLOC_START)) {
		[ ... warning here ... ]
		return;
	}

This appear to have been a thinko. The commit moved the linear map to
the bottom of the kernel address space, with VMALLOC_START being at the
halfway point. The old condition would warn for changes to the linear
map below this, and at the time VA_START was the end of the linear map.

Subsequently we cleaned up the naming of VA_START in commit:

  77ad4ce69321abbe ("arm64: memory: rename VA_START to PAGE_END")

... keeping the erroneous condition as:

	if ((virt &gt;= PAGE_END) &amp;&amp; (virt &lt; VMALLOC_START)) {
		[ ... warning here ... ]
		return;
	}

Correct the condition to check against the start of the TTBR1 address
space, which is currently PAGE_OFFSET. This simplifies the logic, and
more clearly matches the "outside kernel range" message in the warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53989/">CVE-2023-53989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53989">CVE-2023-53989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256302">SUSE bug 1256302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53990</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53990" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53990" ref_url="https://www.suse.com/security/cve/CVE-2023-53990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SMB3: Add missing locks to protect deferred close file list

cifs_del_deferred_close function has a critical section which modifies
the deferred close file list. We must acquire deferred_lock before
calling cifs_del_deferred_close function.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-27"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53990/">CVE-2023-53990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53990">CVE-2023-53990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255560">SUSE bug 1255560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53991</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53991" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53991" ref_url="https://www.suse.com/security/cve/CVE-2023-53991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: Disallow unallocated resources to be returned

In the event that the topology requests resources that have not been
created by the system (because they are typically not represented in
dpu_mdss_cfg ^1), the resource(s) in global_state (in this case DSC
blocks, until their allocation/assignment is being sanity-checked in
"drm/msm/dpu: Reject topologies for which no DSC blocks are available")
remain NULL but will still be returned out of
dpu_rm_get_assigned_resources, where the caller expects to get an array
containing num_blks valid pointers (but instead gets these NULLs).

To prevent this from happening, where null-pointer dereferences
typically result in a hard-to-debug platform lockup, num_blks shouldn't
increase past NULL blocks and will print an error and break instead.
After all, max_blks represents the static size of the maximum number of
blocks whereas the actual amount varies per platform.

^1: which can happen after a git rebase ended up moving additions to
_dpu_cfg to a different struct which has the same patch context.

Patchwork: https://patchwork.freedesktop.org/patch/517636/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53991/">CVE-2023-53991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53991">CVE-2023-53991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255627">SUSE bug 1255627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53993</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53993" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53993" ref_url="https://www.suse.com/security/cve/CVE-2023-53993" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI/DOE: Fix memory leak with CONFIG_DEBUG_OBJECTS=y

After a pci_doe_task completes, its work_struct needs to be destroyed
to avoid a memory leak with CONFIG_DEBUG_OBJECTS=y.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-27"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53993/">CVE-2023-53993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53993">CVE-2023-53993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255606">SUSE bug 1255606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53994</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53994" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53994" ref_url="https://www.suse.com/security/cve/CVE-2023-53994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ionic: remove WARN_ON to prevent panic_on_warn

Remove unnecessary early code development check and the WARN_ON
that it uses.  The irq alloc and free paths have long been
cleaned up and this check shouldn't have stuck around so long.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53994/">CVE-2023-53994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53994">CVE-2023-53994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255570">SUSE bug 1255570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53995</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53995" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53995" ref_url="https://www.suse.com/security/cve/CVE-2023-53995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ipv4: fix one memleak in __inet_del_ifa()

I got the below warning when do fuzzing test:
unregister_netdevice: waiting for bond0 to become free. Usage count = 2

It can be repoduced via:

ip link add bond0 type bond
sysctl -w net.ipv4.conf.bond0.promote_secondaries=1
ip addr add 4.117.174.103/0 scope 0x40 dev bond0
ip addr add 192.168.100.111/255.255.255.254 scope 0 dev bond0
ip addr add 0.0.0.4/0 scope 0x40 secondary dev bond0
ip addr del 4.117.174.103/0 scope 0x40 dev bond0
ip link delete bond0 type bond

In this reproduction test case, an incorrect 'last_prim' is found in
__inet_del_ifa(), as a result, the secondary address(0.0.0.4/0 scope 0x40)
is lost. The memory of the secondary address is leaked and the reference of
in_device and net_device is leaked.

Fix this problem:
Look for 'last_prim' starting at location of the deleted IP and inserting
the promoted IP into the location of 'last_prim'.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53995/">CVE-2023-53995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53995">CVE-2023-53995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255616">SUSE bug 1255616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53996</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53996" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53996" ref_url="https://www.suse.com/security/cve/CVE-2023-53996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/sev: Make enc_dec_hypercall() accept a size instead of npages

enc_dec_hypercall() accepted a page count instead of a size, which
forced its callers to round up. As a result, non-page aligned
vaddrs caused pages to be spuriously marked as decrypted via the
encryption status hypercall, which in turn caused consistent
corruption of pages during live migration. Live migration requires
accurate encryption status information to avoid migrating pages
from the wrong perspective.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-26"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53996/">CVE-2023-53996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53996">CVE-2023-53996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255618">SUSE bug 1255618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53997</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53997" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53997" ref_url="https://www.suse.com/security/cve/CVE-2023-53997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: of: fix double-free on unregistration

Since commit 3d439b1a2ad3 ("thermal/core: Alloc-copy-free the thermal
zone parameters structure"), thermal_zone_device_register() allocates
a copy of the tzp argument and frees it when unregistering, so
thermal_of_zone_register() now ends up leaking its original tzp and
double-freeing the tzp copy. Fix this by locating tzp on stack instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53997/">CVE-2023-53997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53997">CVE-2023-53997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255632">SUSE bug 1255632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53998</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53998" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53998" ref_url="https://www.suse.com/security/cve/CVE-2023-53998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwrng: virtio - Fix race on data_avail and actual data

The virtio rng device kicks off a new entropy request whenever the
data available reaches zero.  When a new request occurs at the end
of a read operation, that is, when the result of that request is
only needed by the next reader, then there is a race between the
writing of the new data and the next reader.

This is because there is no synchronisation whatsoever between the
writer and the reader.

Fix this by writing data_avail with smp_store_release and reading
it with smp_load_acquire when we first enter read.  The subsequent
reads are safe because they're either protected by the first load
acquire, or by the completion mechanism.

Also remove the redundant zeroing of data_idx in random_recv_done
(data_idx must already be zero at this point) and data_avail in
request_entropy (ditto).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53998/">CVE-2023-53998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53998">CVE-2023-53998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255578">SUSE bug 1255578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53999</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53999" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53999" ref_url="https://www.suse.com/security/cve/CVE-2023-53999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: TC, Fix internal port memory leak

The flow rule can be splited, and the extra post_act rules are added
to post_act table. It's possible to trigger memleak when the rule
forwards packets from internal port and over tunnel, in the case that,
for example, CT 'new' state offload is allowed. As int_port object is
assigned to the flow attribute of post_act rule, and its refcnt is
incremented by mlx5e_tc_int_port_get(), but mlx5e_tc_int_port_put() is
not called, the refcnt is never decremented, then int_port is never
freed.

The kmemleak reports the following error:
unreferenced object 0xffff888128204b80 (size 64):
  comm "handler20", pid 50121, jiffies 4296973009 (age 642.932s)
  hex dump (first 32 bytes):
    01 00 00 00 19 00 00 00 03 f0 00 00 04 00 00 00  ................
    98 77 67 41 81 88 ff ff 98 77 67 41 81 88 ff ff  .wgA.....wgA....
  backtrace:
    [&lt;00000000e992680d&gt;] kmalloc_trace+0x27/0x120
    [&lt;000000009e945a98&gt;] mlx5e_tc_int_port_get+0x3f3/0xe20 [mlx5_core]
    [&lt;0000000035a537f0&gt;] mlx5e_tc_add_fdb_flow+0x473/0xcf0 [mlx5_core]
    [&lt;0000000070c2cec6&gt;] __mlx5e_add_fdb_flow+0x7cf/0xe90 [mlx5_core]
    [&lt;000000005cc84048&gt;] mlx5e_configure_flower+0xd40/0x4c40 [mlx5_core]
    [&lt;000000004f8a2031&gt;] mlx5e_rep_indr_offload.isra.0+0x10e/0x1c0 [mlx5_core]
    [&lt;000000007df797dc&gt;] mlx5e_rep_indr_setup_tc_cb+0x90/0x130 [mlx5_core]
    [&lt;0000000016c15cc3&gt;] tc_setup_cb_add+0x1cf/0x410
    [&lt;00000000a63305b4&gt;] fl_hw_replace_filter+0x38f/0x670 [cls_flower]
    [&lt;000000008bc9e77c&gt;] fl_change+0x1fd5/0x4430 [cls_flower]
    [&lt;00000000e7f766e4&gt;] tc_new_tfilter+0x867/0x2010
    [&lt;00000000e101c0ef&gt;] rtnetlink_rcv_msg+0x6fc/0x9f0
    [&lt;00000000e1111d44&gt;] netlink_rcv_skb+0x12c/0x360
    [&lt;0000000082dd6c8b&gt;] netlink_unicast+0x438/0x710
    [&lt;00000000fc568f70&gt;] netlink_sendmsg+0x794/0xc50
    [&lt;0000000016e92590&gt;] sock_sendmsg+0xc5/0x190

So fix this by moving int_port cleanup code to the flow attribute
free helper, which is used by all the attribute free cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53999/">CVE-2023-53999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53999">CVE-2023-53999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255621">SUSE bug 1255621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54000</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54000" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54000" ref_url="https://www.suse.com/security/cve/CVE-2023-54000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix deadlock issue when externel_lb and reset are executed together

When externel_lb and reset are executed together, a deadlock may
occur:
[ 3147.217009] INFO: task kworker/u321:0:7 blocked for more than 120 seconds.
[ 3147.230483] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 3147.238999] task:kworker/u321:0  state:D stack:    0 pid:    7 ppid:     2 flags:0x00000008
[ 3147.248045] Workqueue: hclge hclge_service_task [hclge]
[ 3147.253957] Call trace:
[ 3147.257093]  __switch_to+0x7c/0xbc
[ 3147.261183]  __schedule+0x338/0x6f0
[ 3147.265357]  schedule+0x50/0xe0
[ 3147.269185]  schedule_preempt_disabled+0x18/0x24
[ 3147.274488]  __mutex_lock.constprop.0+0x1d4/0x5dc
[ 3147.279880]  __mutex_lock_slowpath+0x1c/0x30
[ 3147.284839]  mutex_lock+0x50/0x60
[ 3147.288841]  rtnl_lock+0x20/0x2c
[ 3147.292759]  hclge_reset_prepare+0x68/0x90 [hclge]
[ 3147.298239]  hclge_reset_subtask+0x88/0xe0 [hclge]
[ 3147.303718]  hclge_reset_service_task+0x84/0x120 [hclge]
[ 3147.309718]  hclge_service_task+0x2c/0x70 [hclge]
[ 3147.315109]  process_one_work+0x1d0/0x490
[ 3147.319805]  worker_thread+0x158/0x3d0
[ 3147.324240]  kthread+0x108/0x13c
[ 3147.328154]  ret_from_fork+0x10/0x18

In externel_lb process, the hns3 driver call napi_disable()
first, then the reset happen, then the restore process of the
externel_lb will fail, and will not call napi_enable(). When
doing externel_lb again, napi_disable() will be double call,
cause a deadlock of rtnl_lock().

This patch use the HNS3_NIC_STATE_DOWN state to protect the
calling of napi_disable() and napi_enable() in externel_lb
process, just as the usage in ndo_stop() and ndo_start().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-26"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54000/">CVE-2023-54000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54000">CVE-2023-54000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255564">SUSE bug 1255564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54001</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54001" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54001" ref_url="https://www.suse.com/security/cve/CVE-2023-54001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: r8712: Fix memory leak in _r8712_init_xmit_priv()

In the above mentioned routine, memory is allocated in several places.
If the first succeeds and a later one fails, the routine will leak memory.
This patch fixes commit 2865d42c78a9 ("staging: r8712u: Add the new driver
to the mainline kernel"). A potential memory leak in
r8712_xmit_resource_alloc() is also addressed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54001/">CVE-2023-54001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54001">CVE-2023-54001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255628">SUSE bug 1255628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54002</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54002" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54002" ref_url="https://www.suse.com/security/cve/CVE-2023-54002" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix assertion of exclop condition when starting balance

Balance as exclusive state is compatible with paused balance and device
add, which makes some things more complicated. The assertion of valid
states when starting from paused balance needs to take into account two
more states, the combinations can be hit when there are several threads
racing to start balance and device add. This won't typically happen when
the commands are started from command line.

Scenario 1: With exclusive_operation state == BTRFS_EXCLOP_NONE.

Concurrently adding multiple devices to the same mount point and
btrfs_exclop_finish executed finishes before assertion in
btrfs_exclop_balance, exclusive_operation will changed to
BTRFS_EXCLOP_NONE state which lead to assertion failed:

  fs_info-&gt;exclusive_operation == BTRFS_EXCLOP_BALANCE ||
  fs_info-&gt;exclusive_operation == BTRFS_EXCLOP_DEV_ADD,
  in fs/btrfs/ioctl.c:456
  Call Trace:
   &lt;TASK&gt;
   btrfs_exclop_balance+0x13c/0x310
   ? memdup_user+0xab/0xc0
   ? PTR_ERR+0x17/0x20
   btrfs_ioctl_add_dev+0x2ee/0x320
   btrfs_ioctl+0x9d5/0x10d0
   ? btrfs_ioctl_encoded_write+0xb80/0xb80
   __x64_sys_ioctl+0x197/0x210
   do_syscall_64+0x3c/0xb0
   entry_SYSCALL_64_after_hwframe+0x63/0xcd

Scenario 2: With exclusive_operation state == BTRFS_EXCLOP_BALANCE_PAUSED.

Concurrently adding multiple devices to the same mount point and
btrfs_exclop_balance executed finish before the latter thread execute
assertion in btrfs_exclop_balance, exclusive_operation will changed to
BTRFS_EXCLOP_BALANCE_PAUSED state which lead to assertion failed:

  fs_info-&gt;exclusive_operation == BTRFS_EXCLOP_BALANCE ||
  fs_info-&gt;exclusive_operation == BTRFS_EXCLOP_DEV_ADD ||
  fs_info-&gt;exclusive_operation == BTRFS_EXCLOP_NONE,
  fs/btrfs/ioctl.c:458
  Call Trace:
   &lt;TASK&gt;
   btrfs_exclop_balance+0x240/0x410
   ? memdup_user+0xab/0xc0
   ? PTR_ERR+0x17/0x20
   btrfs_ioctl_add_dev+0x2ee/0x320
   btrfs_ioctl+0x9d5/0x10d0
   ? btrfs_ioctl_encoded_write+0xb80/0xb80
   __x64_sys_ioctl+0x197/0x210
   do_syscall_64+0x3c/0xb0
   entry_SYSCALL_64_after_hwframe+0x63/0xcd

An example of the failed assertion is below, which shows that the
paused balance is also needed to be checked.

  root@syzkaller:/home/xsk# ./repro
  Failed to add device /dev/vda, errno 14
  Failed to add device /dev/vda, errno 14
  Failed to add device /dev/vda, errno 14
  Failed to add device /dev/vda, errno 14
  Failed to add device /dev/vda, errno 14
  Failed to add device /dev/vda, errno 14
  Failed to add device /dev/vda, errno 14
  Failed to add device /dev/vda, errno 14
  Failed to add device /dev/vda, errno 14
  [  416.611428][ T7970] BTRFS info (device loop0): fs_info exclusive_operation: 0
  Failed to add device /dev/vda, errno 14
  [  416.613973][ T7971] BTRFS info (device loop0): fs_info exclusive_operation: 3
  Failed to add device /dev/vda, errno 14
  [  416.615456][ T7972] BTRFS info (device loop0): fs_info exclusive_operation: 3
  Failed to add device /dev/vda, errno 14
  [  416.617528][ T7973] BTRFS info (device loop0): fs_info exclusive_operation: 3
  Failed to add device /dev/vda, errno 14
  [  416.618359][ T7974] BTRFS info (device loop0): fs_info exclusive_operation: 3
  Failed to add device /dev/vda, errno 14
  [  416.622589][ T7975] BTRFS info (device loop0): fs_info exclusive_operation: 3
  Failed to add device /dev/vda, errno 14
  [  416.624034][ T7976] BTRFS info (device loop0): fs_info exclusive_operation: 3
  Failed to add device /dev/vda, errno 14
  [  416.626420][ T7977] BTRFS info (device loop0): fs_info exclusive_operation: 3
  Failed to add device /dev/vda, errno 14
  [  416.627643][ T7978] BTRFS info (device loop0): fs_info exclusive_operation: 3
  Failed to add device /dev/vda, errno 14
  [  416.629006][ T7979] BTRFS info (device loop0): fs_info exclusive_operation: 3
  [  416.630298][ T7980] BTRFS info (device loop0): fs_info exclusive_operation: 3
  Fai
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54002/">CVE-2023-54002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54002">CVE-2023-54002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256283">SUSE bug 1256283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54003</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54003" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54003" ref_url="https://www.suse.com/security/cve/CVE-2023-54003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Fix GID entry ref leak when create_ah fails

If AH create request fails, release sgid_attr to avoid GID entry
referrence leak reported while releasing GID table
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54003/">CVE-2023-54003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54003">CVE-2023-54003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255619">SUSE bug 1255619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54005</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54005" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54005" ref_url="https://www.suse.com/security/cve/CVE-2023-54005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binder: fix memory leak in binder_init()

In binder_init(), the destruction of binder_alloc_shrinker_init() is not
performed in the wrong path, which will cause memory leaks. So this commit
introduces binder_alloc_shrinker_exit() and calls it in the wrong path to
fix that.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54005/">CVE-2023-54005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54005">CVE-2023-54005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255629">SUSE bug 1255629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54006</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54006" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54006" ref_url="https://www.suse.com/security/cve/CVE-2023-54006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Fix data-race around unix_tot_inflight.

unix_tot_inflight is changed under spin_lock(unix_gc_lock), but
unix_release_sock() reads it locklessly.

Let's use READ_ONCE() for unix_tot_inflight.

Note that the writer side was marked by commit 9d6d7f1cb67c ("af_unix:
annote lockless accesses to unix_tot_inflight &amp; gc_in_progress")

BUG: KCSAN: data-race in unix_inflight / unix_release_sock

write (marked) to 0xffffffff871852b8 of 4 bytes by task 123 on cpu 1:
 unix_inflight+0x130/0x180 net/unix/scm.c:64
 unix_attach_fds+0x137/0x1b0 net/unix/scm.c:123
 unix_scm_to_skb net/unix/af_unix.c:1832 [inline]
 unix_dgram_sendmsg+0x46a/0x14f0 net/unix/af_unix.c:1955
 sock_sendmsg_nosec net/socket.c:724 [inline]
 sock_sendmsg+0x148/0x160 net/socket.c:747
 ____sys_sendmsg+0x4e4/0x610 net/socket.c:2493
 ___sys_sendmsg+0xc6/0x140 net/socket.c:2547
 __sys_sendmsg+0x94/0x140 net/socket.c:2576
 __do_sys_sendmsg net/socket.c:2585 [inline]
 __se_sys_sendmsg net/socket.c:2583 [inline]
 __x64_sys_sendmsg+0x45/0x50 net/socket.c:2583
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x72/0xdc

read to 0xffffffff871852b8 of 4 bytes by task 4891 on cpu 0:
 unix_release_sock+0x608/0x910 net/unix/af_unix.c:671
 unix_release+0x59/0x80 net/unix/af_unix.c:1058
 __sock_release+0x7d/0x170 net/socket.c:653
 sock_close+0x19/0x30 net/socket.c:1385
 __fput+0x179/0x5e0 fs/file_table.c:321
 ____fput+0x15/0x20 fs/file_table.c:349
 task_work_run+0x116/0x1a0 kernel/task_work.c:179
 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
 exit_to_user_mode_loop kernel/entry/common.c:171 [inline]
 exit_to_user_mode_prepare+0x174/0x180 kernel/entry/common.c:204
 __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline]
 syscall_exit_to_user_mode+0x1a/0x30 kernel/entry/common.c:297
 do_syscall_64+0x4b/0x90 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x72/0xdc

value changed: 0x00000000 -&gt; 0x00000001

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 PID: 4891 Comm: systemd-coredum Not tainted 6.4.0-rc5-01219-gfa0e21fa4443 #5
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-26"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54006/">CVE-2023-54006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54006">CVE-2023-54006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255591">SUSE bug 1255591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54007</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54007" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54007" ref_url="https://www.suse.com/security/cve/CVE-2023-54007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vmci_host: fix a race condition in vmci_host_poll() causing GPF

During fuzzing, a general protection fault is observed in
vmci_host_poll().

general protection fault, probably for non-canonical address 0xdffffc0000000019: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x00000000000000c8-0x00000000000000cf]
RIP: 0010:__lock_acquire+0xf3/0x5e00 kernel/locking/lockdep.c:4926
&lt;- omitting registers -&gt;
Call Trace:
 &lt;TASK&gt;
 lock_acquire+0x1a4/0x4a0 kernel/locking/lockdep.c:5672
 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
 _raw_spin_lock_irqsave+0xb3/0x100 kernel/locking/spinlock.c:162
 add_wait_queue+0x3d/0x260 kernel/sched/wait.c:22
 poll_wait include/linux/poll.h:49 [inline]
 vmci_host_poll+0xf8/0x2b0 drivers/misc/vmw_vmci/vmci_host.c:174
 vfs_poll include/linux/poll.h:88 [inline]
 do_pollfd fs/select.c:873 [inline]
 do_poll fs/select.c:921 [inline]
 do_sys_poll+0xc7c/0x1aa0 fs/select.c:1015
 __do_sys_ppoll fs/select.c:1121 [inline]
 __se_sys_ppoll+0x2cc/0x330 fs/select.c:1101
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x4e/0xa0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x46/0xb0

Example thread interleaving that causes the general protection fault
is as follows:

CPU1 (vmci_host_poll)               CPU2 (vmci_host_do_init_context)
-----                               -----
// Read uninitialized context
context = vmci_host_dev-&gt;context;
                                    // Initialize context
                                    vmci_host_dev-&gt;context = vmci_ctx_create();
                                    vmci_host_dev-&gt;ct_type = VMCIOBJ_CONTEXT;

if (vmci_host_dev-&gt;ct_type == VMCIOBJ_CONTEXT) {
    // Dereferencing the wrong pointer
    poll_wait(..., &amp;context-&gt;host_context);
}

In this scenario, vmci_host_poll() reads vmci_host_dev-&gt;context first,
and then reads vmci_host_dev-&gt;ct_type to check that
vmci_host_dev-&gt;context is initialized. However, since these two reads
are not atomically executed, there is a chance of a race condition as
described above.

To fix this race condition, read vmci_host_dev-&gt;context after checking
the value of vmci_host_dev-&gt;ct_type so that vmci_host_poll() always
reads an initialized context.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-26"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54007/">CVE-2023-54007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54007">CVE-2023-54007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255626">SUSE bug 1255626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54008</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54008" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54008" ref_url="https://www.suse.com/security/cve/CVE-2023-54008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio_vdpa: build affinity masks conditionally

We try to build affinity mask via create_affinity_masks()
unconditionally which may lead several issues:

- the affinity mask is not used for parent without affinity support
  (only VDUSE support the affinity now)
- the logic of create_affinity_masks() might not work for devices
  other than block. For example it's not rare in the networking device
  where the number of queues could exceed the number of CPUs. Such
  case breaks the current affinity logic which is based on
  group_cpus_evenly() who assumes the number of CPUs are not less than
  the number of groups. This can trigger a warning[1]:

	if (ret &gt;= 0)
		WARN_ON(nr_present + nr_others &lt; numgrps);

Fixing this by only build the affinity masks only when

- Driver passes affinity descriptor, driver like virtio-blk can make
  sure to limit the number of queues when it exceeds the number of CPUs
- Parent support affinity setting config ops

This help to avoid the warning. More optimizations could be done on
top.

[1]
[  682.146655] WARNING: CPU: 6 PID: 1550 at lib/group_cpus.c:400 group_cpus_evenly+0x1aa/0x1c0
[  682.146668] CPU: 6 PID: 1550 Comm: vdpa Not tainted 6.5.0-rc5jason+ #79
[  682.146671] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org 04/01/2014
[  682.146673] RIP: 0010:group_cpus_evenly+0x1aa/0x1c0
[  682.146676] Code: 4c 89 e0 5b 5d 41 5c 41 5d 41 5e c3 cc cc cc cc e8 1b c4 74 ff 48 89 ef e8 13 ac 98 ff 4c 89 e7 45 31 e4 e8 08 ac 98 ff eb c2 &lt;0f&gt; 0b eb b6 e8 fd 05 c3 00 45 31 e4 eb e5 cc cc cc cc cc cc cc cc
[  682.146679] RSP: 0018:ffffc9000215f498 EFLAGS: 00010293
[  682.146682] RAX: 000000000001f1e0 RBX: 0000000000000041 RCX: 0000000000000000
[  682.146684] RDX: ffff888109922058 RSI: 0000000000000041 RDI: 0000000000000030
[  682.146686] RBP: ffff888109922058 R08: ffffc9000215f498 R09: ffffc9000215f4a0
[  682.146687] R10: 00000000000198d0 R11: 0000000000000030 R12: ffff888107e02800
[  682.146689] R13: 0000000000000030 R14: 0000000000000030 R15: 0000000000000041
[  682.146692] FS:  00007fef52315740(0000) GS:ffff888237380000(0000) knlGS:0000000000000000
[  682.146695] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  682.146696] CR2: 00007fef52509000 CR3: 0000000110dbc004 CR4: 0000000000370ee0
[  682.146698] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  682.146700] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  682.146701] Call Trace:
[  682.146703]  &lt;TASK&gt;
[  682.146705]  ? __warn+0x7b/0x130
[  682.146709]  ? group_cpus_evenly+0x1aa/0x1c0
[  682.146712]  ? report_bug+0x1c8/0x1e0
[  682.146717]  ? handle_bug+0x3c/0x70
[  682.146721]  ? exc_invalid_op+0x14/0x70
[  682.146723]  ? asm_exc_invalid_op+0x16/0x20
[  682.146727]  ? group_cpus_evenly+0x1aa/0x1c0
[  682.146729]  ? group_cpus_evenly+0x15c/0x1c0
[  682.146731]  create_affinity_masks+0xaf/0x1a0
[  682.146735]  virtio_vdpa_find_vqs+0x83/0x1d0
[  682.146738]  ? __pfx_default_calc_sets+0x10/0x10
[  682.146742]  virtnet_find_vqs+0x1f0/0x370
[  682.146747]  virtnet_probe+0x501/0xcd0
[  682.146749]  ? vp_modern_get_status+0x12/0x20
[  682.146751]  ? get_cap_addr.isra.0+0x10/0xc0
[  682.146754]  virtio_dev_probe+0x1af/0x260
[  682.146759]  really_probe+0x1a5/0x410
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54008/">CVE-2023-54008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54008">CVE-2023-54008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255630">SUSE bug 1255630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54009</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54009" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54009" ref_url="https://www.suse.com/security/cve/CVE-2023-54009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path

The cdns_i2c_master_xfer() function gets a runtime PM reference when the
function is entered. This reference is released when the function is
exited. There is currently one error path where the function exits
directly, which leads to a leak of the runtime PM reference.

Make sure that this error path also releases the runtime PM reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54009/">CVE-2023-54009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54009">CVE-2023-54009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255620">SUSE bug 1255620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54010</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54010" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54010" ref_url="https://www.suse.com/security/cve/CVE-2023-54010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPICA: ACPICA: check null return of ACPI_ALLOCATE_ZEROED in acpi_db_display_objects

ACPICA commit 0d5f467d6a0ba852ea3aad68663cbcbd43300fd4

ACPI_ALLOCATE_ZEROED may fails, object_info might be null and will cause
null pointer dereference later.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54010/">CVE-2023-54010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54010">CVE-2023-54010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256326">SUSE bug 1256326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54011</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54011" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54011" ref_url="https://www.suse.com/security/cve/CVE-2023-54011" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpi3mr: Fix an issue found by KASAN

Write only correct size (32 instead of 64 bytes).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54011/">CVE-2023-54011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54011">CVE-2023-54011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255597">SUSE bug 1255597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54012</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54012" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54012" ref_url="https://www.suse.com/security/cve/CVE-2023-54012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix stack overflow when LRO is disabled for virtual interfaces

When the virtual interface's feature is updated, it synchronizes the
updated feature for its own lower interface.
This propagation logic should be worked as the iteration, not recursively.
But it works recursively due to the netdev notification unexpectedly.
This problem occurs when it disables LRO only for the team and bonding
interface type.

       team0
         |
  +------+------+-----+-----+
  |      |      |     |     |
team1  team2  team3  ...  team200

If team0's LRO feature is updated, it generates the NETDEV_FEAT_CHANGE
event to its own lower interfaces(team1 ~ team200).
It is worked by netdev_sync_lower_features().
So, the NETDEV_FEAT_CHANGE notification logic of each lower interface
work iteratively.
But generated NETDEV_FEAT_CHANGE event is also sent to the upper
interface too.
upper interface(team0) generates the NETDEV_FEAT_CHANGE event for its own
lower interfaces again.
lower and upper interfaces receive this event and generate this
event again and again.
So, the stack overflow occurs.

But it is not the infinite loop issue.
Because the netdev_sync_lower_features() updates features before
generating the NETDEV_FEAT_CHANGE event.
Already synchronized lower interfaces skip notification logic.
So, it is just the problem that iteration logic is changed to the
recursive unexpectedly due to the notification mechanism.

Reproducer:

ip link add team0 type team
ethtool -K team0 lro on
for i in {1..200}
do
        ip link add team$i master team0 type team
        ethtool -K team$i lro on
done

ethtool -K team0 lro off

In order to fix it, the notifier_ctx member of bonding/team is introduced.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54012/">CVE-2023-54012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54012">CVE-2023-54012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255571">SUSE bug 1255571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54014</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54014" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54014" ref_url="https://www.suse.com/security/cve/CVE-2023-54014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport()

Klocwork reported warning of rport maybe NULL and will be dereferenced.
rport returned by call to fc_bsg_to_rport() could be NULL and dereferenced.

Check valid rport returned by fc_bsg_to_rport().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54014/">CVE-2023-54014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54014">CVE-2023-54014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256300">SUSE bug 1256300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54015</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54015" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54015" ref_url="https://www.suse.com/security/cve/CVE-2023-54015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device

In case devcom allocation is failed, mlx5 is always freeing the priv.
However, this priv might have been allocated by a different thread,
and freeing it might lead to use-after-free bugs.
Fix it by freeing the priv only in case it was allocated by the
running thread.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54015/">CVE-2023-54015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54015">CVE-2023-54015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255562">SUSE bug 1255562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54016</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54016" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54016" ref_url="https://www.suse.com/security/cve/CVE-2023-54016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Fix memory leak in rx_desc and tx_desc

Currently when ath12k_dp_cc_desc_init() is called we allocate
memory to rx_descs and tx_descs. In ath12k_dp_cc_cleanup(), during
descriptor cleanup rx_descs and tx_descs memory is not freed.

This is cause of memory leak. These allocated memory should be
freed in ath12k_dp_cc_cleanup.

In ath12k_dp_cc_desc_init(), we can save base address of rx_descs
and tx_descs. In ath12k_dp_cc_cleanup(), we can free rx_descs and
tx_descs memory using their base address.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54016/">CVE-2023-54016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54016">CVE-2023-54016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256279">SUSE bug 1256279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54017</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54017" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54017" ref_url="https://www.suse.com/security/cve/CVE-2023-54017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries: fix possible memory leak in ibmebus_bus_init()

If device_register() returns error in ibmebus_bus_init(), name of kobject
which is allocated in dev_set_name() called in device_add() is leaked.

As comment of device_add() says, it should call put_device() to drop
the reference count that was set in device_initialize() when it fails,
so the name can be freed in kobject_cleanup().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54017/">CVE-2023-54017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54017">CVE-2023-54017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255605">SUSE bug 1255605</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54018</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54018" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54018" ref_url="https://www.suse.com/security/cve/CVE-2023-54018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/hdmi: Add missing check for alloc_ordered_workqueue

Add check for the return value of alloc_ordered_workqueue as it may return
NULL pointer and cause NULL pointer dereference in `hdmi_hdcp.c` and
`hdmi_hpd.c`.

Patchwork: https://patchwork.freedesktop.org/patch/517211/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-30"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54018/">CVE-2023-54018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54018">CVE-2023-54018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255690">SUSE bug 1255690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54019</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54019" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54019" ref_url="https://www.suse.com/security/cve/CVE-2023-54019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/psi: use kernfs polling functions for PSI trigger polling

Destroying psi trigger in cgroup_file_release causes UAF issues when
a cgroup is removed from under a polling process. This is happening
because cgroup removal causes a call to cgroup_file_release while the
actual file is still alive. Destroying the trigger at this point would
also destroy its waitqueue head and if there is still a polling process
on that file accessing the waitqueue, it will step on the freed pointer:

do_select
  vfs_poll
                           do_rmdir
                             cgroup_rmdir
                               kernfs_drain_open_files
                                 cgroup_file_release
                                   cgroup_pressure_release
                                     psi_trigger_destroy
                                       wake_up_pollfree(&amp;t-&gt;event_wait)
// vfs_poll is unblocked
                                       synchronize_rcu
                                       kfree(t)
  poll_freewait -&gt; UAF access to the trigger's waitqueue head

Patch [1] fixed this issue for epoll() case using wake_up_pollfree(),
however the same issue exists for synchronous poll() case.
The root cause of this issue is that the lifecycles of the psi trigger's
waitqueue and of the file associated with the trigger are different. Fix
this by using kernfs_generic_poll function when polling on cgroup-specific
psi triggers. It internally uses kernfs_open_node-&gt;poll waitqueue head
with its lifecycle tied to the file's lifecycle. This also renders the
fix in [1] obsolete, so revert it.

[1] commit c2dbe32d5db5 ("sched/psi: Fix use-after-free in ep_remove_wait_queue()")
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54019/">CVE-2023-54019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54019">CVE-2023-54019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255636">SUSE bug 1255636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54020</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54020" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54020" ref_url="https://www.suse.com/security/cve/CVE-2023-54020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: sf-pdma: pdma_desc memory leak fix

Commit b2cc5c465c2c ("dmaengine: sf-pdma: Add multithread support for a
DMA channel") changed sf_pdma_prep_dma_memcpy() to unconditionally
allocate a new sf_pdma_desc each time it is called.

The driver previously recycled descs, by checking the in_use flag, only
allocating additional descs if the existing one was in use. This logic
was removed in commit b2cc5c465c2c ("dmaengine: sf-pdma: Add multithread
support for a DMA channel"), but sf_pdma_free_desc() was not changed to
handle the new behaviour.

As a result, each time sf_pdma_prep_dma_memcpy() is called, the previous
descriptor is leaked, over time leading to memory starvation:

  unreferenced object 0xffffffe008447300 (size 192):
  comm "irq/39-mchp_dsc", pid 343, jiffies 4294906910 (age 981.200s)
  hex dump (first 32 bytes):
    00 00 00 ff 00 00 00 00 b8 c1 00 00 00 00 00 00  ................
    00 00 70 08 10 00 00 00 00 00 00 c0 00 00 00 00  ..p.............
  backtrace:
    [&lt;00000000064a04f4&gt;] kmemleak_alloc+0x1e/0x28
    [&lt;00000000018927a7&gt;] kmem_cache_alloc+0x11e/0x178
    [&lt;000000002aea8d16&gt;] sf_pdma_prep_dma_memcpy+0x40/0x112

Add the missing kfree() to sf_pdma_free_desc(), and remove the redundant
in_use flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54020/">CVE-2023-54020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54020">CVE-2023-54020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255574">SUSE bug 1255574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54021</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54021" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54021" ref_url="https://www.suse.com/security/cve/CVE-2023-54021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: set goal start correctly in ext4_mb_normalize_request

We need to set ac_g_ex to notify the goal start used in
ext4_mb_find_by_goal. Set ac_g_ex instead of ac_f_ex in
ext4_mb_normalize_request.
Besides we should assure goal start is in range [first_data_block,
blocks_count) as ext4_mb_initialize_context does.

[ Added a check to make sure size is less than ar-&gt;pright; otherwise
  we could end up passing an underflowed value of ar-&gt;pright - size to
  ext4_get_group_no_and_offset(), which will trigger a BUG_ON later on.
  - TYT ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-26"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54021/">CVE-2023-54021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54021">CVE-2023-54021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255600">SUSE bug 1255600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54022</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54022" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54022" ref_url="https://www.suse.com/security/cve/CVE-2023-54022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix potential memory leaks at error path for UMP open

The allocation and initialization errors at alloc_midi_urbs() that is
called at MIDI 2.0 / UMP device are supposed to be handled at the
caller side by invoking free_midi_urbs().  However, free_midi_urbs()
loops only for ep-&gt;num_urbs entries, and since ep-&gt;num_entries wasn't
updated yet at the allocation / init error in alloc_midi_urbs(), this
entry won't be released.

The intention of free_midi_urbs() is to release the whole elements, so
change the loop size to NUM_URBS to scan over all elements for fixing
the missed releases.

Also, the call of free_midi_urbs() is missing at
snd_usb_midi_v2_open().  Although it'll be released later at
reopen/close or disconnection, it's better to release immediately at
the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54022/">CVE-2023-54022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54022">CVE-2023-54022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255545">SUSE bug 1255545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54023</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54023" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54023" ref_url="https://www.suse.com/security/cve/CVE-2023-54023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix race between balance and cancel/pause

Syzbot reported a panic that looks like this:

  assertion failed: fs_info-&gt;exclusive_operation == BTRFS_EXCLOP_BALANCE_PAUSED, in fs/btrfs/ioctl.c:465
  ------------[ cut here ]------------
  kernel BUG at fs/btrfs/messages.c:259!
  RIP: 0010:btrfs_assertfail+0x2c/0x30 fs/btrfs/messages.c:259
  Call Trace:
   &lt;TASK&gt;
   btrfs_exclop_balance fs/btrfs/ioctl.c:465 [inline]
   btrfs_ioctl_balance fs/btrfs/ioctl.c:3564 [inline]
   btrfs_ioctl+0x531e/0x5b30 fs/btrfs/ioctl.c:4632
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:870 [inline]
   __se_sys_ioctl fs/ioctl.c:856 [inline]
   __x64_sys_ioctl+0x197/0x210 fs/ioctl.c:856
   do_syscall_x64 arch/x86/entry/common.c:50 [inline]
   do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
   entry_SYSCALL_64_after_hwframe+0x63/0xcd

The reproducer is running a balance and a cancel or pause in parallel.
The way balance finishes is a bit wonky, if we were paused we need to
save the balance_ctl in the fs_info, but clear it otherwise and cleanup.
However we rely on the return values being specific errors, or having a
cancel request or no pause request.  If balance completes and returns 0,
but we have a pause or cancel request we won't do the appropriate
cleanup, and then the next time we try to start a balance we'll trip
this ASSERT.

The error handling is just wrong here, we always want to clean up,
unless we got -ECANCELLED and we set the appropriate pause flag in the
exclusive op.  With this patch the reproducer ran for an hour without
tripping, previously it would trip in less than a few minutes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-11"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54023/">CVE-2023-54023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54023">CVE-2023-54023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256301">SUSE bug 1256301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54024</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54024" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54024" ref_url="https://www.suse.com/security/cve/CVE-2023-54024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: Destroy target device if coalesced MMIO unregistration fails

Destroy and free the target coalesced MMIO device if unregistering said
device fails.  As clearly noted in the code, kvm_io_bus_unregister_dev()
does not destroy the target device.

  BUG: memory leak
  unreferenced object 0xffff888112a54880 (size 64):
    comm "syz-executor.2", pid 5258, jiffies 4297861402 (age 14.129s)
    hex dump (first 32 bytes):
      38 c7 67 15 00 c9 ff ff 38 c7 67 15 00 c9 ff ff  8.g.....8.g.....
      e0 c7 e1 83 ff ff ff ff 00 30 67 15 00 c9 ff ff  .........0g.....
    backtrace:
      [&lt;0000000006995a8a&gt;] kmalloc include/linux/slab.h:556 [inline]
      [&lt;0000000006995a8a&gt;] kzalloc include/linux/slab.h:690 [inline]
      [&lt;0000000006995a8a&gt;] kvm_vm_ioctl_register_coalesced_mmio+0x8e/0x3d0 arch/x86/kvm/../../../virt/kvm/coalesced_mmio.c:150
      [&lt;00000000022550c2&gt;] kvm_vm_ioctl+0x47d/0x1600 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3323
      [&lt;000000008a75102f&gt;] vfs_ioctl fs/ioctl.c:46 [inline]
      [&lt;000000008a75102f&gt;] file_ioctl fs/ioctl.c:509 [inline]
      [&lt;000000008a75102f&gt;] do_vfs_ioctl+0xbab/0x1160 fs/ioctl.c:696
      [&lt;0000000080e3f669&gt;] ksys_ioctl+0x76/0xa0 fs/ioctl.c:713
      [&lt;0000000059ef4888&gt;] __do_sys_ioctl fs/ioctl.c:720 [inline]
      [&lt;0000000059ef4888&gt;] __se_sys_ioctl fs/ioctl.c:718 [inline]
      [&lt;0000000059ef4888&gt;] __x64_sys_ioctl+0x6f/0xb0 fs/ioctl.c:718
      [&lt;000000006444fa05&gt;] do_syscall_64+0x9f/0x4e0 arch/x86/entry/common.c:290
      [&lt;000000009a4ed50b&gt;] entry_SYSCALL_64_after_hwframe+0x49/0xbe

  BUG: leak checking failed
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-26"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54024/">CVE-2023-54024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54024">CVE-2023-54024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255609">SUSE bug 1255609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54025</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54025" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54025" ref_url="https://www.suse.com/security/cve/CVE-2023-54025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled

In case WoWlan was never configured during the operation of the system,
the hw-&gt;wiphy-&gt;wowlan_config will be NULL. rsi_config_wowlan() checks
whether wowlan_config is non-NULL and if it is not, then WARNs about it.
The warning is valid, as during normal operation the rsi_config_wowlan()
should only ever be called with non-NULL wowlan_config. In shutdown this
rsi_config_wowlan() should only ever be called if WoWlan was configured
before by the user.

Add checks for non-NULL wowlan_config into the shutdown hook. While at it,
check whether the wiphy is also non-NULL before accessing wowlan_config .
Drop the single-use wowlan_config variable, just inline it into function
call.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-26"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54025/">CVE-2023-54025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54025">CVE-2023-54025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255558">SUSE bug 1255558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54026</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54026" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54026" ref_url="https://www.suse.com/security/cve/CVE-2023-54026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

opp: Fix use-after-free in lazy_opp_tables after probe deferral

When dev_pm_opp_of_find_icc_paths() in _allocate_opp_table() returns
-EPROBE_DEFER, the opp_table is freed again, to wait until all the
interconnect paths are available.

However, if the OPP table is using required-opps then it may already
have been added to the global lazy_opp_tables list. The error path
does not remove the opp_table from the list again.

This can cause crashes later when the provider of the required-opps
is added, since we will iterate over OPP tables that have already been
freed. E.g.:

  Unable to handle kernel NULL pointer dereference when read
  CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.4.0-rc3
  PC is at _of_add_opp_table_v2 (include/linux/of.h:949
  drivers/opp/of.c:98 drivers/opp/of.c:344 drivers/opp/of.c:404
  drivers/opp/of.c:1032) -&gt; lazy_link_required_opp_table()

Fix this by calling _of_clear_opp_table() to remove the opp_table from
the list and clear other allocated resources. While at it, also add the
missing mutex_destroy() calls in the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-26"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54026/">CVE-2023-54026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54026">CVE-2023-54026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255549">SUSE bug 1255549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54027</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54027" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54027" ref_url="https://www.suse.com/security/cve/CVE-2023-54027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: core: Prevent invalid memory access when there is no parent

Commit 813665564b3d ("iio: core: Convert to use firmware node handle
instead of OF node") switched the kind of nodes to use for label
retrieval in device registration.  Probably an unwanted change in that
commit was that if the device has no parent then NULL pointer is
accessed.  This is what happens in the stock IIO dummy driver when a
new entry is created in configfs:

  # mkdir /sys/kernel/config/iio/devices/dummy/foo
  BUG: kernel NULL pointer dereference, address: ...
  ...
  Call Trace:
  __iio_device_register
  iio_dummy_probe

Since there seems to be no reason to make a parent device of an IIO
dummy device mandatory, let's prevent the invalid memory access in
__iio_device_register when the parent device is NULL.  With this
change, the IIO dummy driver works fine with configfs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-27"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54027/">CVE-2023-54027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54027">CVE-2023-54027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255579">SUSE bug 1255579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54028</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54028" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54028" ref_url="https://www.suse.com/security/cve/CVE-2023-54028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task"

In the function rxe_create_qp(), rxe_qp_from_init() is called to
initialize qp, internally things like rxe_init_task are not setup until
rxe_qp_init_req().

If an error occurred before this point then the unwind will call
rxe_cleanup() and eventually to rxe_qp_do_cleanup()/rxe_cleanup_task()
which will oops when trying to access the uninitialized spinlock.

If rxe_init_task is not executed, rxe_cleanup_task will not be called.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54028/">CVE-2023-54028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54028">CVE-2023-54028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255546">SUSE bug 1255546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54030</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54030" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54030" ref_url="https://www.suse.com/security/cve/CVE-2023-54030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/net: don't overflow multishot recv

Don't allow overflowing multishot recv CQEs, it might get out of
hand, hurt performance, and in the worst case scenario OOM the task.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-30"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54030/">CVE-2023-54030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54030">CVE-2023-54030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255691">SUSE bug 1255691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54031</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54031" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54031" ref_url="https://www.suse.com/security/cve/CVE-2023-54031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check

The vdpa_nl_policy structure is used to validate the nlattr when parsing
the incoming nlmsg. It will ensure the attribute being described produces
a valid nlattr pointer in info-&gt;attrs before entering into each handler
in vdpa_nl_ops.

That is to say, the missing part in vdpa_nl_policy may lead to illegal
nlattr after parsing, which could lead to OOB read just like CVE-2023-3773.

This patch adds the missing nla_policy for vdpa queue index attr to avoid
such bugs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-27"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54031/">CVE-2023-54031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54031">CVE-2023-54031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255583">SUSE bug 1255583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54032</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54032" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54032" ref_url="https://www.suse.com/security/cve/CVE-2023-54032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix race when deleting quota root from the dirty cow roots list

When disabling quotas we are deleting the quota root from the list
fs_info-&gt;dirty_cowonly_roots without taking the lock that protects it,
which is struct btrfs_fs_info::trans_lock. This unsynchronized list
manipulation may cause chaos if there's another concurrent manipulation
of this list, such as when adding a root to it with
ctree.c:add_root_to_dirty_list().

This can result in all sorts of weird failures caused by a race, such as
the following crash:

  [337571.278245] general protection fault, probably for non-canonical address 0xdead000000000108: 0000 [#1] PREEMPT SMP PTI
  [337571.278933] CPU: 1 PID: 115447 Comm: btrfs Tainted: G        W          6.4.0-rc6-btrfs-next-134+ #1
  [337571.279153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
  [337571.279572] RIP: 0010:commit_cowonly_roots+0x11f/0x250 [btrfs]
  [337571.279928] Code: 85 38 06 00 (...)
  [337571.280363] RSP: 0018:ffff9f63446efba0 EFLAGS: 00010206
  [337571.280582] RAX: ffff942d98ec2638 RBX: ffff9430b82b4c30 RCX: 0000000449e1c000
  [337571.280798] RDX: dead000000000100 RSI: ffff9430021e4900 RDI: 0000000000036070
  [337571.281015] RBP: ffff942d98ec2000 R08: ffff942d98ec2000 R09: 000000000000015b
  [337571.281254] R10: 0000000000000009 R11: 0000000000000001 R12: ffff942fe8fbf600
  [337571.281476] R13: ffff942dabe23040 R14: ffff942dabe20800 R15: ffff942d92cf3b48
  [337571.281723] FS:  00007f478adb7340(0000) GS:ffff94349fa40000(0000) knlGS:0000000000000000
  [337571.281950] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [337571.282184] CR2: 00007f478ab9a3d5 CR3: 000000001e02c001 CR4: 0000000000370ee0
  [337571.282416] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  [337571.282647] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  [337571.282874] Call Trace:
  [337571.283101]  &lt;TASK&gt;
  [337571.283327]  ? __die_body+0x1b/0x60
  [337571.283570]  ? die_addr+0x39/0x60
  [337571.283796]  ? exc_general_protection+0x22e/0x430
  [337571.284022]  ? asm_exc_general_protection+0x22/0x30
  [337571.284251]  ? commit_cowonly_roots+0x11f/0x250 [btrfs]
  [337571.284531]  btrfs_commit_transaction+0x42e/0xf90 [btrfs]
  [337571.284803]  ? _raw_spin_unlock+0x15/0x30
  [337571.285031]  ? release_extent_buffer+0x103/0x130 [btrfs]
  [337571.285305]  reset_balance_state+0x152/0x1b0 [btrfs]
  [337571.285578]  btrfs_balance+0xa50/0x11e0 [btrfs]
  [337571.285864]  ? __kmem_cache_alloc_node+0x14a/0x410
  [337571.286086]  btrfs_ioctl+0x249a/0x3320 [btrfs]
  [337571.286358]  ? mod_objcg_state+0xd2/0x360
  [337571.286577]  ? refill_obj_stock+0xb0/0x160
  [337571.286798]  ? seq_release+0x25/0x30
  [337571.287016]  ? __rseq_handle_notify_resume+0x3ba/0x4b0
  [337571.287235]  ? percpu_counter_add_batch+0x2e/0xa0
  [337571.287455]  ? __x64_sys_ioctl+0x88/0xc0
  [337571.287675]  __x64_sys_ioctl+0x88/0xc0
  [337571.287901]  do_syscall_64+0x38/0x90
  [337571.288126]  entry_SYSCALL_64_after_hwframe+0x72/0xdc
  [337571.288352] RIP: 0033:0x7f478aaffe9b

So fix this by locking struct btrfs_fs_info::trans_lock before deleting
the quota root from that list.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-26"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54032/">CVE-2023-54032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54032">CVE-2023-54032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255617">SUSE bug 1255617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54033</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54033" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54033" ref_url="https://www.suse.com/security/cve/CVE-2023-54033" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: fix a memory leak in the LRU and LRU_PERCPU hash maps

The LRU and LRU_PERCPU maps allocate a new element on update before locking the
target hash table bucket. Right after that the maps try to lock the bucket.
If this fails, then maps return -EBUSY to the caller without releasing the
allocated element. This makes the element untracked: it doesn't belong to
either of free lists, and it doesn't belong to the hash table, so can't be
re-used; this eventually leads to the permanent -ENOMEM on LRU map updates,
which is unexpected. Fix this by returning the element to the local free list
if bucket locking fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54033/">CVE-2023-54033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54033">CVE-2023-54033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255543">SUSE bug 1255543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54034</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54034" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54034" ref_url="https://www.suse.com/security/cve/CVE-2023-54034" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Make sure to zero vfio_iommu_type1_info before copying to user

Missed a zero initialization here. Most of the struct is filled with
a copy_from_user(), however minsz for that copy is smaller than the
actual struct by 8 bytes, thus we don't fill the padding.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-26"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54034/">CVE-2023-54034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54034">CVE-2023-54034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255559">SUSE bug 1255559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54035</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54035" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54035" ref_url="https://www.suse.com/security/cve/CVE-2023-54035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fix underflow in chain reference counter

Set element addition error path decrements reference counter on chains
twice: once on element release and again via nft_data_release().

Then, d6b478666ffa ("netfilter: nf_tables: fix underflow in object
reference counter") incorrectly fixed this by removing the stateful
object reference count decrement.

Restore the stateful object decrement as in b91d90368837 ("netfilter:
nf_tables: fix leaking object reference count") and let
nft_data_release() decrement the chain reference counter, so this is
done only once.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-26"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54035/">CVE-2023-54035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54035">CVE-2023-54035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255563">SUSE bug 1255563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54036</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54036" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54036" ref_url="https://www.suse.com/security/cve/CVE-2023-54036" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtl8xxxu: Fix memory leaks with RTL8723BU, RTL8192EU

The wifi + bluetooth combo chip RTL8723BU can leak memory (especially?)
when it's connected to a bluetooth audio device. The busy bluetooth
traffic generates lots of C2H (card to host) messages, which are not
freed correctly.

To fix this, move the dev_kfree_skb() call in rtl8xxxu_c2hcmd_callback()
inside the loop where skb_dequeue() is called.

The RTL8192EU leaks memory because the C2H messages are added to the
queue and left there forever. (This was fine in the past because it
probably wasn't sending any C2H messages until commit e542e66b7c2e
("wifi: rtl8xxxu: gen2: Turn on the rate control"). Since that commit
it sends a C2H message when the TX rate changes.)

To fix this, delete the check for rf_paths &gt; 1 and the goto. Let the
function process the C2H messages from RTL8192EU like the ones from
the other chips.

Theoretically the RTL8188FU could also leak like RTL8723BU, but it
most likely doesn't send C2H messages frequently enough.

This change was tested with RTL8723BU by Erhard F. I tested it with
RTL8188FU and RTL8192EU.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54036/">CVE-2023-54036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54036">CVE-2023-54036 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255528">SUSE bug 1255528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54037</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54037" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54037" ref_url="https://www.suse.com/security/cve/CVE-2023-54037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: prevent NULL pointer deref during reload

Calling ethtool during reload can lead to call trace, because VSI isn't
configured for some time, but netdev is alive.

To fix it add rtnl lock for VSI deconfig and config. Set ::num_q_vectors
to 0 after freeing and add a check for ::tx/rx_rings in ring related
ethtool ops.

Add proper unroll of filters in ice_start_eth().

Reproduction:
$watch -n 0.1 -d 'ethtool -g enp24s0f0np0'
$devlink dev reload pci/0000:18:00.0 action driver_reinit

Call trace before fix:
[66303.926205] BUG: kernel NULL pointer dereference, address: 0000000000000000
[66303.926259] #PF: supervisor read access in kernel mode
[66303.926286] #PF: error_code(0x0000) - not-present page
[66303.926311] PGD 0 P4D 0
[66303.926332] Oops: 0000 [#1] PREEMPT SMP PTI
[66303.926358] CPU: 4 PID: 933821 Comm: ethtool Kdump: loaded Tainted: G           OE      6.4.0-rc5+ #1
[66303.926400] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.00.01.0014.070920180847 07/09/2018
[66303.926446] RIP: 0010:ice_get_ringparam+0x22/0x50 [ice]
[66303.926649] Code: 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 48 8b 87 c0 09 00 00 c7 46 04 e0 1f 00 00 c7 46 10 e0 1f 00 00 48 8b 50 20 &lt;48&gt; 8b 12 0f b7 52 3a 89 56 14 48 8b 40 28 48 8b 00 0f b7 40 58 48
[66303.926722] RSP: 0018:ffffad40472f39c8 EFLAGS: 00010246
[66303.926749] RAX: ffff98a8ada05828 RBX: ffff98a8c46dd060 RCX: ffffad40472f3b48
[66303.926781] RDX: 0000000000000000 RSI: ffff98a8c46dd068 RDI: ffff98a8b23c4000
[66303.926811] RBP: ffffad40472f3b48 R08: 00000000000337b0 R09: 0000000000000000
[66303.926843] R10: 0000000000000001 R11: 0000000000000100 R12: ffff98a8b23c4000
[66303.926874] R13: ffff98a8c46dd060 R14: 000000000000000f R15: ffffad40472f3a50
[66303.926906] FS:  00007f6397966740(0000) GS:ffff98b390900000(0000) knlGS:0000000000000000
[66303.926941] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[66303.926967] CR2: 0000000000000000 CR3: 000000011ac20002 CR4: 00000000007706e0
[66303.926999] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[66303.927029] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[66303.927060] PKRU: 55555554
[66303.927075] Call Trace:
[66303.927094]  &lt;TASK&gt;
[66303.927111]  ? __die+0x23/0x70
[66303.927140]  ? page_fault_oops+0x171/0x4e0
[66303.927176]  ? exc_page_fault+0x7f/0x180
[66303.927209]  ? asm_exc_page_fault+0x26/0x30
[66303.927244]  ? ice_get_ringparam+0x22/0x50 [ice]
[66303.927433]  rings_prepare_data+0x62/0x80
[66303.927469]  ethnl_default_doit+0xe2/0x350
[66303.927501]  genl_family_rcv_msg_doit.isra.0+0xe3/0x140
[66303.927538]  genl_rcv_msg+0x1b1/0x2c0
[66303.927561]  ? __pfx_ethnl_default_doit+0x10/0x10
[66303.927590]  ? __pfx_genl_rcv_msg+0x10/0x10
[66303.927615]  netlink_rcv_skb+0x58/0x110
[66303.927644]  genl_rcv+0x28/0x40
[66303.927665]  netlink_unicast+0x19e/0x290
[66303.927691]  netlink_sendmsg+0x254/0x4d0
[66303.927717]  sock_sendmsg+0x93/0xa0
[66303.927743]  __sys_sendto+0x126/0x170
[66303.927780]  __x64_sys_sendto+0x24/0x30
[66303.928593]  do_syscall_64+0x5d/0x90
[66303.929370]  ? __count_memcg_events+0x60/0xa0
[66303.930146]  ? count_memcg_events.constprop.0+0x1a/0x30
[66303.930920]  ? handle_mm_fault+0x9e/0x350
[66303.931688]  ? do_user_addr_fault+0x258/0x740
[66303.932452]  ? exc_page_fault+0x7f/0x180
[66303.933193]  entry_SYSCALL_64_after_hwframe+0x72/0xdc
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54037/">CVE-2023-54037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54037">CVE-2023-54037 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255557">SUSE bug 1255557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54038</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54038" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54038" ref_url="https://www.suse.com/security/cve/CVE-2023-54038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_conn: return ERR_PTR instead of NULL when there is no link

hci_connect_sco currently returns NULL when there is no link (i.e. when
hci_conn_link() returns NULL).

sco_connect() expects an ERR_PTR in case of any error (see line 266 in
sco.c). Thus, hcon set as NULL passes through to sco_conn_add(), which
tries to get hcon-&gt;hdev, resulting in dereferencing a NULL pointer as
reported by syzkaller.

The same issue exists for iso_connect_cis() calling hci_connect_cis().

Thus, make hci_connect_sco() and hci_connect_cis() return ERR_PTR
instead of NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54038/">CVE-2023-54038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54038">CVE-2023-54038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255540">SUSE bug 1255540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54039</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54039" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54039" ref_url="https://www.suse.com/security/cve/CVE-2023-54039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: j1939_tp_tx_dat_new(): fix out-of-bounds memory access

In the j1939_tp_tx_dat_new() function, an out-of-bounds memory access
could occur during the memcpy() operation if the size of skb-&gt;cb is
larger than the size of struct j1939_sk_buff_cb. This is because the
memcpy() operation uses the size of skb-&gt;cb, leading to a read beyond
the struct j1939_sk_buff_cb.

Updated the memcpy() operation to use the size of struct
j1939_sk_buff_cb instead of the size of skb-&gt;cb. This ensures that the
memcpy() operation only reads the memory within the bounds of struct
j1939_sk_buff_cb, preventing out-of-bounds memory access.

Additionally, add a BUILD_BUG_ON() to check that the size of skb-&gt;cb
is greater than or equal to the size of struct j1939_sk_buff_cb. This
ensures that the skb-&gt;cb buffer is large enough to hold the
j1939_sk_buff_cb structure.

[mkl: rephrase commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54039/">CVE-2023-54039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54039">CVE-2023-54039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255555">SUSE bug 1255555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54040</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54040" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54040" ref_url="https://www.suse.com/security/cve/CVE-2023-54040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix wrong fallback logic for FDIR

When adding a FDIR filter, if ice_vc_fdir_set_irq_ctx returns failure,
the inserted fdir entry will not be removed and if ice_vc_fdir_write_fltr
returns failure, the fdir context info for irq handler will not be cleared
which may lead to inconsistent or memory leak issue. This patch refines
failure cases to resolve this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-26"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54040/">CVE-2023-54040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54040">CVE-2023-54040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255554">SUSE bug 1255554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54041</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54041" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54041" ref_url="https://www.suse.com/security/cve/CVE-2023-54041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix memory leak when removing provided buffers

When removing provided buffers, io_buffer structs are not being disposed
of, leading to a memory leak. They can't be freed individually, because
they are allocated in page-sized groups. They need to be added to some
free list instead, such as io_buffers_cache. All callers already hold
the lock protecting it, apart from when destroying buffers, so had to
extend the lock there.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54041/">CVE-2023-54041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54041">CVE-2023-54041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255532">SUSE bug 1255532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54042</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54042" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54042" ref_url="https://www.suse.com/security/cve/CVE-2023-54042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/64s: Fix VAS mm use after free

The refcount on mm is dropped before the coprocessor is detached.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-30"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54042/">CVE-2023-54042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54042">CVE-2023-54042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255702">SUSE bug 1255702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257670">SUSE bug 1257670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54043</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54043" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54043" ref_url="https://www.suse.com/security/cve/CVE-2023-54043" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Do not add the same hwpt to the ioas-&gt;hwpt_list twice

The hwpt is added to the hwpt_list only during its creation, it is never
added again. This hunk is some missed leftover from rework. Adding it
twice will corrupt the linked list in some cases.

It effects HWPT specific attachment, which is something the test suite
cannot cover until we can create a legitimate struct device with a
non-system iommu "driver" (ie we need the bus removed from the iommu code)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54043/">CVE-2023-54043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54043">CVE-2023-54043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256293">SUSE bug 1256293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54044</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54044" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54044" ref_url="https://www.suse.com/security/cve/CVE-2023-54044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spmi: Add a check for remove callback when removing a SPMI driver

When removing a SPMI driver, there can be a crash due to NULL pointer
dereference if it does not have a remove callback defined. This is
one such call trace observed when removing the QCOM SPMI PMIC driver:

 dump_backtrace.cfi_jt+0x0/0x8
 dump_stack_lvl+0xd8/0x16c
 panic+0x188/0x498
 __cfi_slowpath+0x0/0x214
 __cfi_slowpath+0x1dc/0x214
 spmi_drv_remove+0x16c/0x1e0
 device_release_driver_internal+0x468/0x79c
 driver_detach+0x11c/0x1a0
 bus_remove_driver+0xc4/0x124
 driver_unregister+0x58/0x84
 cleanup_module+0x1c/0xc24 [qcom_spmi_pmic]
 __do_sys_delete_module+0x3ec/0x53c
 __arm64_sys_delete_module+0x18/0x28
 el0_svc_common+0xdc/0x294
 el0_svc+0x38/0x9c
 el0_sync_handler+0x8c/0xf0
 el0_sync+0x1b4/0x1c0

If a driver has all its resources allocated through devm_() APIs and
does not need any other explicit cleanup, it would not require a
remove callback to be defined. Hence, add a check for remove callback
presence before calling it when removing a SPMI driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54044/">CVE-2023-54044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54044">CVE-2023-54044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256294">SUSE bug 1256294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54045</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54045" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54045" ref_url="https://www.suse.com/security/cve/CVE-2023-54045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

audit: fix possible soft lockup in __audit_inode_child()

Tracefs or debugfs maybe cause hundreds to thousands of PATH records,
too many PATH records maybe cause soft lockup.

For example:
  1. CONFIG_KASAN=y &amp;&amp; CONFIG_PREEMPTION=n
  2. auditctl -a exit,always -S open -k key
  3. sysctl -w kernel.watchdog_thresh=5
  4. mkdir /sys/kernel/debug/tracing/instances/test

There may be a soft lockup as follows:
  watchdog: BUG: soft lockup - CPU#45 stuck for 7s! [mkdir:15498]
  Kernel panic - not syncing: softlockup: hung tasks
  Call trace:
   dump_backtrace+0x0/0x30c
   show_stack+0x20/0x30
   dump_stack+0x11c/0x174
   panic+0x27c/0x494
   watchdog_timer_fn+0x2bc/0x390
   __run_hrtimer+0x148/0x4fc
   __hrtimer_run_queues+0x154/0x210
   hrtimer_interrupt+0x2c4/0x760
   arch_timer_handler_phys+0x48/0x60
   handle_percpu_devid_irq+0xe0/0x340
   __handle_domain_irq+0xbc/0x130
   gic_handle_irq+0x78/0x460
   el1_irq+0xb8/0x140
   __audit_inode_child+0x240/0x7bc
   tracefs_create_file+0x1b8/0x2a0
   trace_create_file+0x18/0x50
   event_create_dir+0x204/0x30c
   __trace_add_new_event+0xac/0x100
   event_trace_add_tracer+0xa0/0x130
   trace_array_create_dir+0x60/0x140
   trace_array_create+0x1e0/0x370
   instance_mkdir+0x90/0xd0
   tracefs_syscall_mkdir+0x68/0xa0
   vfs_mkdir+0x21c/0x34c
   do_mkdirat+0x1b4/0x1d4
   __arm64_sys_mkdirat+0x4c/0x60
   el0_svc_common.constprop.0+0xa8/0x240
   do_el0_svc+0x8c/0xc0
   el0_svc+0x20/0x30
   el0_sync_handler+0xb0/0xb4
   el0_sync+0x160/0x180

Therefore, we add cond_resched() to __audit_inode_child() to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54045/">CVE-2023-54045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54045">CVE-2023-54045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256285">SUSE bug 1256285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54046</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54046" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54046" ref_url="https://www.suse.com/security/cve/CVE-2023-54046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: essiv - Handle EBUSY correctly

As it is essiv only handles the special return value of EINPROGERSS,
which means that in all other cases it will free data related to the
request.

However, as the caller of essiv may specify MAY_BACKLOG, we also need
to expect EBUSY and treat it in the same way.  Otherwise backlogged
requests will trigger a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54046/">CVE-2023-54046 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54046">CVE-2023-54046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256295">SUSE bug 1256295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54047</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54047" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54047" ref_url="https://www.suse.com/security/cve/CVE-2023-54047" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/rockchip: dw_hdmi: cleanup drm encoder during unbind

This fixes a use-after-free crash during rmmod.

The DRM encoder is embedded inside the larger rockchip_hdmi,
which is allocated with the component. The component memory
gets freed before the main drm device is destroyed. Fix it
by running encoder cleanup before tearing down its container.

[moved encoder cleanup above clk_disable, similar to bind-error-path]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54047/">CVE-2023-54047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54047">CVE-2023-54047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256398">SUSE bug 1256398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54048</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54048" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54048" ref_url="https://www.suse.com/security/cve/CVE-2023-54048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/bnxt_re: Prevent handling any completions after qp destroy

HW may generate completions that indicates QP is destroyed.
Driver should not be scheduling any more completion handlers
for this QP, after the QP is destroyed. Since CQs are active
during the QP destroy, driver may still schedule completion
handlers. This can cause a race where the destroy_cq and poll_cq
running simultaneously.

Snippet of kernel panic while doing bnxt_re driver load unload in loop.
This indicates a poll after the CQ is freed.  

[77786.481636] Call Trace:
[77786.481640]   &lt;TASK&gt;
[77786.481644]   bnxt_re_poll_cq+0x14a/0x620 [bnxt_re]
[77786.481658]   ? kvm_clock_read+0x14/0x30
[77786.481693]   __ib_process_cq+0x57/0x190 [ib_core]
[77786.481728]   ib_cq_poll_work+0x26/0x80 [ib_core]
[77786.481761]   process_one_work+0x1e5/0x3f0
[77786.481768]   worker_thread+0x50/0x3a0
[77786.481785]   ? __pfx_worker_thread+0x10/0x10
[77786.481790]   kthread+0xe2/0x110
[77786.481794]   ? __pfx_kthread+0x10/0x10
[77786.481797]   ret_from_fork+0x2c/0x50

To avoid this, complete all completion handlers before returning the
destroy QP. If free_cq is called soon after destroy_qp,  IB stack
will cancel the CQ work before invoking the destroy_cq verb and
this will prevent any race mentioned.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54048/">CVE-2023-54048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54048">CVE-2023-54048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256395">SUSE bug 1256395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54049</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54049" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54049" ref_url="https://www.suse.com/security/cve/CVE-2023-54049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rpmsg: glink: Add check for kstrdup

Add check for the return value of kstrdup() and return the error
if it fails in order to avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54049/">CVE-2023-54049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54049">CVE-2023-54049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256396">SUSE bug 1256396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54050</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54050" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54050" ref_url="https://www.suse.com/security/cve/CVE-2023-54050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ubifs: Fix memleak when insert_old_idx() failed

Following process will cause a memleak for copied up znode:

dirty_cow_znode
  zn = copy_znode(c, znode);
  err = insert_old_idx(c, zbr-&gt;lnum, zbr-&gt;offs);
  if (unlikely(err))
     return ERR_PTR(err);   // No one refers to zn.

Fetch a reproducer in [Link].

Function copy_znode() is split into 2 parts: resource allocation
and znode replacement, insert_old_idx() is split in similar way,
so resource cleanup could be done in error handling path without
corrupting metadata(mem &amp; disk).
It's okay that old index inserting is put behind of add_idx_dirt(),
old index is used in layout_leb_in_gaps(), so the two processes do
not depend on each other.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54050/">CVE-2023-54050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54050">CVE-2023-54050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256397">SUSE bug 1256397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54051</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54051" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54051" ref_url="https://www.suse.com/security/cve/CVE-2023-54051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: do not allow gso_size to be set to GSO_BY_FRAGS

One missing check in virtio_net_hdr_to_skb() allowed
syzbot to crash kernels again [1]

Do not allow gso_size to be set to GSO_BY_FRAGS (0xffff),
because this magic value is used by the kernel.

[1]
general protection fault, probably for non-canonical address 0xdffffc000000000e: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000070-0x0000000000000077]
CPU: 0 PID: 5039 Comm: syz-executor401 Not tainted 6.5.0-rc5-next-20230809-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
RIP: 0010:skb_segment+0x1a52/0x3ef0 net/core/skbuff.c:4500
Code: 00 00 00 e9 ab eb ff ff e8 6b 96 5d f9 48 8b 84 24 00 01 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 &lt;0f&gt; b6 04 02 84 c0 74 08 3c 03 0f 8e ea 21 00 00 48 8b 84 24 00 01
RSP: 0018:ffffc90003d3f1c8 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 000000000001fffe RCX: 0000000000000000
RDX: 000000000000000e RSI: ffffffff882a3115 RDI: 0000000000000070
RBP: ffffc90003d3f378 R08: 0000000000000005 R09: 000000000000ffff
R10: 000000000000ffff R11: 5ee4a93e456187d6 R12: 000000000001ffc6
R13: dffffc0000000000 R14: 0000000000000008 R15: 000000000000ffff
FS: 00005555563f2380(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020020000 CR3: 000000001626d000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;TASK&gt;
udp6_ufo_fragment+0x9d2/0xd50 net/ipv6/udp_offload.c:109
ipv6_gso_segment+0x5c4/0x17b0 net/ipv6/ip6_offload.c:120
skb_mac_gso_segment+0x292/0x610 net/core/gso.c:53
__skb_gso_segment+0x339/0x710 net/core/gso.c:124
skb_gso_segment include/net/gso.h:83 [inline]
validate_xmit_skb+0x3a5/0xf10 net/core/dev.c:3625
__dev_queue_xmit+0x8f0/0x3d60 net/core/dev.c:4329
dev_queue_xmit include/linux/netdevice.h:3082 [inline]
packet_xmit+0x257/0x380 net/packet/af_packet.c:276
packet_snd net/packet/af_packet.c:3087 [inline]
packet_sendmsg+0x24c7/0x5570 net/packet/af_packet.c:3119
sock_sendmsg_nosec net/socket.c:727 [inline]
sock_sendmsg+0xd9/0x180 net/socket.c:750
____sys_sendmsg+0x6ac/0x940 net/socket.c:2496
___sys_sendmsg+0x135/0x1d0 net/socket.c:2550
__sys_sendmsg+0x117/0x1e0 net/socket.c:2579
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7ff27cdb34d9
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54051/">CVE-2023-54051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54051">CVE-2023-54051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256394">SUSE bug 1256394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54052</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54052" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54052" ref_url="https://www.suse.com/security/cve/CVE-2023-54052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921: fix skb leak by txs missing in AMSDU

txs may be dropped if the frame is aggregated in AMSDU. When the problem
shows up, some SKBs would be hold in driver to cause network stopped
temporarily. Even if the problem can be recovered by txs timeout handling,
mt7921 still need to disable txs in AMSDU to avoid this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54052/">CVE-2023-54052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54052">CVE-2023-54052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256387">SUSE bug 1256387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54053</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54053" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54053" ref_url="https://www.suse.com/security/cve/CVE-2023-54053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: pcie: fix possible NULL pointer dereference

It is possible that iwl_pci_probe() will fail and free the trans,
then afterwards iwl_pci_remove() will be called and crash by trying
to access trans which is already freed, fix it.

iwlwifi 0000:01:00.0: Detected crf-id 0xa5a5a5a2, cnv-id 0xa5a5a5a2
		      wfpm id 0xa5a5a5a2
iwlwifi 0000:01:00.0: Can't find a correct rfid for crf id 0x5a2
...
BUG: kernel NULL pointer dereference, address: 0000000000000028
...
RIP: 0010:iwl_pci_remove+0x12/0x30 [iwlwifi]
pci_device_remove+0x3e/0xb0
device_release_driver_internal+0x103/0x1f0
driver_detach+0x4c/0x90
bus_remove_driver+0x5c/0xd0
driver_unregister+0x31/0x50
pci_unregister_driver+0x40/0x90
iwl_pci_unregister_driver+0x15/0x20 [iwlwifi]
__exit_compat+0x9/0x98 [iwlwifi]
__x64_sys_delete_module+0x147/0x260
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54053/">CVE-2023-54053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54053">CVE-2023-54053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256388">SUSE bug 1256388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54055</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54055" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54055" ref_url="https://www.suse.com/security/cve/CVE-2023-54055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix memory leak of PBLE objects

On rmmod of irdma, the PBLE object memory is not being freed. PBLE object
memory are not statically pre-allocated at function initialization time
unlike other HMC objects. PBLEs objects and the Segment Descriptors (SD)
for it can be dynamically allocated during scale up and SD's remain
allocated till function deinitialization.

Fix this leak by adding IRDMA_HMC_IW_PBLE to the iw_hmc_obj_types[] table
and skip pbles in irdma_create_hmc_obj but not in irdma_del_hmc_objects().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54055/">CVE-2023-54055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54055">CVE-2023-54055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256384">SUSE bug 1256384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54056</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54056" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54056" ref_url="https://www.suse.com/security/cve/CVE-2023-54056" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kheaders: Use array declaration instead of char

Under CONFIG_FORTIFY_SOURCE, memcpy() will check the size of destination
and source buffers. Defining kernel_headers_data as "char" would trip
this check. Since these addresses are treated as byte arrays, define
them as arrays (as done everywhere else).

This was seen with:

  $ cat /sys/kernel/kheaders.tar.xz &gt;&gt; /dev/null

  detected buffer overflow in memcpy
  kernel BUG at lib/string_helpers.c:1027!
  ...
  RIP: 0010:fortify_panic+0xf/0x20
  [...]
  Call Trace:
   &lt;TASK&gt;
   ikheaders_read+0x45/0x50 [kheaders]
   kernfs_fop_read_iter+0x1a4/0x2f0
  ...
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54056/">CVE-2023-54056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54056">CVE-2023-54056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256385">SUSE bug 1256385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54057</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54057" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54057" ref_url="https://www.suse.com/security/cve/CVE-2023-54057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter

The 'acpiid' buffer in the parse_ivrs_acpihid function may overflow,
because the string specifier in the format string sscanf()
has no width limitation.

Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54057/">CVE-2023-54057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54057">CVE-2023-54057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256381">SUSE bug 1256381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54058</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54058" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54058" ref_url="https://www.suse.com/security/cve/CVE-2023-54058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_ffa: Check if ffa_driver remove is present before executing

Currently ffa_drv-&gt;remove() is called unconditionally from
ffa_device_remove(). Since the driver registration doesn't check for it
and allows it to be registered without .remove callback, we need to check
for the presence of it before executing it from ffa_device_remove() to
above a NULL pointer dereference like the one below:

  | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
  | Mem abort info:
  |   ESR = 0x0000000086000004
  |   EC = 0x21: IABT (current EL), IL = 32 bits
  |   SET = 0, FnV = 0
  |   EA = 0, S1PTW = 0
  |   FSC = 0x04: level 0 translation fault
  | user pgtable: 4k pages, 48-bit VAs, pgdp=0000000881cc8000
  | [0000000000000000] pgd=0000000000000000, p4d=0000000000000000
  | Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP
  | CPU: 3 PID: 130 Comm: rmmod Not tainted 6.3.0-rc7 #6
  | Hardware name: FVP Base RevC (DT)
  | pstate: 63402809 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=-c)
  | pc : 0x0
  | lr : ffa_device_remove+0x20/0x2c
  | Call trace:
  |  0x0
  |  device_release_driver_internal+0x16c/0x260
  |  driver_detach+0x90/0xd0
  |  bus_remove_driver+0xdc/0x11c
  |  driver_unregister+0x30/0x54
  |  ffa_driver_unregister+0x14/0x20
  |  cleanup_module+0x18/0xeec
  |  __arm64_sys_delete_module+0x234/0x378
  |  invoke_syscall+0x40/0x108
  |  el0_svc_common+0xb4/0xf0
  |  do_el0_svc+0x30/0xa4
  |  el0_svc+0x2c/0x7c
  |  el0t_64_sync_handler+0x84/0xf0
  |  el0t_64_sync+0x190/0x194
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54058/">CVE-2023-54058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54058">CVE-2023-54058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256382">SUSE bug 1256382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54059</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54059" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54059" ref_url="https://www.suse.com/security/cve/CVE-2023-54059" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: mediatek: mtk-svs: Enable the IRQ later

If the system does not come from reset (like when is booted via
kexec()), the peripheral might triger an IRQ before the data structures
are initialised.


[    0.227710] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000f08
[    0.227913] Call trace:
[    0.227918]  svs_isr+0x8c/0x538
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54059/">CVE-2023-54059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54059">CVE-2023-54059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256378">SUSE bug 1256378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54060</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54060" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54060" ref_url="https://www.suse.com/security/cve/CVE-2023-54060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Set end correctly when doing batch carry

Even though the test suite covers this it somehow became obscured that
this wasn't working.

The test iommufd_ioas.mock_domain.access_domain_destory would blow up
rarely.

end should be set to 1 because this just pushed an item, the carry, to the
pfns list.

Sometimes the test would blow up with:

  BUG: kernel NULL pointer dereference, address: 0000000000000000
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] SMP
  CPU: 5 PID: 584 Comm: iommufd Not tainted 6.5.0-rc1-dirty #1236
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
  RIP: 0010:batch_unpin+0xa2/0x100 [iommufd]
  Code: 17 48 81 fe ff ff 07 00 77 70 48 8b 15 b7 be 97 e2 48 85 d2 74 14 48 8b 14 fa 48 85 d2 74 0b 40 0f b6 f6 48 c1 e6 04 48 01 f2 &lt;48&gt; 8b 3a 48 c1 e0 06 89 ca 48 89 de 48 83 e7 f0 48 01 c7 e8 96 dc
  RSP: 0018:ffffc90001677a58 EFLAGS: 00010246
  RAX: 00007f7e2646f000 RBX: 0000000000000000 RCX: 0000000000000001
  RDX: 0000000000000000 RSI: 00000000fefc4c8d RDI: 0000000000fefc4c
  RBP: ffffc90001677a80 R08: 0000000000000048 R09: 0000000000000200
  R10: 0000000000030b98 R11: ffffffff81f3bb40 R12: 0000000000000001
  R13: ffff888101f75800 R14: ffffc90001677ad0 R15: 00000000000001fe
  FS:  00007f9323679740(0000) GS:ffff8881ba540000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000000000000 CR3: 0000000105ede003 CR4: 00000000003706a0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
   &lt;TASK&gt;
   ? show_regs+0x5c/0x70
   ? __die+0x1f/0x60
   ? page_fault_oops+0x15d/0x440
   ? lock_release+0xbc/0x240
   ? exc_page_fault+0x4a4/0x970
   ? asm_exc_page_fault+0x27/0x30
   ? batch_unpin+0xa2/0x100 [iommufd]
   ? batch_unpin+0xba/0x100 [iommufd]
   __iopt_area_unfill_domain+0x198/0x430 [iommufd]
   ? __mutex_lock+0x8c/0xb80
   ? __mutex_lock+0x6aa/0xb80
   ? xa_erase+0x28/0x30
   ? iopt_table_remove_domain+0x162/0x320 [iommufd]
   ? lock_release+0xbc/0x240
   iopt_area_unfill_domain+0xd/0x10 [iommufd]
   iopt_table_remove_domain+0x195/0x320 [iommufd]
   iommufd_hw_pagetable_destroy+0xb3/0x110 [iommufd]
   iommufd_object_destroy_user+0x8e/0xf0 [iommufd]
   iommufd_device_detach+0xc5/0x140 [iommufd]
   iommufd_selftest_destroy+0x1f/0x70 [iommufd]
   iommufd_object_destroy_user+0x8e/0xf0 [iommufd]
   iommufd_destroy+0x3a/0x50 [iommufd]
   iommufd_fops_ioctl+0xfb/0x170 [iommufd]
   __x64_sys_ioctl+0x40d/0x9a0
   do_syscall_64+0x3c/0x80
   entry_SYSCALL_64_after_hwframe+0x46/0xb0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54060/">CVE-2023-54060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54060">CVE-2023-54060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256379">SUSE bug 1256379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54061</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54061" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54061" ref_url="https://www.suse.com/security/cve/CVE-2023-54061" source="SUSE CVE"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-30"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54061/">CVE-2023-54061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54061">CVE-2023-54061 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254612">SUSE bug 1254612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54062</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54062" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54062" ref_url="https://www.suse.com/security/cve/CVE-2023-54062" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix invalid free tracking in ext4_xattr_move_to_block()

In ext4_xattr_move_to_block(), the value of the extended attribute
which we need to move to an external block may be allocated by
kvmalloc() if the value is stored in an external inode.  So at the end
of the function the code tried to check if this was the case by
testing entry-&gt;e_value_inum.

However, at this point, the pointer to the xattr entry is no longer
valid, because it was removed from the original location where it had
been stored.  So we could end up calling kvfree() on a pointer which
was not allocated by kvmalloc(); or we could also potentially leak
memory by not freeing the buffer when it should be freed.  Fix this by
storing whether it should be freed in a separate variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54062/">CVE-2023-54062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54062">CVE-2023-54062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256289">SUSE bug 1256289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54063</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54063" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54063" ref_url="https://www.suse.com/security/cve/CVE-2023-54063" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fix OOB read in indx_insert_into_buffer

Syzbot reported a OOB read bug:

BUG: KASAN: slab-out-of-bounds in indx_insert_into_buffer+0xaa3/0x13b0
fs/ntfs3/index.c:1755
Read of size 17168 at addr ffff8880255e06c0 by task syz-executor308/3630

Call Trace:
 &lt;TASK&gt;
 memmove+0x25/0x60 mm/kasan/shadow.c:54
 indx_insert_into_buffer+0xaa3/0x13b0 fs/ntfs3/index.c:1755
 indx_insert_entry+0x446/0x6b0 fs/ntfs3/index.c:1863
 ntfs_create_inode+0x1d3f/0x35c0 fs/ntfs3/inode.c:1548
 ntfs_create+0x3e/0x60 fs/ntfs3/namei.c:100
 lookup_open fs/namei.c:3413 [inline]

If the member struct INDEX_BUFFER *index of struct indx_node is
incorrect, that is, the value of __le32 used is greater than the value
of __le32 total in struct INDEX_HDR. Therefore, OOB read occurs when
memmove is called in indx_insert_into_buffer().
Fix this by adding a check in hdr_find_e().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54063/">CVE-2023-54063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54063">CVE-2023-54063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256374">SUSE bug 1256374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54064</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54064" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54064" ref_url="https://www.suse.com/security/cve/CVE-2023-54064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipmi:ssif: Fix a memory leak when scanning for an adapter

The adapter scan ssif_info_find() sets info-&gt;adapter_name if the adapter
info came from SMBIOS, as it's not set in that case.  However, this
function can be called more than once, and it will leak the adapter name
if it had already been set.  So check for NULL before setting it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54064/">CVE-2023-54064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54064">CVE-2023-54064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256375">SUSE bug 1256375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54065</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54065" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54065" ref_url="https://www.suse.com/security/cve/CVE-2023-54065" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: realtek: fix out-of-bounds access

The probe function sets priv-&gt;chip_data to (void *)priv + sizeof(*priv)
with the expectation that priv has enough trailing space.

However, only realtek-smi actually allocated this chip_data space.
Do likewise in realtek-mdio to fix out-of-bounds accesses.

These accesses likely went unnoticed so far, because of an (unused)
buf[4096] member in struct realtek_priv, which caused kmalloc to
round up the allocated buffer to a big enough size, so nothing of
value was overwritten. With a different allocator (like in the barebox
bootloader port of the driver) or with KASAN, the memory corruption
becomes quickly apparent.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54065/">CVE-2023-54065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54065">CVE-2023-54065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256372">SUSE bug 1256372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54066</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54066" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54066" ref_url="https://www.suse.com/security/cve/CVE-2023-54066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-usb-v2: gl861: Fix null-ptr-deref in gl861_i2c_master_xfer

In gl861_i2c_master_xfer, msg is controlled by user. When msg[i].buf
is null and msg[i].len is zero, former checks on msg[i].buf would be
passed. Malicious data finally reach gl861_i2c_master_xfer. If accessing
msg[i].buf[0] without sanity check, null ptr deref would happen.
We add check on msg[i].len to prevent crash.

Similar commit:
commit 0ed554fd769a
("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()")
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54066/">CVE-2023-54066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54066">CVE-2023-54066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256373">SUSE bug 1256373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54067</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54067" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54067" ref_url="https://www.suse.com/security/cve/CVE-2023-54067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix race when deleting free space root from the dirty cow roots list

When deleting the free space tree we are deleting the free space root
from the list fs_info-&gt;dirty_cowonly_roots without taking the lock that
protects it, which is struct btrfs_fs_info::trans_lock.
This unsynchronized list manipulation may cause chaos if there's another
concurrent manipulation of this list, such as when adding a root to it
with ctree.c:add_root_to_dirty_list().

This can result in all sorts of weird failures caused by a race, such as
the following crash:

  [337571.278245] general protection fault, probably for non-canonical address 0xdead000000000108: 0000 [#1] PREEMPT SMP PTI
  [337571.278933] CPU: 1 PID: 115447 Comm: btrfs Tainted: G        W          6.4.0-rc6-btrfs-next-134+ #1
  [337571.279153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
  [337571.279572] RIP: 0010:commit_cowonly_roots+0x11f/0x250 [btrfs]
  [337571.279928] Code: 85 38 06 00 (...)
  [337571.280363] RSP: 0018:ffff9f63446efba0 EFLAGS: 00010206
  [337571.280582] RAX: ffff942d98ec2638 RBX: ffff9430b82b4c30 RCX: 0000000449e1c000
  [337571.280798] RDX: dead000000000100 RSI: ffff9430021e4900 RDI: 0000000000036070
  [337571.281015] RBP: ffff942d98ec2000 R08: ffff942d98ec2000 R09: 000000000000015b
  [337571.281254] R10: 0000000000000009 R11: 0000000000000001 R12: ffff942fe8fbf600
  [337571.281476] R13: ffff942dabe23040 R14: ffff942dabe20800 R15: ffff942d92cf3b48
  [337571.281723] FS:  00007f478adb7340(0000) GS:ffff94349fa40000(0000) knlGS:0000000000000000
  [337571.281950] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [337571.282184] CR2: 00007f478ab9a3d5 CR3: 000000001e02c001 CR4: 0000000000370ee0
  [337571.282416] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  [337571.282647] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  [337571.282874] Call Trace:
  [337571.283101]  &lt;TASK&gt;
  [337571.283327]  ? __die_body+0x1b/0x60
  [337571.283570]  ? die_addr+0x39/0x60
  [337571.283796]  ? exc_general_protection+0x22e/0x430
  [337571.284022]  ? asm_exc_general_protection+0x22/0x30
  [337571.284251]  ? commit_cowonly_roots+0x11f/0x250 [btrfs]
  [337571.284531]  btrfs_commit_transaction+0x42e/0xf90 [btrfs]
  [337571.284803]  ? _raw_spin_unlock+0x15/0x30
  [337571.285031]  ? release_extent_buffer+0x103/0x130 [btrfs]
  [337571.285305]  reset_balance_state+0x152/0x1b0 [btrfs]
  [337571.285578]  btrfs_balance+0xa50/0x11e0 [btrfs]
  [337571.285864]  ? __kmem_cache_alloc_node+0x14a/0x410
  [337571.286086]  btrfs_ioctl+0x249a/0x3320 [btrfs]
  [337571.286358]  ? mod_objcg_state+0xd2/0x360
  [337571.286577]  ? refill_obj_stock+0xb0/0x160
  [337571.286798]  ? seq_release+0x25/0x30
  [337571.287016]  ? __rseq_handle_notify_resume+0x3ba/0x4b0
  [337571.287235]  ? percpu_counter_add_batch+0x2e/0xa0
  [337571.287455]  ? __x64_sys_ioctl+0x88/0xc0
  [337571.287675]  __x64_sys_ioctl+0x88/0xc0
  [337571.287901]  do_syscall_64+0x38/0x90
  [337571.288126]  entry_SYSCALL_64_after_hwframe+0x72/0xdc
  [337571.288352] RIP: 0033:0x7f478aaffe9b

So fix this by locking struct btrfs_fs_info::trans_lock before deleting
the free space root from that list.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54067/">CVE-2023-54067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54067">CVE-2023-54067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256369">SUSE bug 1256369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54068</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54068" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54068" ref_url="https://www.suse.com/security/cve/CVE-2023-54068" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: compress: fix to call f2fs_wait_on_page_writeback() in f2fs_write_raw_pages()

BUG_ON() will be triggered when writing files concurrently,
because the same page is writtenback multiple times.

1597 void folio_end_writeback(struct folio *folio)
1598 {
		......
1618     if (!__folio_end_writeback(folio))
1619         BUG();
		......
1625 }

kernel BUG at mm/filemap.c:1619!
Call Trace:
 &lt;TASK&gt;
 f2fs_write_end_io+0x1a0/0x370
 blk_update_request+0x6c/0x410
 blk_mq_end_request+0x15/0x130
 blk_complete_reqs+0x3c/0x50
 __do_softirq+0xb8/0x29b
 ? sort_range+0x20/0x20
 run_ksoftirqd+0x19/0x20
 smpboot_thread_fn+0x10b/0x1d0
 kthread+0xde/0x110
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x22/0x30
 &lt;/TASK&gt;

Below is the concurrency scenario:

[Process A]		[Process B]		[Process C]
f2fs_write_raw_pages()
  - redirty_page_for_writepage()
  - unlock page()
			f2fs_do_write_data_page()
			  - lock_page()
			  - clear_page_dirty_for_io()
			  - set_page_writeback() [1st writeback]
			    .....
			    - unlock page()

						generic_perform_write()
						  - f2fs_write_begin()
						    - wait_for_stable_page()

						  - f2fs_write_end()
						    - set_page_dirty()

  - lock_page()
    - f2fs_do_write_data_page()
      - set_page_writeback() [2st writeback]

This problem was introduced by the previous commit 7377e853967b ("f2fs:
compress: fix potential deadlock of compress file"). All pagelocks were
released in f2fs_write_raw_pages(), but whether the page was
in the writeback state was ignored in the subsequent writing process.
Let's fix it by waiting for the page to writeback before writing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54068/">CVE-2023-54068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54068">CVE-2023-54068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256290">SUSE bug 1256290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54069</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54069" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54069" ref_url="https://www.suse.com/security/cve/CVE-2023-54069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix BUG in ext4_mb_new_inode_pa() due to overflow

When we calculate the end position of ext4_free_extent, this position may
be exactly where ext4_lblk_t (i.e. uint) overflows. For example, if
ac_g_ex.fe_logical is 4294965248 and ac_orig_goal_len is 2048, then the
computed end is 0x100000000, which is 0. If ac-&gt;ac_o_ex.fe_logical is not
the first case of adjusting the best extent, that is, new_bex_end &gt; 0, the
following BUG_ON will be triggered:

=========================================================
kernel BUG at fs/ext4/mballoc.c:5116!
invalid opcode: 0000 [#1] PREEMPT SMP PTI
CPU: 3 PID: 673 Comm: xfs_io Tainted: G E 6.5.0-rc1+ #279
RIP: 0010:ext4_mb_new_inode_pa+0xc5/0x430
Call Trace:
 &lt;TASK&gt;
 ext4_mb_use_best_found+0x203/0x2f0
 ext4_mb_try_best_found+0x163/0x240
 ext4_mb_regular_allocator+0x158/0x1550
 ext4_mb_new_blocks+0x86a/0xe10
 ext4_ext_map_blocks+0xb0c/0x13a0
 ext4_map_blocks+0x2cd/0x8f0
 ext4_iomap_begin+0x27b/0x400
 iomap_iter+0x222/0x3d0
 __iomap_dio_rw+0x243/0xcb0
 iomap_dio_rw+0x16/0x80
=========================================================

A simple reproducer demonstrating the problem:

	mkfs.ext4 -F /dev/sda -b 4096 100M
	mount /dev/sda /tmp/test
	fallocate -l1M /tmp/test/tmp
	fallocate -l10M /tmp/test/file
	fallocate -i -o 1M -l16777203M /tmp/test/file
	fsstress -d /tmp/test -l 0 -n 100000 -p 8 &amp;
	sleep 10 &amp;&amp; killall -9 fsstress
	rm -f /tmp/test/tmp
	xfs_io -c "open -ad /tmp/test/file" -c "pwrite -S 0xff 0 8192"

We simply refactor the logic for adjusting the best extent by adding
a temporary ext4_free_extent ex and use extent_logical_end() to avoid
overflow, which also simplifies the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54069/">CVE-2023-54069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54069">CVE-2023-54069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256371">SUSE bug 1256371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54070</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54070" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54070" ref_url="https://www.suse.com/security/cve/CVE-2023-54070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igb: clean up in all error paths when enabling SR-IOV

After commit 50f303496d92 ("igb: Enable SR-IOV after reinit"), removing
the igb module could hang or crash (depending on the machine) when the
module has been loaded with the max_vfs parameter set to some value != 0.

In case of one test machine with a dual port 82580, this hang occurred:

[  232.480687] igb 0000:41:00.1: removed PHC on enp65s0f1
[  233.093257] igb 0000:41:00.1: IOV Disabled
[  233.329969] pcieport 0000:40:01.0: AER: Multiple Uncorrected (Non-Fatal) err0
[  233.340302] igb 0000:41:00.0: PCIe Bus Error: severity=Uncorrected (Non-Fata)
[  233.352248] igb 0000:41:00.0:   device [8086:1516] error status/mask=00100000
[  233.361088] igb 0000:41:00.0:    [20] UnsupReq               (First)
[  233.368183] igb 0000:41:00.0: AER:   TLP Header: 40000001 0000040f cdbfc00c c
[  233.376846] igb 0000:41:00.1: PCIe Bus Error: severity=Uncorrected (Non-Fata)
[  233.388779] igb 0000:41:00.1:   device [8086:1516] error status/mask=00100000
[  233.397629] igb 0000:41:00.1:    [20] UnsupReq               (First)
[  233.404736] igb 0000:41:00.1: AER:   TLP Header: 40000001 0000040f cdbfc00c c
[  233.538214] pci 0000:41:00.1: AER: can't recover (no error_detected callback)
[  233.538401] igb 0000:41:00.0: removed PHC on enp65s0f0
[  233.546197] pcieport 0000:40:01.0: AER: device recovery failed
[  234.157244] igb 0000:41:00.0: IOV Disabled
[  371.619705] INFO: task irq/35-aerdrv:257 blocked for more than 122 seconds.
[  371.627489]       Not tainted 6.4.0-dirty #2
[  371.632257] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this.
[  371.641000] task:irq/35-aerdrv   state:D stack:0     pid:257   ppid:2      f0
[  371.650330] Call Trace:
[  371.653061]  &lt;TASK&gt;
[  371.655407]  __schedule+0x20e/0x660
[  371.659313]  schedule+0x5a/0xd0
[  371.662824]  schedule_preempt_disabled+0x11/0x20
[  371.667983]  __mutex_lock.constprop.0+0x372/0x6c0
[  371.673237]  ? __pfx_aer_root_reset+0x10/0x10
[  371.678105]  report_error_detected+0x25/0x1c0
[  371.682974]  ? __pfx_report_normal_detected+0x10/0x10
[  371.688618]  pci_walk_bus+0x72/0x90
[  371.692519]  pcie_do_recovery+0xb2/0x330
[  371.696899]  aer_process_err_devices+0x117/0x170
[  371.702055]  aer_isr+0x1c0/0x1e0
[  371.705661]  ? __set_cpus_allowed_ptr+0x54/0xa0
[  371.710723]  ? __pfx_irq_thread_fn+0x10/0x10
[  371.715496]  irq_thread_fn+0x20/0x60
[  371.719491]  irq_thread+0xe6/0x1b0
[  371.723291]  ? __pfx_irq_thread_dtor+0x10/0x10
[  371.728255]  ? __pfx_irq_thread+0x10/0x10
[  371.732731]  kthread+0xe2/0x110
[  371.736243]  ? __pfx_kthread+0x10/0x10
[  371.740430]  ret_from_fork+0x2c/0x50
[  371.744428]  &lt;/TASK&gt;

The reproducer was a simple script:

  #!/bin/sh
  for i in `seq 1 5`; do
    modprobe -rv igb
    modprobe -v igb max_vfs=1
    sleep 1
    modprobe -rv igb
  done

It turned out that this could only be reproduce on 82580 (quad and
dual-port), but not on 82576, i350 and i210.  Further debugging showed
that igb_enable_sriov()'s call to pci_enable_sriov() is failing, because
dev-&gt;is_physfn is 0 on 82580.

Prior to commit 50f303496d92 ("igb: Enable SR-IOV after reinit"),
igb_enable_sriov() jumped into the "err_out" cleanup branch.  After this
commit it only returned the error code.

So the cleanup didn't take place, and the incorrect VF setup in the
igb_adapter structure fooled the igb driver into assuming that VFs have
been set up where no VF actually existed.

Fix this problem by cleaning up again if pci_enable_sriov() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54070/">CVE-2023-54070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54070">CVE-2023-54070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256364">SUSE bug 1256364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54071</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54071" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54071" ref_url="https://www.suse.com/security/cve/CVE-2023-54071" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: use work to update rate to avoid RCU warning

The ieee80211_ops::sta_rc_update must be atomic, because
ieee80211_chan_bw_change() holds rcu_read lock while calling
drv_sta_rc_update(), so create a work to do original things.

 Voluntary context switch within RCU read-side critical section!
 WARNING: CPU: 0 PID: 4621 at kernel/rcu/tree_plugin.h:318
 rcu_note_context_switch+0x571/0x5d0
 CPU: 0 PID: 4621 Comm: kworker/u16:2 Tainted: G        W  OE
 Workqueue: phy3 ieee80211_chswitch_work [mac80211]
 RIP: 0010:rcu_note_context_switch+0x571/0x5d0
 Call Trace:
  &lt;TASK&gt;
  __schedule+0xb0/0x1460
  ? __mod_timer+0x116/0x360
  schedule+0x5a/0xc0
  schedule_timeout+0x87/0x150
  ? trace_raw_output_tick_stop+0x60/0x60
  wait_for_completion_timeout+0x7b/0x140
  usb_start_wait_urb+0x82/0x160 [usbcore
  usb_control_msg+0xe3/0x140 [usbcore
  rtw_usb_read+0x88/0xe0 [rtw_usb
  rtw_usb_read8+0xf/0x10 [rtw_usb
  rtw_fw_send_h2c_command+0xa0/0x170 [rtw_core
  rtw_fw_send_ra_info+0xc9/0xf0 [rtw_core
  drv_sta_rc_update+0x7c/0x160 [mac80211
  ieee80211_chan_bw_change+0xfb/0x110 [mac80211
  ieee80211_change_chanctx+0x38/0x130 [mac80211
  ieee80211_vif_use_reserved_switch+0x34e/0x900 [mac80211
  ieee80211_link_use_reserved_context+0x88/0xe0 [mac80211
  ieee80211_chswitch_work+0x95/0x170 [mac80211
  process_one_work+0x201/0x410
  worker_thread+0x4a/0x3b0
  ? process_one_work+0x410/0x410
  kthread+0xe1/0x110
  ? kthread_complete_and_exit+0x20/0x20
  ret_from_fork+0x1f/0x30
  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54071/">CVE-2023-54071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54071">CVE-2023-54071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256365">SUSE bug 1256365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54072</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54072" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54072" ref_url="https://www.suse.com/security/cve/CVE-2023-54072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: Fix potential data race at PCM memory allocation helpers

The PCM memory allocation helpers have a sanity check against too many
buffer allocations.  However, the check is performed without a proper
lock and the allocation isn't serialized; this allows user to allocate
more memories than predefined max size.

Practically seen, this isn't really a big problem, as it's more or
less some "soft limit" as a sanity check, and it's not possible to
allocate unlimitedly.  But it's still better to address this for more
consistent behavior.

The patch covers the size check in do_alloc_pages() with the
card-&gt;memory_mutex, and increases the allocated size there for
preventing the further overflow.  When the actual allocation fails,
the size is decreased accordingly.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54072/">CVE-2023-54072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54072">CVE-2023-54072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256291">SUSE bug 1256291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54073</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54073" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54073" ref_url="https://www.suse.com/security/cve/CVE-2023-54073" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: Add !tpm_amd_is_rng_defective() to the hwrng_unregister() call site

The following crash was reported:

[ 1950.279393] list_del corruption, ffff99560d485790-&gt;next is NULL
[ 1950.279400] ------------[ cut here ]------------
[ 1950.279401] kernel BUG at lib/list_debug.c:49!
[ 1950.279405] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[ 1950.279407] CPU: 11 PID: 5886 Comm: modprobe Tainted: G O 6.2.8_1 #1
[ 1950.279409] Hardware name: Gigabyte Technology Co., Ltd. B550M AORUS PRO-P/B550M AORUS PRO-P,
BIOS F15c 05/11/2022
[ 1950.279410] RIP: 0010:__list_del_entry_valid+0x59/0xc0
[ 1950.279415] Code: 48 8b 01 48 39 f8 75 5a 48 8b 72 08 48 39 c6 75 65 b8 01 00 00 00 c3 cc cc cc
cc 48 89 fe 48 c7 c7 08 a8 13 9e e8 b7 0a bc ff &lt;0f&gt; 0b 48 89 fe 48 c7 c7 38 a8 13 9e e8 a6 0a bc
ff 0f 0b 48 89 fe
[ 1950.279416] RSP: 0018:ffffa96d05647e08 EFLAGS: 00010246
[ 1950.279418] RAX: 0000000000000033 RBX: ffff99560d485750 RCX: 0000000000000000
[ 1950.279419] RDX: 0000000000000000 RSI: ffffffff9e107c59 RDI: 00000000ffffffff
[ 1950.279420] RBP: ffffffffc19c5168 R08: 0000000000000000 R09: ffffa96d05647cc8
[ 1950.279421] R10: 0000000000000003 R11: ffffffff9ea2a568 R12: 0000000000000000
[ 1950.279422] R13: ffff99560140a2e0 R14: ffff99560127d2e0 R15: 0000000000000000
[ 1950.279422] FS: 00007f67da795380(0000) GS:ffff995d1f0c0000(0000) knlGS:0000000000000000
[ 1950.279424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1950.279424] CR2: 00007f67da7e65c0 CR3: 00000001feed2000 CR4: 0000000000750ee0
[ 1950.279426] PKRU: 55555554
[ 1950.279426] Call Trace:
[ 1950.279428] &lt;TASK&gt;
[ 1950.279430] hwrng_unregister+0x28/0xe0 [rng_core]
[ 1950.279436] tpm_chip_unregister+0xd5/0xf0 [tpm]

Add the forgotten !tpm_amd_is_rng_defective() invariant to the
hwrng_unregister() call site inside tpm_chip_unregister().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54073/">CVE-2023-54073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54073">CVE-2023-54073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256362">SUSE bug 1256362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54074</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54074" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54074" ref_url="https://www.suse.com/security/cve/CVE-2023-54074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Use correct encap attribute during invalidation

With introduction of post action infrastructure most of the users of encap
attribute had been modified in order to obtain the correct attribute by
calling mlx5e_tc_get_encap_attr() helper instead of assuming encap action
is always on default attribute. However, the cited commit didn't modify
mlx5e_invalidate_encap() which prevents it from destroying correct modify
header action which leads to a warning [0]. Fix the issue by using correct
attribute.

[0]:

Feb 21 09:47:35 c-237-177-40-045 kernel: WARNING: CPU: 17 PID: 654 at drivers/net/ethernet/mellanox/mlx5/core/en_tc.c:684 mlx5e_tc_attach_mod_hdr+0x1cc/0x230 [mlx5_core]
Feb 21 09:47:35 c-237-177-40-045 kernel: RIP: 0010:mlx5e_tc_attach_mod_hdr+0x1cc/0x230 [mlx5_core]
Feb 21 09:47:35 c-237-177-40-045 kernel: Call Trace:
Feb 21 09:47:35 c-237-177-40-045 kernel:  &lt;TASK&gt;
Feb 21 09:47:35 c-237-177-40-045 kernel:  mlx5e_tc_fib_event_work+0x8e3/0x1f60 [mlx5_core]
Feb 21 09:47:35 c-237-177-40-045 kernel:  ? mlx5e_take_all_encap_flows+0xe0/0xe0 [mlx5_core]
Feb 21 09:47:35 c-237-177-40-045 kernel:  ? lock_downgrade+0x6d0/0x6d0
Feb 21 09:47:35 c-237-177-40-045 kernel:  ? lockdep_hardirqs_on_prepare+0x273/0x3f0
Feb 21 09:47:35 c-237-177-40-045 kernel:  ? lockdep_hardirqs_on_prepare+0x273/0x3f0
Feb 21 09:47:35 c-237-177-40-045 kernel:  process_one_work+0x7c2/0x1310
Feb 21 09:47:35 c-237-177-40-045 kernel:  ? lockdep_hardirqs_on_prepare+0x3f0/0x3f0
Feb 21 09:47:35 c-237-177-40-045 kernel:  ? pwq_dec_nr_in_flight+0x230/0x230
Feb 21 09:47:35 c-237-177-40-045 kernel:  ? rwlock_bug.part.0+0x90/0x90
Feb 21 09:47:35 c-237-177-40-045 kernel:  worker_thread+0x59d/0xec0
Feb 21 09:47:35 c-237-177-40-045 kernel:  ? __kthread_parkme+0xd9/0x1d0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54074/">CVE-2023-54074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54074">CVE-2023-54074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256363">SUSE bug 1256363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54075</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54075" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54075" ref_url="https://www.suse.com/security/cve/CVE-2023-54075" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: mediatek: common: Fix refcount leak in parse_dai_link_info

Add missing of_node_put()s before the returns to balance
of_node_get()s and of_node_put()s, which may get unbalanced
in case the for loop 'for_each_available_child_of_node' returns
early.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54075/">CVE-2023-54075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54075">CVE-2023-54075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256360">SUSE bug 1256360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54076</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54076" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54076" ref_url="https://www.suse.com/security/cve/CVE-2023-54076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix missed ses refcounting

Use new cifs_smb_ses_inc_refcount() helper to get an active reference
of @ses and @ses-&gt;dfs_root_ses (if set).  This will prevent
@ses-&gt;dfs_root_ses of being put in the next call to cifs_put_smb_ses()
and thus potentially causing an use-after-free bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54076/">CVE-2023-54076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54076">CVE-2023-54076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256335">SUSE bug 1256335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256450">SUSE bug 1256450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54077</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54077" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54077" ref_url="https://www.suse.com/security/cve/CVE-2023-54077" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fix memory leak if ntfs_read_mft failed

Label ATTR_ROOT in ntfs_read_mft() sets is_root = true and
ni-&gt;ni_flags |= NI_FLAG_DIR, then next attr will goto label ATTR_ALLOC
and alloc ni-&gt;dir.alloc_run. However two states are not always
consistent and can make memory leak.

 1) attr_name in ATTR_ROOT does not fit the condition it will set
 is_root = true but NI_FLAG_DIR is not set.
 2) next attr_name in ATTR_ALLOC fits the condition and alloc
 ni-&gt;dir.alloc_run
 3) in cleanup function ni_clear(), when NI_FLAG_DIR is set, it frees
 ni-&gt;dir.alloc_run, otherwise it frees ni-&gt;file.run
 4) because NI_FLAG_DIR is not set in this case, ni-&gt;dir.alloc_run is
 leaked as kmemleak reported:

unreferenced object 0xffff888003bc5480 (size 64):
  backtrace:
    [&lt;000000003d42e6b0&gt;] __kmalloc_node+0x4e/0x1c0
    [&lt;00000000d8e19b8a&gt;] kvmalloc_node+0x39/0x1f0
    [&lt;00000000fc3eb5b8&gt;] run_add_entry+0x18a/0xa40 [ntfs3]
    [&lt;0000000011c9f978&gt;] run_unpack+0x75d/0x8e0 [ntfs3]
    [&lt;00000000e7cf1819&gt;] run_unpack_ex+0xbc/0x500 [ntfs3]
    [&lt;00000000bbf0a43d&gt;] ntfs_iget5+0xb25/0x2dd0 [ntfs3]
    [&lt;00000000a6e50693&gt;] ntfs_fill_super+0x218d/0x3580 [ntfs3]
    [&lt;00000000b9170608&gt;] get_tree_bdev+0x3fb/0x710
    [&lt;000000004833798a&gt;] vfs_get_tree+0x8e/0x280
    [&lt;000000006e20b8e6&gt;] path_mount+0xf3c/0x1930
    [&lt;000000007bf15a5f&gt;] do_mount+0xf3/0x110
    ...

Fix this by always setting is_root and NI_FLAG_DIR together.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54077/">CVE-2023-54077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54077">CVE-2023-54077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256336">SUSE bug 1256336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54078</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54078" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54078" ref_url="https://www.suse.com/security/cve/CVE-2023-54078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: max9286: Free control handler

The control handler is leaked in some probe-time error paths, as well as
in the remove path. Fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54078/">CVE-2023-54078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54078">CVE-2023-54078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256337">SUSE bug 1256337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54079</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54079" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54079" ref_url="https://www.suse.com/security/cve/CVE-2023-54079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

power: supply: bq27xxx: Fix poll_interval handling and races on remove

Before this patch bq27xxx_battery_teardown() was setting poll_interval = 0
to avoid bq27xxx_battery_update() requeuing the delayed_work item.

There are 2 problems with this:

1. If the driver is unbound through sysfs, rather then the module being
   rmmod-ed, this changes poll_interval unexpectedly

2. This is racy, after it being set poll_interval could be changed
   before bq27xxx_battery_update() checks it through
   /sys/module/bq27xxx_battery/parameters/poll_interval

Fix this by added a removed attribute to struct bq27xxx_device_info and
using that instead of setting poll_interval to 0.

There also is another poll_interval related race on remove(), writing
/sys/module/bq27xxx_battery/parameters/poll_interval will requeue
the delayed_work item for all devices on the bq27xxx_battery_devices
list and the device being removed was only removed from that list
after cancelling the delayed_work item.

Fix this by moving the removal from the bq27xxx_battery_devices list
to before cancelling the delayed_work item.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54079/">CVE-2023-54079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54079">CVE-2023-54079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256338">SUSE bug 1256338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54080</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54080" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54080" ref_url="https://www.suse.com/security/cve/CVE-2023-54080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: zoned: skip splitting and logical rewriting on pre-alloc write

When doing a relocation, there is a chance that at the time of
btrfs_reloc_clone_csums(), there is no checksum for the corresponding
region.

In this case, btrfs_finish_ordered_zoned()'s sum points to an invalid item
and so ordered_extent's logical is set to some invalid value. Then,
btrfs_lookup_block_group() in btrfs_zone_finish_endio() failed to find a
block group and will hit an assert or a null pointer dereference as
following.

This can be reprodcued by running btrfs/028 several times (e.g, 4 to 16
times) with a null_blk setup. The device's zone size and capacity is set to
32 MB and the storage size is set to 5 GB on my setup.

    KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]
    CPU: 6 PID: 3105720 Comm: kworker/u16:13 Tainted: G        W          6.5.0-rc6-kts+ #1
    Hardware name: Supermicro Super Server/X10SRL-F, BIOS 2.0 12/17/2015
    Workqueue: btrfs-endio-write btrfs_work_helper [btrfs]
    RIP: 0010:btrfs_zone_finish_endio.part.0+0x34/0x160 [btrfs]
    Code: 41 54 49 89 fc 55 48 89 f5 53 e8 57 7d fc ff 48 8d b8 88 00 00 00 48 89 c3 48 b8 00 00 00 00 00
    &gt; 3c 02 00 0f 85 02 01 00 00 f6 83 88 00 00 00 01 0f 84 a8 00 00
    RSP: 0018:ffff88833cf87b08 EFLAGS: 00010206
    RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000
    RDX: 0000000000000011 RSI: 0000000000000004 RDI: 0000000000000088
    RBP: 0000000000000002 R08: 0000000000000001 R09: ffffed102877b827
    R10: ffff888143bdc13b R11: ffff888125b1cbc0 R12: ffff888143bdc000
    R13: 0000000000007000 R14: ffff888125b1cba8 R15: 0000000000000000
    FS:  0000000000000000(0000) GS:ffff88881e500000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 00007f3ed85223d5 CR3: 00000001519b4005 CR4: 00000000001706e0
    Call Trace:
     &lt;TASK&gt;
     ? die_addr+0x3c/0xa0
     ? exc_general_protection+0x148/0x220
     ? asm_exc_general_protection+0x22/0x30
     ? btrfs_zone_finish_endio.part.0+0x34/0x160 [btrfs]
     ? btrfs_zone_finish_endio.part.0+0x19/0x160 [btrfs]
     btrfs_finish_one_ordered+0x7b8/0x1de0 [btrfs]
     ? rcu_is_watching+0x11/0xb0
     ? lock_release+0x47a/0x620
     ? btrfs_finish_ordered_zoned+0x59b/0x800 [btrfs]
     ? __pfx_btrfs_finish_one_ordered+0x10/0x10 [btrfs]
     ? btrfs_finish_ordered_zoned+0x358/0x800 [btrfs]
     ? __smp_call_single_queue+0x124/0x350
     ? rcu_is_watching+0x11/0xb0
     btrfs_work_helper+0x19f/0xc60 [btrfs]
     ? __pfx_try_to_wake_up+0x10/0x10
     ? _raw_spin_unlock_irq+0x24/0x50
     ? rcu_is_watching+0x11/0xb0
     process_one_work+0x8c1/0x1430
     ? __pfx_lock_acquire+0x10/0x10
     ? __pfx_process_one_work+0x10/0x10
     ? __pfx_do_raw_spin_lock+0x10/0x10
     ? _raw_spin_lock_irq+0x52/0x60
     worker_thread+0x100/0x12c0
     ? __kthread_parkme+0xc1/0x1f0
     ? __pfx_worker_thread+0x10/0x10
     kthread+0x2ea/0x3c0
     ? __pfx_kthread+0x10/0x10
     ret_from_fork+0x30/0x70
     ? __pfx_kthread+0x10/0x10
     ret_from_fork_asm+0x1b/0x30
     &lt;/TASK&gt;

On the zoned mode, writing to pre-allocated region means data relocation
write. Such write always uses WRITE command so there is no need of splitting
and rewriting logical address. Thus, we can just skip the function for the
case.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54080/">CVE-2023-54080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54080">CVE-2023-54080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256367">SUSE bug 1256367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54081</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54081" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54081" ref_url="https://www.suse.com/security/cve/CVE-2023-54081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen: speed up grant-table reclaim

When a grant entry is still in use by the remote domain, Linux must put
it on a deferred list.  Normally, this list is very short, because
the PV network and block protocols expect the backend to unmap the grant
first.  However, Qubes OS's GUI protocol is subject to the constraints
of the X Window System, and as such winds up with the frontend unmapping
the window first.  As a result, the list can grow very large, resulting
in a massive memory leak and eventual VM freeze.

To partially solve this problem, make the number of entries that the VM
will attempt to free at each iteration tunable.  The default is still
10, but it can be overridden via a module parameter.

This is Cc: stable because (when combined with appropriate userspace
changes) it fixes a severe performance and stability problem for Qubes
OS users.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-11"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54081/">CVE-2023-54081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54081">CVE-2023-54081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256361">SUSE bug 1256361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54083</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54083" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54083" ref_url="https://www.suse.com/security/cve/CVE-2023-54083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: tegra: xusb: Clear the driver reference in usb-phy dev

For the dual-role port, it will assign the phy dev to usb-phy dev and
use the port dev driver as the dev driver of usb-phy.

When we try to destroy the port dev, it will destroy its dev driver
as well. But we did not remove the reference from usb-phy dev. This
might cause the use-after-free issue in KASAN.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54083/">CVE-2023-54083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54083">CVE-2023-54083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256368">SUSE bug 1256368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54084</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54084" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54084" ref_url="https://www.suse.com/security/cve/CVE-2023-54084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: firewire-digi00x: prevent potential use after free

This code was supposed to return an error code if init_stream()
failed, but it instead freed dg00x-&gt;rx_stream and returned success.
This potentially leads to a use after free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54084/">CVE-2023-54084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54084">CVE-2023-54084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256223">SUSE bug 1256223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256225">SUSE bug 1256225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54085</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54085" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54085" ref_url="https://www.suse.com/security/cve/CVE-2023-54085" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix NULL pointer dereference on fastopen early fallback

In case of early fallback to TCP, subflow_syn_recv_sock() deletes
the subflow context before returning the newly allocated sock to
the caller.

The fastopen path does not cope with the above unconditionally
dereferencing the subflow context.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54085/">CVE-2023-54085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54085">CVE-2023-54085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256222">SUSE bug 1256222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54086</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54086" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54086" ref_url="https://www.suse.com/security/cve/CVE-2023-54086" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Add preempt_count_{sub,add} into btf id deny list

The recursion check in __bpf_prog_enter* and __bpf_prog_exit*
leave preempt_count_{sub,add} unprotected. When attaching trampoline to
them we get panic as follows,

[  867.843050] BUG: TASK stack guard page was hit at 0000000009d325cf (stack is 0000000046a46a15..00000000537e7b28)
[  867.843064] stack guard page: 0000 [#1] PREEMPT SMP NOPTI
[  867.843067] CPU: 8 PID: 11009 Comm: trace Kdump: loaded Not tainted 6.2.0+ #4
[  867.843100] Call Trace:
[  867.843101]  &lt;TASK&gt;
[  867.843104]  asm_exc_int3+0x3a/0x40
[  867.843108] RIP: 0010:preempt_count_sub+0x1/0xa0
[  867.843135]  __bpf_prog_enter_recur+0x17/0x90
[  867.843148]  bpf_trampoline_6442468108_0+0x2e/0x1000
[  867.843154]  ? preempt_count_sub+0x1/0xa0
[  867.843157]  preempt_count_sub+0x5/0xa0
[  867.843159]  ? migrate_enable+0xac/0xf0
[  867.843164]  __bpf_prog_exit_recur+0x2d/0x40
[  867.843168]  bpf_trampoline_6442468108_0+0x55/0x1000
...
[  867.843788]  preempt_count_sub+0x5/0xa0
[  867.843793]  ? migrate_enable+0xac/0xf0
[  867.843829]  __bpf_prog_exit_recur+0x2d/0x40
[  867.843837] BUG: IRQ stack guard page was hit at 0000000099bd8228 (stack is 00000000b23e2bc4..000000006d95af35)
[  867.843841] BUG: IRQ stack guard page was hit at 000000005ae07924 (stack is 00000000ffd69623..0000000014eb594c)
[  867.843843] BUG: IRQ stack guard page was hit at 00000000028320f0 (stack is 00000000034b6438..0000000078d1bcec)
[  867.843842]  bpf_trampoline_6442468108_0+0x55/0x1000
...

That is because in __bpf_prog_exit_recur, the preempt_count_{sub,add} are
called after prog-&gt;active is decreased.

Fixing this by adding these two functions into btf ids deny list.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54086/">CVE-2023-54086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54086">CVE-2023-54086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256259">SUSE bug 1256259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54087</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54087" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54087" ref_url="https://www.suse.com/security/cve/CVE-2023-54087" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ubi: Fix possible null-ptr-deref in ubi_free_volume()

It willl cause null-ptr-deref in the following case:

uif_init()
  ubi_add_volume()
    cdev_add() -&gt; if it fails, call kill_volumes()
    device_register()

kill_volumes() -&gt; if ubi_add_volume() fails call this function
  ubi_free_volume()
    cdev_del()
    device_unregister() -&gt; trying to delete a not added device,
			   it causes null-ptr-deref

So in ubi_free_volume(), it delete devices whether they are added
or not, it will causes null-ptr-deref.

Handle the error case whlie calling ubi_add_volume() to fix this
problem. If add volume fails, set the corresponding vol to null,
so it can not be accessed in kill_volumes() and release the
resource in ubi_add_volume() error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54087/">CVE-2023-54087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54087">CVE-2023-54087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256262">SUSE bug 1256262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54089</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54089" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54089" ref_url="https://www.suse.com/security/cve/CVE-2023-54089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio_pmem: add the missing REQ_OP_WRITE for flush bio

When doing mkfs.xfs on a pmem device, the following warning was

 ------------[ cut here ]------------
 WARNING: CPU: 2 PID: 384 at block/blk-core.c:751 submit_bio_noacct
 Modules linked in:
 CPU: 2 PID: 384 Comm: mkfs.xfs Not tainted 6.4.0-rc7+ #154
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
 RIP: 0010:submit_bio_noacct+0x340/0x520
 ......
 Call Trace:
  &lt;TASK&gt;
  ? submit_bio_noacct+0xd5/0x520
  submit_bio+0x37/0x60
  async_pmem_flush+0x79/0xa0
  nvdimm_flush+0x17/0x40
  pmem_submit_bio+0x370/0x390
  __submit_bio+0xbc/0x190
  submit_bio_noacct_nocheck+0x14d/0x370
  submit_bio_noacct+0x1ef/0x520
  submit_bio+0x55/0x60
  submit_bio_wait+0x5a/0xc0
  blkdev_issue_flush+0x44/0x60

The root cause is that submit_bio_noacct() needs bio_op() is either
WRITE or ZONE_APPEND for flush bio and async_pmem_flush() doesn't assign
REQ_OP_WRITE when allocating flush bio, so submit_bio_noacct just fail
the flush bio.

Simply fix it by adding the missing REQ_OP_WRITE for flush bio. And we
could fix the flush order issue and do flush optimization later.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54089/">CVE-2023-54089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54089">CVE-2023-54089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256268">SUSE bug 1256268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54090</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54090" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54090" ref_url="https://www.suse.com/security/cve/CVE-2023-54090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ixgbe: Fix panic during XDP_TX with &gt; 64 CPUs

Commit 4fe815850bdc ("ixgbe: let the xdpdrv work with more than 64 cpus")
adds support to allow XDP programs to run on systems with more than
64 CPUs by locking the XDP TX rings and indexing them using cpu % 64
(IXGBE_MAX_XDP_QS).

Upon trying this out patch on a system with more than 64 cores,
the kernel paniced with an array-index-out-of-bounds at the return in
ixgbe_determine_xdp_ring in ixgbe.h, which means ixgbe_determine_xdp_q_idx
was just returning the cpu instead of cpu % IXGBE_MAX_XDP_QS.  An example
splat:

 ==========================================================================
 UBSAN: array-index-out-of-bounds in
 /var/lib/dkms/ixgbe/5.18.6+focal-1/build/src/ixgbe.h:1147:26
 index 65 is out of range for type 'ixgbe_ring *[64]'
 ==========================================================================
 BUG: kernel NULL pointer dereference, address: 0000000000000058
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 [#1] SMP NOPTI
 CPU: 65 PID: 408 Comm: ksoftirqd/65
 Tainted: G          IOE     5.15.0-48-generic #54~20.04.1-Ubuntu
 Hardware name: Dell Inc. PowerEdge R640/0W23H8, BIOS 2.5.4 01/13/2020
 RIP: 0010:ixgbe_xmit_xdp_ring+0x1b/0x1c0 [ixgbe]
 Code: 3b 52 d4 cf e9 42 f2 ff ff 66 0f 1f 44 00 00 0f 1f 44 00 00 55 b9
 00 00 00 00 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 08 &lt;44&gt; 0f b7
 47 58 0f b7 47 5a 0f b7 57 54 44 0f b7 76 08 66 41 39 c0
 RSP: 0018:ffffbc3fcd88fcb0 EFLAGS: 00010282
 RAX: ffff92a253260980 RBX: ffffbc3fe68b00a0 RCX: 0000000000000000
 RDX: ffff928b5f659000 RSI: ffff928b5f659000 RDI: 0000000000000000
 RBP: ffffbc3fcd88fce0 R08: ffff92b9dfc20580 R09: 0000000000000001
 R10: 3d3d3d3d3d3d3d3d R11: 3d3d3d3d3d3d3d3d R12: 0000000000000000
 R13: ffff928b2f0fa8c0 R14: ffff928b9be20050 R15: 000000000000003c
 FS:  0000000000000000(0000) GS:ffff92b9dfc00000(0000)
 knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000058 CR3: 000000011dd6a002 CR4: 00000000007706e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 55555554
 Call Trace:
  &lt;TASK&gt;
  ixgbe_poll+0x103e/0x1280 [ixgbe]
  ? sched_clock_cpu+0x12/0xe0
  __napi_poll+0x30/0x160
  net_rx_action+0x11c/0x270
  __do_softirq+0xda/0x2ee
  run_ksoftirqd+0x2f/0x50
  smpboot_thread_fn+0xb7/0x150
  ? sort_range+0x30/0x30
  kthread+0x127/0x150
  ? set_kthread_struct+0x50/0x50
  ret_from_fork+0x1f/0x30
  &lt;/TASK&gt;

I think this is how it happens:

Upon loading the first XDP program on a system with more than 64 CPUs,
ixgbe_xdp_locking_key is incremented in ixgbe_xdp_setup.  However,
immediately after this, the rings are reconfigured by ixgbe_setup_tc.
ixgbe_setup_tc calls ixgbe_clear_interrupt_scheme which calls
ixgbe_free_q_vectors which calls ixgbe_free_q_vector in a loop.
ixgbe_free_q_vector decrements ixgbe_xdp_locking_key once per call if
it is non-zero.  Commenting out the decrement in ixgbe_free_q_vector
stopped my system from panicing.

I suspect to make the original patch work, I would need to load an XDP
program and then replace it in order to get ixgbe_xdp_locking_key back
above 0 since ixgbe_setup_tc is only called when transitioning between
XDP and non-XDP ring configurations, while ixgbe_xdp_locking_key is
incremented every time ixgbe_xdp_setup is called.

Also, ixgbe_setup_tc can be called via ethtool --set-channels, so this
becomes another path to decrement ixgbe_xdp_locking_key to 0 on systems
with more than 64 CPUs.

Since ixgbe_xdp_locking_key only protects the XDP_TX path and is tied
to the number of CPUs present, there is no reason to disable it upon
unloading an XDP program.  To avoid confusion, I have moved enabling
ixgbe_xdp_locking_key into ixgbe_sw_init, which is part of the probe path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54090/">CVE-2023-54090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54090">CVE-2023-54090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256269">SUSE bug 1256269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54091</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54091" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54091" ref_url="https://www.suse.com/security/cve/CVE-2023-54091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/client: Fix memory leak in drm_client_target_cloned

dmt_mode is allocated and never freed in this function.
It was found with the ast driver, but most drivers using generic fbdev
setup are probably affected.

This fixes the following kmemleak report:
  backtrace:
    [&lt;00000000b391296d&gt;] drm_mode_duplicate+0x45/0x220 [drm]
    [&lt;00000000e45bb5b3&gt;] drm_client_target_cloned.constprop.0+0x27b/0x480 [drm]
    [&lt;00000000ed2d3a37&gt;] drm_client_modeset_probe+0x6bd/0xf50 [drm]
    [&lt;0000000010e5cc9d&gt;] __drm_fb_helper_initial_config_and_unlock+0xb4/0x2c0 [drm_kms_helper]
    [&lt;00000000909f82ca&gt;] drm_fbdev_client_hotplug+0x2bc/0x4d0 [drm_kms_helper]
    [&lt;00000000063a69aa&gt;] drm_client_register+0x169/0x240 [drm]
    [&lt;00000000a8c61525&gt;] ast_pci_probe+0x142/0x190 [ast]
    [&lt;00000000987f19bb&gt;] local_pci_probe+0xdc/0x180
    [&lt;000000004fca231b&gt;] work_for_cpu_fn+0x4e/0xa0
    [&lt;0000000000b85301&gt;] process_one_work+0x8b7/0x1540
    [&lt;000000003375b17c&gt;] worker_thread+0x70a/0xed0
    [&lt;00000000b0d43cd9&gt;] kthread+0x29f/0x340
    [&lt;000000008d770833&gt;] ret_from_fork+0x1f/0x30
unreferenced object 0xff11000333089a00 (size 128):
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54091/">CVE-2023-54091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54091">CVE-2023-54091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256274">SUSE bug 1256274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54092</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54092" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54092" ref_url="https://www.suse.com/security/cve/CVE-2023-54092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: s390: pv: fix index value of replaced ASCE

The index field of the struct page corresponding to a guest ASCE should
be 0. When replacing the ASCE in s390_replace_asce(), the index of the
new ASCE should also be set to 0.

Having the wrong index might lead to the wrong addresses being passed
around when notifying pte invalidations, and eventually to validity
intercepts (VM crash) if the prefix gets unmapped and the notifier gets
called with the wrong address.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54092/">CVE-2023-54092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54092">CVE-2023-54092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256370">SUSE bug 1256370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54093</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54093" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54093" ref_url="https://www.suse.com/security/cve/CVE-2023-54093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: anysee: fix null-ptr-deref in anysee_master_xfer

In anysee_master_xfer, msg is controlled by user. When msg[i].buf
is null and msg[i].len is zero, former checks on msg[i].buf would be
passed. Malicious data finally reach anysee_master_xfer. If accessing
msg[i].buf[0] without sanity check, null ptr deref would happen.
We add check on msg[i].len to prevent crash.

Similar commit:
commit 0ed554fd769a
("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()")

[hverkuil: add spaces around +]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54093/">CVE-2023-54093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54093">CVE-2023-54093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256273">SUSE bug 1256273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54094</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54094" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54094" ref_url="https://www.suse.com/security/cve/CVE-2023-54094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: prevent skb corruption on frag list segmentation

Ian reported several skb corruptions triggered by rx-gro-list,
collecting different oops alike:

[   62.624003] BUG: kernel NULL pointer dereference, address: 00000000000000c0
[   62.631083] #PF: supervisor read access in kernel mode
[   62.636312] #PF: error_code(0x0000) - not-present page
[   62.641541] PGD 0 P4D 0
[   62.644174] Oops: 0000 [#1] PREEMPT SMP NOPTI
[   62.648629] CPU: 1 PID: 913 Comm: napi/eno2-79 Not tainted 6.4.0 #364
[   62.655162] Hardware name: Supermicro Super Server/A2SDi-12C-HLN4F, BIOS 1.7a 10/13/2022
[   62.663344] RIP: 0010:__udp_gso_segment (./include/linux/skbuff.h:2858
./include/linux/udp.h:23 net/ipv4/udp_offload.c:228 net/ipv4/udp_offload.c:261
net/ipv4/udp_offload.c:277)
[   62.687193] RSP: 0018:ffffbd3a83b4f868 EFLAGS: 00010246
[   62.692515] RAX: 00000000000000ce RBX: 0000000000000000 RCX: 0000000000000000
[   62.699743] RDX: ffffa124def8a000 RSI: 0000000000000079 RDI: ffffa125952a14d4
[   62.706970] RBP: ffffa124def8a000 R08: 0000000000000022 R09: 00002000001558c9
[   62.714199] R10: 0000000000000000 R11: 00000000be554639 R12: 00000000000000e2
[   62.721426] R13: ffffa125952a1400 R14: ffffa125952a1400 R15: 00002000001558c9
[   62.728654] FS:  0000000000000000(0000) GS:ffffa127efa40000(0000)
knlGS:0000000000000000
[   62.736852] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   62.742702] CR2: 00000000000000c0 CR3: 00000001034b0000 CR4: 00000000003526e0
[   62.749948] Call Trace:
[   62.752498]  &lt;TASK&gt;
[   62.779267] inet_gso_segment (net/ipv4/af_inet.c:1398)
[   62.787605] skb_mac_gso_segment (net/core/gro.c:141)
[   62.791906] __skb_gso_segment (net/core/dev.c:3403 (discriminator 2))
[   62.800492] validate_xmit_skb (./include/linux/netdevice.h:4862
net/core/dev.c:3659)
[   62.804695] validate_xmit_skb_list (net/core/dev.c:3710)
[   62.809158] sch_direct_xmit (net/sched/sch_generic.c:330)
[   62.813198] __dev_queue_xmit (net/core/dev.c:3805 net/core/dev.c:4210)
net/netfilter/core.c:626)
[   62.821093] br_dev_queue_push_xmit (net/bridge/br_forward.c:55)
[   62.825652] maybe_deliver (net/bridge/br_forward.c:193)
[   62.829420] br_flood (net/bridge/br_forward.c:233)
[   62.832758] br_handle_frame_finish (net/bridge/br_input.c:215)
[   62.837403] br_handle_frame (net/bridge/br_input.c:298
net/bridge/br_input.c:416)
[   62.851417] __netif_receive_skb_core.constprop.0 (net/core/dev.c:5387)
[   62.866114] __netif_receive_skb_list_core (net/core/dev.c:5570)
[   62.871367] netif_receive_skb_list_internal (net/core/dev.c:5638
net/core/dev.c:5727)
[   62.876795] napi_complete_done (./include/linux/list.h:37
./include/net/gro.h:434 ./include/net/gro.h:429 net/core/dev.c:6067)
[   62.881004] ixgbe_poll (drivers/net/ethernet/intel/ixgbe/ixgbe_main.c:3191)
[   62.893534] __napi_poll (net/core/dev.c:6498)
[   62.897133] napi_threaded_poll (./include/linux/netpoll.h:89
net/core/dev.c:6640)
[   62.905276] kthread (kernel/kthread.c:379)
[   62.913435] ret_from_fork (arch/x86/entry/entry_64.S:314)
[   62.917119]  &lt;/TASK&gt;

In the critical scenario, rx-gro-list GRO-ed packets are fed, via a
bridge, both to the local input path and to an egress device (tun).

The segmentation of such packets unsafely writes to the cloned skbs
with shared heads.

This change addresses the issue by uncloning as needed the
to-be-segmented skbs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54094/">CVE-2023-54094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54094">CVE-2023-54094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256292">SUSE bug 1256292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54095</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54095" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54095" ref_url="https://www.suse.com/security/cve/CVE-2023-54095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/iommu: Fix notifiers being shared by PCI and VIO buses

fail_iommu_setup() registers the fail_iommu_bus_notifier struct to both
PCI and VIO buses.  struct notifier_block is a linked list node, so this
causes any notifiers later registered to either bus type to also be
registered to the other since they share the same node.

This causes issues in (at least) the vgaarb code, which registers a
notifier for PCI buses.  pci_notify() ends up being called on a vio
device, converted with to_pci_dev() even though it's not a PCI device,
and finally makes a bad access in vga_arbiter_add_pci_device() as
discovered with KASAN:

 BUG: KASAN: slab-out-of-bounds in vga_arbiter_add_pci_device+0x60/0xe00
 Read of size 4 at addr c000000264c26fdc by task swapper/0/1

 Call Trace:
   dump_stack_lvl+0x1bc/0x2b8 (unreliable)
   print_report+0x3f4/0xc60
   kasan_report+0x244/0x698
   __asan_load4+0xe8/0x250
   vga_arbiter_add_pci_device+0x60/0xe00
   pci_notify+0x88/0x444
   notifier_call_chain+0x104/0x320
   blocking_notifier_call_chain+0xa0/0x140
   device_add+0xac8/0x1d30
   device_register+0x58/0x80
   vio_register_device_node+0x9ac/0xce0
   vio_bus_scan_register_devices+0xc4/0x13c
   __machine_initcall_pseries_vio_device_init+0x94/0xf0
   do_one_initcall+0x12c/0xaa8
   kernel_init_freeable+0xa48/0xba8
   kernel_init+0x64/0x400
   ret_from_kernel_thread+0x5c/0x64

Fix this by creating separate notifier_block structs for each bus type.

[mpe: Add #ifdef to fix CONFIG_IBMVIO=n build]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54095/">CVE-2023-54095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54095">CVE-2023-54095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256271">SUSE bug 1256271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256272">SUSE bug 1256272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54096</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54096" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54096" ref_url="https://www.suse.com/security/cve/CVE-2023-54096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soundwire: fix enumeration completion

The soundwire subsystem uses two completion structures that allow
drivers to wait for soundwire device to become enumerated on the bus and
initialised by their drivers, respectively.

The code implementing the signalling is currently broken as it does not
signal all current and future waiters and also uses the wrong
reinitialisation function, which can potentially lead to memory
corruption if there are still waiters on the queue.

Not signalling future waiters specifically breaks sound card probe
deferrals as codec drivers can not tell that the soundwire device is
already attached when being reprobed. Some codec runtime PM
implementations suffer from similar problems as waiting for enumeration
during resume can also timeout despite the device already having been
enumerated.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54096/">CVE-2023-54096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54096">CVE-2023-54096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256178">SUSE bug 1256178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54097</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54097" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54097" ref_url="https://www.suse.com/security/cve/CVE-2023-54097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: stm32-pwr: fix of_iomap leak

Smatch reports:
drivers/regulator/stm32-pwr.c:166 stm32_pwr_regulator_probe() warn:
'base' from of_iomap() not released on lines: 151,166.

In stm32_pwr_regulator_probe(), base is not released
when devm_kzalloc() fails to allocate memory or
devm_regulator_register() fails to register a new regulator device,
which may cause a leak.

To fix this issue, replace of_iomap() with
devm_platform_ioremap_resource(). devm_platform_ioremap_resource()
is a specialized function for platform devices.
It allows 'base' to be automatically released whether the probe
function succeeds or fails.

Besides, use IS_ERR(base) instead of !base
as the return value of devm_platform_ioremap_resource()
can either be a pointer to the remapped memory or
an ERR_PTR() encoded error code if the operation fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54097/">CVE-2023-54097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54097">CVE-2023-54097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256179">SUSE bug 1256179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54098</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54098" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54098" ref_url="https://www.suse.com/security/cve/CVE-2023-54098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gvt: fix gvt debugfs destroy

When gvt debug fs is destroyed, need to have a sane check if drm
minor's debugfs root is still available or not, otherwise in case like
device remove through unbinding, drm minor's debugfs directory has
already been removed, then intel_gvt_debugfs_clean() would act upon
dangling pointer like below oops.

i915 0000:00:02.0: Direct firmware load for i915/gvt/vid_0x8086_did_0x1926_rid_0x0a.golden_hw_state failed with error -2
i915 0000:00:02.0: MDEV: Registered
Console: switching to colour dummy device 80x25
i915 0000:00:02.0: MDEV: Unregistering
BUG: kernel NULL pointer dereference, address: 00000000000000a0
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 2 PID: 2486 Comm: gfx-unbind.sh Tainted: G          I        6.1.0-rc8+ #15
Hardware name: Dell Inc. XPS 13 9350/0JXC1H, BIOS 1.13.0 02/10/2020
RIP: 0010:down_write+0x1f/0x90
Code: 1d ff ff 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 53 48 89 fb e8 62 c0 ff ff bf 01 00 00 00 e8 28 5e 31 ff 31 c0 ba 01 00 00 00 &lt;f0&gt; 48 0f b1 13 75 33 65 48 8b 04 25 c0 bd 01 00 48 89 43 08 bf 01
RSP: 0018:ffff9eb3036ffcc8 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 00000000000000a0 RCX: ffffff8100000000
RDX: 0000000000000001 RSI: 0000000000000064 RDI: ffffffffa48787a8
RBP: ffff9eb3036ffd30 R08: ffffeb1fc45a0608 R09: ffffeb1fc45a05c0
R10: 0000000000000002 R11: 0000000000000000 R12: 0000000000000000
R13: ffff91acc33fa328 R14: ffff91acc033f080 R15: ffff91acced533e0
FS:  00007f6947bba740(0000) GS:ffff91ae36d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000a0 CR3: 00000001133a2002 CR4: 00000000003706e0
Call Trace:
 &lt;TASK&gt;
 simple_recursive_removal+0x9f/0x2a0
 ? start_creating.part.0+0x120/0x120
 ? _raw_spin_lock+0x13/0x40
 debugfs_remove+0x40/0x60
 intel_gvt_debugfs_clean+0x15/0x30 [kvmgt]
 intel_gvt_clean_device+0x49/0xe0 [kvmgt]
 intel_gvt_driver_remove+0x2f/0xb0
 i915_driver_remove+0xa4/0xf0
 i915_pci_remove+0x1a/0x30
 pci_device_remove+0x33/0xa0
 device_release_driver_internal+0x1b2/0x230
 unbind_store+0xe0/0x110
 kernfs_fop_write_iter+0x11b/0x1f0
 vfs_write+0x203/0x3d0
 ksys_write+0x63/0xe0
 do_syscall_64+0x37/0x90
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f6947cb5190
Code: 40 00 48 8b 15 71 9c 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 80 3d 51 24 0e 00 00 74 17 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 48 83 ec 28 48 89
RSP: 002b:00007ffcbac45a28 EFLAGS: 00000202 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 000000000000000d RCX: 00007f6947cb5190
RDX: 000000000000000d RSI: 0000555e35c866a0 RDI: 0000000000000001
RBP: 0000555e35c866a0 R08: 0000000000000002 R09: 0000555e358cb97c
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001
R13: 000000000000000d R14: 0000000000000000 R15: 0000555e358cb8e0
 &lt;/TASK&gt;
Modules linked in: kvmgt
CR2: 00000000000000a0
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54098/">CVE-2023-54098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54098">CVE-2023-54098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256185">SUSE bug 1256185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54099</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54099" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54099" ref_url="https://www.suse.com/security/cve/CVE-2023-54099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: Protect reconfiguration of sb read-write from racing writes

The reconfigure / remount code takes a lot of effort to protect
filesystem's reconfiguration code from racing writes on remounting
read-only. However during remounting read-only filesystem to read-write
mode userspace writes can start immediately once we clear SB_RDONLY
flag. This is inconvenient for example for ext4 because we need to do
some writes to the filesystem (such as preparation of quota files)
before we can take userspace writes so we are clearing SB_RDONLY flag
before we are fully ready to accept userpace writes and syzbot has found
a way to exploit this [1]. Also as far as I'm reading the code
the filesystem remount code was protected from racing writes in the
legacy mount path by the mount's MNT_READONLY flag so this is relatively
new problem. It is actually fairly easy to protect remount read-write
from racing writes using sb-&gt;s_readonly_remount flag so let's just do
that instead of having to workaround these races in the filesystem code.

[1] https://lore.kernel.org/all/00000000000006a0df05f6667499@google.com/T/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54099/">CVE-2023-54099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54099">CVE-2023-54099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256197">SUSE bug 1256197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54100</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54100" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54100" ref_url="https://www.suse.com/security/cve/CVE-2023-54100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qedi: Fix use after free bug in qedi_remove()

In qedi_probe() we call __qedi_probe() which initializes
&amp;qedi-&gt;recovery_work with qedi_recovery_handler() and
&amp;qedi-&gt;board_disable_work with qedi_board_disable_work().

When qedi_schedule_recovery_handler() is called, schedule_delayed_work()
will finally start the work.

In qedi_remove(), which is called to remove the driver, the following
sequence may be observed:

Fix this by finishing the work before cleanup in qedi_remove().

CPU0                  CPU1

                     |qedi_recovery_handler
qedi_remove          |
  __qedi_remove      |
iscsi_host_free      |
scsi_host_put        |
//free shost         |
                     |iscsi_host_for_each_session
                     |//use qedi-&gt;shost

Cancel recovery_work and board_disable_work in __qedi_remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54100/">CVE-2023-54100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54100">CVE-2023-54100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256152">SUSE bug 1256152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54101</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54101" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54101" ref_url="https://www.suse.com/security/cve/CVE-2023-54101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

driver: soc: xilinx: use _safe loop iterator to avoid a use after free

The hash_for_each_possible() loop dereferences "eve_data" to get the
next item on the list.  However the loop frees eve_data so it leads to
a use after free.  Use hash_for_each_possible_safe() instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54101/">CVE-2023-54101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54101">CVE-2023-54101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256153">SUSE bug 1256153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54102</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54102" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54102" ref_url="https://www.suse.com/security/cve/CVE-2023-54102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow

A static code analysis tool flagged the possibility of buffer overflow when
using copy_from_user() for a debugfs entry.

Currently, it is possible that copy_from_user() copies more bytes than what
would fit in the mybuf char array.  Add a min() restriction check between
sizeof(mybuf) - 1 and nbytes passed from the userspace buffer to protect
against buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54102/">CVE-2023-54102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54102">CVE-2023-54102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256173">SUSE bug 1256173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54104</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54104" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54104" ref_url="https://www.suse.com/security/cve/CVE-2023-54104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: rawnand: fsl_upm: Fix an off-by one test in fun_exec_op()

'op-cs' is copied in 'fun-&gt;mchip_number' which is used to access the
'mchip_offsets' and the 'rnb_gpio' arrays.
These arrays have NAND_MAX_CHIPS elements, so the index must be below this
limit.

Fix the sanity check in order to avoid the NAND_MAX_CHIPS value. This
would lead to out-of-bound accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54104/">CVE-2023-54104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54104">CVE-2023-54104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256145">SUSE bug 1256145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54105</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54105" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54105" ref_url="https://www.suse.com/security/cve/CVE-2023-54105" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: isotp: check CAN address family in isotp_bind()

Add missing check to block non-AF_CAN binds.

Syzbot created some code which matched the right sockaddr struct size
but used AF_XDP (0x2C) instead of AF_CAN (0x1D) in the address family
field:

bind$xdp(r2, &amp;(0x7f0000000540)={0x2c, 0x0, r4, 0x0, r2}, 0x10)
                                ^^^^
This has no funtional impact but the userspace should be notified about
the wrong address family field content.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54105/">CVE-2023-54105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54105">CVE-2023-54105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256146">SUSE bug 1256146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54106</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54106" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54106" ref_url="https://www.suse.com/security/cve/CVE-2023-54106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: fix potential memory leak in mlx5e_init_rep_rx

The memory pointed to by the priv-&gt;rx_res pointer is not freed in the error
path of mlx5e_init_rep_rx, which can lead to a memory leak. Fix by freeing
the memory in the error path, thereby making the error path identical to
mlx5e_cleanup_rep_rx().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54106/">CVE-2023-54106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54106">CVE-2023-54106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256358">SUSE bug 1256358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54107</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54107" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54107" ref_url="https://www.suse.com/security/cve/CVE-2023-54107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: dropping parent refcount after pd_free_fn() is done

Some cgroup policies will access parent pd through child pd even
after pd_offline_fn() is done. If pd_free_fn() for parent is called
before child, then UAF can be triggered. Hence it's better to guarantee
the order of pd_free_fn().

Currently refcount of parent blkg is dropped in __blkg_release(), which
is before pd_free_fn() is called in blkg_free_work_fn() while
blkg_free_work_fn() is called asynchronously.

This patch make sure pd_free_fn() called from removing cgroup is ordered
by delaying dropping parent refcount after calling pd_free_fn() for
child.

BTW, pd_free_fn() will also be called from blkcg_deactivate_policy()
from deleting device, and following patches will guarantee the order.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-04"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54107/">CVE-2023-54107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54107">CVE-2023-54107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256359">SUSE bug 1256359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54108</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54108" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54108" ref_url="https://www.suse.com/security/cve/CVE-2023-54108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests

The following message and call trace was seen with debug kernels:

DMA-API: qla2xxx 0000:41:00.0: device driver failed to check map
error [device address=0x00000002a3ff38d8] [size=1024 bytes] [mapped as
single]
WARNING: CPU: 0 PID: 2930 at kernel/dma/debug.c:1017
	 check_unmap+0xf42/0x1990

Call Trace:
	debug_dma_unmap_page+0xc9/0x100
	qla_nvme_ls_unmap+0x141/0x210 [qla2xxx]

Remove DMA mapping from the driver altogether, as it is already done by FC
layer. This prevents the warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54108/">CVE-2023-54108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54108">CVE-2023-54108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256355">SUSE bug 1256355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54109</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54109" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54109" ref_url="https://www.suse.com/security/cve/CVE-2023-54109" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: rcar_fdp1: Fix refcount leak in probe and remove function

rcar_fcp_get() take reference, which should be balanced with
rcar_fcp_put(). Add missing rcar_fcp_put() in fdp1_remove and
the error paths of fdp1_probe() to fix this.

[hverkuil: resolve merge conflict, remove() is now void]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54109/">CVE-2023-54109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54109">CVE-2023-54109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256356">SUSE bug 1256356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54110</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54110" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54110" ref_url="https://www.suse.com/security/cve/CVE-2023-54110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: rndis_host: Secure rndis_query check against int overflow

Variables off and len typed as uint32 in rndis_query function
are controlled by incoming RNDIS response message thus their
value may be manipulated. Setting off to a unexpectetly large
value will cause the sum with len and 8 to overflow and pass
the implemented validation step. Consequently the response
pointer will be referring to a location past the expected
buffer boundaries allowing information leakage e.g. via
RNDIS_OID_802_3_PERMANENT_ADDRESS OID.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54110/">CVE-2023-54110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54110">CVE-2023-54110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256353">SUSE bug 1256353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54111</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54111" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54111" ref_url="https://www.suse.com/security/cve/CVE-2023-54111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups

of_find_node_by_phandle() returns a node pointer with refcount incremented,
We should use of_node_put() on it when not needed anymore.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54111/">CVE-2023-54111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54111">CVE-2023-54111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256149">SUSE bug 1256149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54112</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54112" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54112" ref_url="https://www.suse.com/security/cve/CVE-2023-54112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kcm: Fix memory leak in error path of kcm_sendmsg()

syzbot reported a memory leak like below:

BUG: memory leak
unreferenced object 0xffff88810b088c00 (size 240):
  comm "syz-executor186", pid 5012, jiffies 4294943306 (age 13.680s)
  hex dump (first 32 bytes):
    00 89 08 0b 81 88 ff ff 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffff83e5d5ff&gt;] __alloc_skb+0x1ef/0x230 net/core/skbuff.c:634
    [&lt;ffffffff84606e59&gt;] alloc_skb include/linux/skbuff.h:1289 [inline]
    [&lt;ffffffff84606e59&gt;] kcm_sendmsg+0x269/0x1050 net/kcm/kcmsock.c:815
    [&lt;ffffffff83e479c6&gt;] sock_sendmsg_nosec net/socket.c:725 [inline]
    [&lt;ffffffff83e479c6&gt;] sock_sendmsg+0x56/0xb0 net/socket.c:748
    [&lt;ffffffff83e47f55&gt;] ____sys_sendmsg+0x365/0x470 net/socket.c:2494
    [&lt;ffffffff83e4c389&gt;] ___sys_sendmsg+0xc9/0x130 net/socket.c:2548
    [&lt;ffffffff83e4c536&gt;] __sys_sendmsg+0xa6/0x120 net/socket.c:2577
    [&lt;ffffffff84ad7bb8&gt;] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [&lt;ffffffff84ad7bb8&gt;] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
    [&lt;ffffffff84c0008b&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd

In kcm_sendmsg(), kcm_tx_msg(head)-&gt;last_skb is used as a cursor to append
newly allocated skbs to 'head'. If some bytes are copied, an error occurred,
and jumped to out_error label, 'last_skb' is left unmodified. A later
kcm_sendmsg() will use an obsoleted 'last_skb' reference, corrupting the
'head' frag_list and causing the leak.

This patch fixes this issue by properly updating the last allocated skb in
'last_skb'.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54112/">CVE-2023-54112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54112">CVE-2023-54112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256354">SUSE bug 1256354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54113</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54113" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54113" ref_url="https://www.suse.com/security/cve/CVE-2023-54113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu: dump vmalloc memory info safely

Currently, for double invoke call_rcu(), will dump rcu_head objects memory
info, if the objects is not allocated from the slab allocator, the
vmalloc_dump_obj() will be invoke and the vmap_area_lock spinlock need to
be held, since the call_rcu() can be invoked in interrupt context,
therefore, there is a possibility of spinlock deadlock scenarios.

And in Preempt-RT kernel, the rcutorture test also trigger the following
lockdep warning:

BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48
in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 1, name: swapper/0
preempt_count: 1, expected: 0
RCU nest depth: 1, expected: 1
3 locks held by swapper/0/1:
 #0: ffffffffb534ee80 (fullstop_mutex){+.+.}-{4:4}, at: torture_init_begin+0x24/0xa0
 #1: ffffffffb5307940 (rcu_read_lock){....}-{1:3}, at: rcu_torture_init+0x1ec7/0x2370
 #2: ffffffffb536af40 (vmap_area_lock){+.+.}-{3:3}, at: find_vmap_area+0x1f/0x70
irq event stamp: 565512
hardirqs last  enabled at (565511): [&lt;ffffffffb379b138&gt;] __call_rcu_common+0x218/0x940
hardirqs last disabled at (565512): [&lt;ffffffffb5804262&gt;] rcu_torture_init+0x20b2/0x2370
softirqs last  enabled at (399112): [&lt;ffffffffb36b2586&gt;] __local_bh_enable_ip+0x126/0x170
softirqs last disabled at (399106): [&lt;ffffffffb43fef59&gt;] inet_register_protosw+0x9/0x1d0
Preemption disabled at:
[&lt;ffffffffb58040c3&gt;] rcu_torture_init+0x1f13/0x2370
CPU: 0 PID: 1 Comm: swapper/0 Tainted: G        W          6.5.0-rc4-rt2-yocto-preempt-rt+ #15
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x68/0xb0
 dump_stack+0x14/0x20
 __might_resched+0x1aa/0x280
 ? __pfx_rcu_torture_err_cb+0x10/0x10
 rt_spin_lock+0x53/0x130
 ? find_vmap_area+0x1f/0x70
 find_vmap_area+0x1f/0x70
 vmalloc_dump_obj+0x20/0x60
 mem_dump_obj+0x22/0x90
 __call_rcu_common+0x5bf/0x940
 ? debug_smp_processor_id+0x1b/0x30
 call_rcu_hurry+0x14/0x20
 rcu_torture_init+0x1f82/0x2370
 ? __pfx_rcu_torture_leak_cb+0x10/0x10
 ? __pfx_rcu_torture_leak_cb+0x10/0x10
 ? __pfx_rcu_torture_init+0x10/0x10
 do_one_initcall+0x6c/0x300
 ? debug_smp_processor_id+0x1b/0x30
 kernel_init_freeable+0x2b9/0x540
 ? __pfx_kernel_init+0x10/0x10
 kernel_init+0x1f/0x150
 ret_from_fork+0x40/0x50
 ? __pfx_kernel_init+0x10/0x10
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;

The previous patch fixes this by using the deadlock-safe best-effort
version of find_vm_area.  However, in case of failure print the fact that
the pointer was a vmalloc pointer so that we print at least something.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54113/">CVE-2023-54113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54113">CVE-2023-54113 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256351">SUSE bug 1256351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54114</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54114" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54114" ref_url="https://www.suse.com/security/cve/CVE-2023-54114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment()

As the call trace shows, skb_panic was caused by wrong skb-&gt;mac_header
in nsh_gso_segment():

invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 3 PID: 2737 Comm: syz Not tainted 6.3.0-next-20230505 #1
RIP: 0010:skb_panic+0xda/0xe0
call Trace:
 skb_push+0x91/0xa0
 nsh_gso_segment+0x4f3/0x570
 skb_mac_gso_segment+0x19e/0x270
 __skb_gso_segment+0x1e8/0x3c0
 validate_xmit_skb+0x452/0x890
 validate_xmit_skb_list+0x99/0xd0
 sch_direct_xmit+0x294/0x7c0
 __dev_queue_xmit+0x16f0/0x1d70
 packet_xmit+0x185/0x210
 packet_snd+0xc15/0x1170
 packet_sendmsg+0x7b/0xa0
 sock_sendmsg+0x14f/0x160

The root cause is:
nsh_gso_segment() use skb-&gt;network_header - nhoff to reset mac_header
in skb_gso_error_unwind() if inner-layer protocol gso fails.
However, skb-&gt;network_header may be reset by inner-layer protocol
gso function e.g. mpls_gso_segment. skb-&gt;mac_header reset by the
inaccurate network_header will be larger than skb headroom.

nsh_gso_segment
    nhoff = skb-&gt;network_header - skb-&gt;mac_header;
    __skb_pull(skb,nsh_len)
    skb_mac_gso_segment
        mpls_gso_segment
            skb_reset_network_header(skb);//skb-&gt;network_header+=nsh_len
            return -EINVAL;
    skb_gso_error_unwind
        skb_push(skb, nsh_len);
        skb-&gt;mac_header = skb-&gt;network_header - nhoff;
        // skb-&gt;mac_header &gt; skb-&gt;headroom, cause skb_push panic

Use correct mac_offset to restore mac_header and get rid of nhoff.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54114/">CVE-2023-54114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54114">CVE-2023-54114 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256150">SUSE bug 1256150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54115</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54115" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54115" ref_url="https://www.suse.com/security/cve/CVE-2023-54115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pcmcia: rsrc_nonstatic: Fix memory leak in nonstatic_release_resource_db()

When nonstatic_release_resource_db() frees all resources associated
with an PCMCIA socket, it forgets to free socket_data too, causing
a memory leak observable with kmemleak:

unreferenced object 0xc28d1000 (size 64):
  comm "systemd-udevd", pid 297, jiffies 4294898478 (age 194.484s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 f0 85 0e c3 00 00 00 00  ................
    00 00 00 00 0c 10 8d c2 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;ffda4245&gt;] __kmem_cache_alloc_node+0x2d7/0x4a0
    [&lt;7e51f0c8&gt;] kmalloc_trace+0x31/0xa4
    [&lt;d52b4ca0&gt;] nonstatic_init+0x24/0x1a4 [pcmcia_rsrc]
    [&lt;a2f13e08&gt;] pcmcia_register_socket+0x200/0x35c [pcmcia_core]
    [&lt;a728be1b&gt;] yenta_probe+0x4d8/0xa70 [yenta_socket]
    [&lt;c48fac39&gt;] pci_device_probe+0x99/0x194
    [&lt;84b7c690&gt;] really_probe+0x181/0x45c
    [&lt;8060fe6e&gt;] __driver_probe_device+0x75/0x1f4
    [&lt;b9b76f43&gt;] driver_probe_device+0x28/0xac
    [&lt;648b766f&gt;] __driver_attach+0xeb/0x1e4
    [&lt;6e9659eb&gt;] bus_for_each_dev+0x61/0xb4
    [&lt;25a669f3&gt;] driver_attach+0x1e/0x28
    [&lt;d8671d6b&gt;] bus_add_driver+0x102/0x20c
    [&lt;df0d323c&gt;] driver_register+0x5b/0x120
    [&lt;942cd8a4&gt;] __pci_register_driver+0x44/0x4c
    [&lt;e536027e&gt;] __UNIQUE_ID___addressable_cleanup_module188+0x1c/0xfffff000 [iTCO_vendor_support]

Fix this by freeing socket_data too.

Tested on a Acer Travelmate 4002WLMi by manually binding/unbinding
the yenta_cardbus driver (yenta_socket).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54115/">CVE-2023-54115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54115">CVE-2023-54115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256121">SUSE bug 1256121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54116</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54116" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54116" ref_url="https://www.suse.com/security/cve/CVE-2023-54116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/fbdev-generic: prohibit potential out-of-bounds access

The fbdev test of IGT may write after EOF, which lead to out-of-bound
access for drm drivers with fbdev-generic. For example, run fbdev test
on a x86+ast2400 platform, with 1680x1050 resolution, will cause the
linux kernel hang with the following call trace:

  Oops: 0000 [#1] PREEMPT SMP PTI
  [IGT] fbdev: starting subtest eof
  Workqueue: events drm_fb_helper_damage_work [drm_kms_helper]
  [IGT] fbdev: starting subtest nullptr

  RIP: 0010:memcpy_erms+0xa/0x20
  RSP: 0018:ffffa17d40167d98 EFLAGS: 00010246
  RAX: ffffa17d4eb7fa80 RBX: ffffa17d40e0aa80 RCX: 00000000000014c0
  RDX: 0000000000001a40 RSI: ffffa17d40e0b000 RDI: ffffa17d4eb80000
  RBP: ffffa17d40167e20 R08: 0000000000000000 R09: ffff89522ecff8c0
  R10: ffffa17d4e4c5000 R11: 0000000000000000 R12: ffffa17d4eb7fa80
  R13: 0000000000001a40 R14: 000000000000041a R15: ffffa17d40167e30
  FS:  0000000000000000(0000) GS:ffff895257380000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: ffffa17d40e0b000 CR3: 00000001eaeca006 CR4: 00000000001706e0
  Call Trace:
   &lt;TASK&gt;
   ? drm_fbdev_generic_helper_fb_dirty+0x207/0x330 [drm_kms_helper]
   drm_fb_helper_damage_work+0x8f/0x170 [drm_kms_helper]
   process_one_work+0x21f/0x430
   worker_thread+0x4e/0x3c0
   ? __pfx_worker_thread+0x10/0x10
   kthread+0xf4/0x120
   ? __pfx_kthread+0x10/0x10
   ret_from_fork+0x2c/0x50
   &lt;/TASK&gt;
  CR2: ffffa17d40e0b000
  ---[ end trace 0000000000000000 ]---

The is because damage rectangles computed by
drm_fb_helper_memory_range_to_clip() function is not guaranteed to be
bound in the screen's active display area. Possible reasons are:

1) Buffers are allocated in the granularity of page size, for mmap system
   call support. The shadow screen buffer consumed by fbdev emulation may
   also choosed be page size aligned.

2) The DIV_ROUND_UP() used in drm_fb_helper_memory_range_to_clip()
   will introduce off-by-one error.

For example, on a 16KB page size system, in order to store a 1920x1080
XRGB framebuffer, we need allocate 507 pages. Unfortunately, the size
1920*1080*4 can not be divided exactly by 16KB.

 1920 * 1080 * 4 = 8294400 bytes
 506 * 16 * 1024 = 8290304 bytes
 507 * 16 * 1024 = 8306688 bytes

 line_length = 1920*4 = 7680 bytes

 507 * 16 * 1024 / 7680 = 1081.6

 off / line_length = 507 * 16 * 1024 / 7680 = 1081
 DIV_ROUND_UP(507 * 16 * 1024, 7680) will yeild 1082

memcpy_toio() typically issue the copy line by line, when copy the last
line, out-of-bound access will be happen. Because:

 1082 * line_length = 1082 * 7680 = 8309760, and 8309760 &gt; 8306688

Note that userspace may still write to the invisiable area if a larger
buffer than width x stride is exposed. But it is not a big issue as
long as there still have memory resolve the access if not drafting so
far.

 - Also limit the y1 (Daniel)
 - keep fix patch it to minimal (Daniel)
 - screen_size is page size aligned because of it need mmap (Thomas)
 - Adding fixes tag (Thomas)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54116/">CVE-2023-54116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54116">CVE-2023-54116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256352">SUSE bug 1256352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54117</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54117" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54117" ref_url="https://www.suse.com/security/cve/CVE-2023-54117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/dcssblk: fix kernel crash with list_add corruption

Commit fb08a1908cb1 ("dax: simplify the dax_device &lt;-&gt; gendisk
association") introduced new logic for gendisk association, requiring
drivers to explicitly call dax_add_host() and dax_remove_host().

For dcssblk driver, some dax_remove_host() calls were missing, e.g. in
device remove path. The commit also broke error handling for out_dax case
in device add path, resulting in an extra put_device() w/o the previous
get_device() in that case.

This lead to stale xarray entries after device add / remove cycles. In the
case when a previously used struct gendisk pointer (xarray index) would be
used again, because blk_alloc_disk() happened to return such a pointer, the
xa_insert() in dax_add_host() would fail and go to out_dax, doing the extra
put_device() in the error path. In combination with an already flawed error
handling in dcssblk (device_register() cleanup), which needs to be
addressed in a separate patch, this resulted in a missing device_del() /
klist_del(), and eventually in the kernel crash with list_add corruption on
a subsequent device_add() / klist_add().

Fix this by adding the missing dax_remove_host() calls, and also move the
put_device() in the error path to restore the previous logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54117/">CVE-2023-54117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54117">CVE-2023-54117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256348">SUSE bug 1256348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54119</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54119" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54119" ref_url="https://www.suse.com/security/cve/CVE-2023-54119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

inotify: Avoid reporting event with invalid wd

When inotify_freeing_mark() races with inotify_handle_inode_event() it
can happen that inotify_handle_inode_event() sees that i_mark-&gt;wd got
already reset to -1 and reports this value to userspace which can
confuse the inotify listener. Avoid the problem by validating that wd is
sensible (and pretend the mark got removed before the event got
generated otherwise).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54119/">CVE-2023-54119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54119">CVE-2023-54119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256349">SUSE bug 1256349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54120</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54120" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54120" ref_url="https://www.suse.com/security/cve/CVE-2023-54120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix race condition in hidp_session_thread

There is a potential race condition in hidp_session_thread that may
lead to use-after-free. For instance, the timer is active while
hidp_del_timer is called in hidp_session_thread(). After hidp_session_put,
then 'session' will be freed, causing kernel panic when hidp_idle_timeout
is running.

The solution is to use del_timer_sync instead of del_timer.

Here is the call trace:

? hidp_session_probe+0x780/0x780
call_timer_fn+0x2d/0x1e0
__run_timers.part.0+0x569/0x940
hidp_session_probe+0x780/0x780
call_timer_fn+0x1e0/0x1e0
ktime_get+0x5c/0xf0
lapic_next_deadline+0x2c/0x40
clockevents_program_event+0x205/0x320
run_timer_softirq+0xa9/0x1b0
__do_softirq+0x1b9/0x641
__irq_exit_rcu+0xdc/0x190
irq_exit_rcu+0xe/0x20
sysvec_apic_timer_interrupt+0xa1/0xc0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54120/">CVE-2023-54120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54120">CVE-2023-54120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256133">SUSE bug 1256133</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54121</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54121" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54121" ref_url="https://www.suse.com/security/cve/CVE-2023-54121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix incorrect splitting in btrfs_drop_extent_map_range

In production we were seeing a variety of WARN_ON()'s in the extent_map
code, specifically in btrfs_drop_extent_map_range() when we have to call
add_extent_mapping() for our second split.

Consider the following extent map layout

	PINNED
	[0 16K)  [32K, 48K)

and then we call btrfs_drop_extent_map_range for [0, 36K), with
skip_pinned == true.  The initial loop will have

	start = 0
	end = 36K
	len = 36K

we will find the [0, 16k) extent, but since we are pinned we will skip
it, which has this code

	start = em_end;
	if (end != (u64)-1)
		len = start + len - em_end;

em_end here is 16K, so now the values are

	start = 16K
	len = 16K + 36K - 16K = 36K

len should instead be 20K.  This is a problem when we find the next
extent at [32K, 48K), we need to split this extent to leave [36K, 48k),
however the code for the split looks like this

	split-&gt;start = start + len;
	split-&gt;len = em_end - (start + len);

In this case we have

	em_end = 48K
	split-&gt;start = 16K + 36K       // this should be 16K + 20K
	split-&gt;len = 48K - (16K + 36K) // this overflows as 16K + 36K is 52K

and now we have an invalid extent_map in the tree that potentially
overlaps other entries in the extent map.  Even in the non-overlapping
case we will have split-&gt;start set improperly, which will cause problems
with any block related calculations.

We don't actually need len in this loop, we can simply use end as our
end point, and only adjust start up when we find a pinned extent we need
to skip.

Adjust the logic to do this, which keeps us from inserting an invalid
extent map.

We only skip_pinned in the relocation case, so this is relatively rare,
except in the case where you are running relocation a lot, which can
happen with auto relocation on.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54121/">CVE-2023-54121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54121">CVE-2023-54121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256267">SUSE bug 1256267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54122</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54122" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54122" ref_url="https://www.suse.com/security/cve/CVE-2023-54122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: Add check for cstate

As kzalloc may fail and return NULL pointer,
it should be better to check cstate
in order to avoid the NULL pointer dereference
in __drm_atomic_helper_crtc_reset.

Patchwork: https://patchwork.freedesktop.org/patch/514163/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54122/">CVE-2023-54122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54122">CVE-2023-54122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256346">SUSE bug 1256346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54123</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54123" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54123" ref_url="https://www.suse.com/security/cve/CVE-2023-54123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix memleak for 'conf-&gt;bio_split'

In the error path of raid10_run(), 'conf' need be freed, however,
'conf-&gt;bio_split' is missed and memory will be leaked.

Since there are 3 places to free 'conf', factor out a helper to fix the
problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54123/">CVE-2023-54123 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54123">CVE-2023-54123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256142">SUSE bug 1256142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54124</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54124" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54124" ref_url="https://www.suse.com/security/cve/CVE-2023-54124" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to drop all dirty pages during umount() if cp_error is set

xfstest generic/361 reports a bug as below:

f2fs_bug_on(sbi, sbi-&gt;fsync_node_num);

kernel BUG at fs/f2fs/super.c:1627!
RIP: 0010:f2fs_put_super+0x3a8/0x3b0
Call Trace:
 generic_shutdown_super+0x8c/0x1b0
 kill_block_super+0x2b/0x60
 kill_f2fs_super+0x87/0x110
 deactivate_locked_super+0x39/0x80
 deactivate_super+0x46/0x50
 cleanup_mnt+0x109/0x170
 __cleanup_mnt+0x16/0x20
 task_work_run+0x65/0xa0
 exit_to_user_mode_prepare+0x175/0x190
 syscall_exit_to_user_mode+0x25/0x50
 do_syscall_64+0x4c/0x90
 entry_SYSCALL_64_after_hwframe+0x72/0xdc

During umount(), if cp_error is set, f2fs_wait_on_all_pages() should
not stop waiting all F2FS_WB_CP_DATA pages to be writebacked, otherwise,
fsync_node_num can be non-zero after f2fs_wait_on_all_pages() causing
this bug.

In this case, to avoid deadloop in f2fs_wait_on_all_pages(), it needs
to drop all dirty pages rather than redirtying them.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54124/">CVE-2023-54124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54124">CVE-2023-54124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256116">SUSE bug 1256116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54125</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54125" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54125" ref_url="https://www.suse.com/security/cve/CVE-2023-54125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Return error for inconsistent extended attributes

ntfs_read_ea is called when we want to read extended attributes. There
are some sanity checks for the validity of the EAs. However, it fails to
return a proper error code for the inconsistent attributes, which might
lead to unpredicted memory accesses after return.

[  138.916927] BUG: KASAN: use-after-free in ntfs_set_ea+0x453/0xbf0
[  138.923876] Write of size 4 at addr ffff88800205cfac by task poc/199
[  138.931132]
[  138.933016] CPU: 0 PID: 199 Comm: poc Not tainted 6.2.0-rc1+ #4
[  138.938070] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
[  138.947327] Call Trace:
[  138.949557]  &lt;TASK&gt;
[  138.951539]  dump_stack_lvl+0x4d/0x67
[  138.956834]  print_report+0x16f/0x4a6
[  138.960798]  ? ntfs_set_ea+0x453/0xbf0
[  138.964437]  ? kasan_complete_mode_report_info+0x7d/0x200
[  138.969793]  ? ntfs_set_ea+0x453/0xbf0
[  138.973523]  kasan_report+0xb8/0x140
[  138.976740]  ? ntfs_set_ea+0x453/0xbf0
[  138.980578]  __asan_store4+0x76/0xa0
[  138.984669]  ntfs_set_ea+0x453/0xbf0
[  138.988115]  ? __pfx_ntfs_set_ea+0x10/0x10
[  138.993390]  ? kernel_text_address+0xd3/0xe0
[  138.998270]  ? __kernel_text_address+0x16/0x50
[  139.002121]  ? unwind_get_return_address+0x3e/0x60
[  139.005659]  ? __pfx_stack_trace_consume_entry+0x10/0x10
[  139.010177]  ? arch_stack_walk+0xa2/0x100
[  139.013657]  ? filter_irq_stacks+0x27/0x80
[  139.017018]  ntfs_setxattr+0x405/0x440
[  139.022151]  ? __pfx_ntfs_setxattr+0x10/0x10
[  139.026569]  ? kvmalloc_node+0x2d/0x120
[  139.030329]  ? kasan_save_stack+0x41/0x60
[  139.033883]  ? kasan_save_stack+0x2a/0x60
[  139.037338]  ? kasan_set_track+0x29/0x40
[  139.040163]  ? kasan_save_alloc_info+0x1f/0x30
[  139.043588]  ? __kasan_kmalloc+0x8b/0xa0
[  139.047255]  ? __kmalloc_node+0x68/0x150
[  139.051264]  ? kvmalloc_node+0x2d/0x120
[  139.055301]  ? vmemdup_user+0x2b/0xa0
[  139.058584]  __vfs_setxattr+0x121/0x170
[  139.062617]  ? __pfx___vfs_setxattr+0x10/0x10
[  139.066282]  __vfs_setxattr_noperm+0x97/0x300
[  139.070061]  __vfs_setxattr_locked+0x145/0x170
[  139.073580]  vfs_setxattr+0x137/0x2a0
[  139.076641]  ? __pfx_vfs_setxattr+0x10/0x10
[  139.080223]  ? __kasan_check_write+0x18/0x20
[  139.084234]  do_setxattr+0xce/0x150
[  139.087768]  setxattr+0x126/0x140
[  139.091250]  ? __pfx_setxattr+0x10/0x10
[  139.094948]  ? __virt_addr_valid+0xcb/0x140
[  139.097838]  ? __call_rcu_common.constprop.0+0x1c7/0x330
[  139.102688]  ? debug_smp_processor_id+0x1b/0x30
[  139.105985]  ? kasan_quarantine_put+0x5b/0x190
[  139.109980]  ? putname+0x84/0xa0
[  139.113886]  ? __kasan_slab_free+0x11e/0x1b0
[  139.117961]  ? putname+0x84/0xa0
[  139.121316]  ? preempt_count_sub+0x1c/0xd0
[  139.124427]  ? __mnt_want_write+0xae/0x100
[  139.127836]  ? mnt_want_write+0x8f/0x150
[  139.130954]  path_setxattr+0x164/0x180
[  139.133998]  ? __pfx_path_setxattr+0x10/0x10
[  139.137853]  ? __pfx_ksys_pwrite64+0x10/0x10
[  139.141299]  ? debug_smp_processor_id+0x1b/0x30
[  139.145714]  ? fpregs_assert_state_consistent+0x6b/0x80
[  139.150796]  __x64_sys_setxattr+0x71/0x90
[  139.155407]  do_syscall_64+0x3f/0x90
[  139.159035]  entry_SYSCALL_64_after_hwframe+0x72/0xdc
[  139.163843] RIP: 0033:0x7f108cae4469
[  139.166481] Code: 00 f3 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 088
[  139.183764] RSP: 002b:00007fff87588388 EFLAGS: 00000286 ORIG_RAX: 00000000000000bc
[  139.190657] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f108cae4469
[  139.196586] RDX: 00007fff875883b0 RSI: 00007fff875883d1 RDI: 00007fff875883b6
[  139.201716] RBP: 00007fff8758c530 R08: 0000000000000001 R09: 00007fff8758c618
[  139.207940] R10: 0000000000000006 R11: 0000000000000286 R12: 00000000004004c0
[  139.214007] R13: 00007fff8758c610 R14: 0000000000000000 R15
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54125/">CVE-2023-54125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54125">CVE-2023-54125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256117">SUSE bug 1256117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54126</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54126" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54126" ref_url="https://www.suse.com/security/cve/CVE-2023-54126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: safexcel - Cleanup ring IRQ workqueues on load failure

A failure loading the safexcel driver results in the following warning
on boot, because the IRQ affinity has not been correctly cleaned up.
Ensure we clean up the affinity and workqueues on a failure to load the
driver.

crypto-safexcel: probe of f2800000.crypto failed with error -2
------------[ cut here ]------------
WARNING: CPU: 1 PID: 232 at kernel/irq/manage.c:1913 free_irq+0x300/0x340
Modules linked in: hwmon mdio_i2c crypto_safexcel(+) md5 sha256_generic libsha256 authenc libdes omap_rng rng_core nft_masq nft_nat nft_chain_nat nf_nat nft_ct nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables libcrc32c nfnetlink fuse autofs4
CPU: 1 PID: 232 Comm: systemd-udevd Tainted: G        W          6.1.6-00002-g9d4898824677 #3
Hardware name: MikroTik RB5009 (DT)
pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : free_irq+0x300/0x340
lr : free_irq+0x2e0/0x340
sp : ffff800008fa3890
x29: ffff800008fa3890 x28: 0000000000000000 x27: 0000000000000000
x26: ffff8000008e6dc0 x25: ffff000009034cac x24: ffff000009034d50
x23: 0000000000000000 x22: 000000000000004a x21: ffff0000093e0d80
x20: ffff000009034c00 x19: ffff00000615fc00 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: 000075f5c1584c5e
x14: 0000000000000017 x13: 0000000000000000 x12: 0000000000000040
x11: ffff000000579b60 x10: ffff000000579b62 x9 : ffff800008bbe370
x8 : ffff000000579dd0 x7 : 0000000000000000 x6 : ffff000000579e18
x5 : ffff000000579da8 x4 : ffff800008ca0000 x3 : ffff800008ca0188
x2 : 0000000013033204 x1 : ffff000009034c00 x0 : ffff8000087eadf0
Call trace:
 free_irq+0x300/0x340
 devm_irq_release+0x14/0x20
 devres_release_all+0xa0/0x100
 device_unbind_cleanup+0x14/0x60
 really_probe+0x198/0x2d4
 __driver_probe_device+0x74/0xdc
 driver_probe_device+0x3c/0x110
 __driver_attach+0x8c/0x190
 bus_for_each_dev+0x6c/0xc0
 driver_attach+0x20/0x30
 bus_add_driver+0x148/0x1fc
 driver_register+0x74/0x120
 __platform_driver_register+0x24/0x30
 safexcel_init+0x48/0x1000 [crypto_safexcel]
 do_one_initcall+0x4c/0x1b0
 do_init_module+0x44/0x1cc
 load_module+0x1724/0x1be4
 __do_sys_finit_module+0xbc/0x110
 __arm64_sys_finit_module+0x1c/0x24
 invoke_syscall+0x44/0x110
 el0_svc_common.constprop.0+0xc0/0xe0
 do_el0_svc+0x20/0x80
 el0_svc+0x14/0x4c
 el0t_64_sync_handler+0xb0/0xb4
 el0t_64_sync+0x148/0x14c
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54126/">CVE-2023-54126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54126">CVE-2023-54126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256118">SUSE bug 1256118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54127</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54127" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54127" ref_url="https://www.suse.com/security/cve/CVE-2023-54127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount()

Syzkaller reported the following issue:
==================================================================
BUG: KASAN: double-free in slab_free mm/slub.c:3787 [inline]
BUG: KASAN: double-free in __kmem_cache_free+0x71/0x110 mm/slub.c:3800
Free of addr ffff888086408000 by task syz-executor.4/12750
[...]
Call Trace:
 &lt;TASK&gt;
[...]
 kasan_report_invalid_free+0xac/0xd0 mm/kasan/report.c:482
 ____kasan_slab_free+0xfb/0x120
 kasan_slab_free include/linux/kasan.h:177 [inline]
 slab_free_hook mm/slub.c:1781 [inline]
 slab_free_freelist_hook+0x12e/0x1a0 mm/slub.c:1807
 slab_free mm/slub.c:3787 [inline]
 __kmem_cache_free+0x71/0x110 mm/slub.c:3800
 dbUnmount+0xf4/0x110 fs/jfs/jfs_dmap.c:264
 jfs_umount+0x248/0x3b0 fs/jfs/jfs_umount.c:87
 jfs_put_super+0x86/0x190 fs/jfs/super.c:194
 generic_shutdown_super+0x130/0x310 fs/super.c:492
 kill_block_super+0x79/0xd0 fs/super.c:1386
 deactivate_locked_super+0xa7/0xf0 fs/super.c:332
 cleanup_mnt+0x494/0x520 fs/namespace.c:1291
 task_work_run+0x243/0x300 kernel/task_work.c:179
 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
 exit_to_user_mode_loop+0x124/0x150 kernel/entry/common.c:171
 exit_to_user_mode_prepare+0xb2/0x140 kernel/entry/common.c:203
 __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]
 syscall_exit_to_user_mode+0x26/0x60 kernel/entry/common.c:296
 do_syscall_64+0x49/0xb0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
[...]
 &lt;/TASK&gt;

Allocated by task 13352:
 kasan_save_stack mm/kasan/common.c:45 [inline]
 kasan_set_track+0x3d/0x60 mm/kasan/common.c:52
 ____kasan_kmalloc mm/kasan/common.c:371 [inline]
 __kasan_kmalloc+0x97/0xb0 mm/kasan/common.c:380
 kmalloc include/linux/slab.h:580 [inline]
 dbMount+0x54/0x980 fs/jfs/jfs_dmap.c:164
 jfs_mount+0x1dd/0x830 fs/jfs/jfs_mount.c:121
 jfs_fill_super+0x590/0xc50 fs/jfs/super.c:556
 mount_bdev+0x26c/0x3a0 fs/super.c:1359
 legacy_get_tree+0xea/0x180 fs/fs_context.c:610
 vfs_get_tree+0x88/0x270 fs/super.c:1489
 do_new_mount+0x289/0xad0 fs/namespace.c:3145
 do_mount fs/namespace.c:3488 [inline]
 __do_sys_mount fs/namespace.c:3697 [inline]
 __se_sys_mount+0x2d3/0x3c0 fs/namespace.c:3674
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Freed by task 13352:
 kasan_save_stack mm/kasan/common.c:45 [inline]
 kasan_set_track+0x3d/0x60 mm/kasan/common.c:52
 kasan_save_free_info+0x27/0x40 mm/kasan/generic.c:518
 ____kasan_slab_free+0xd6/0x120 mm/kasan/common.c:236
 kasan_slab_free include/linux/kasan.h:177 [inline]
 slab_free_hook mm/slub.c:1781 [inline]
 slab_free_freelist_hook+0x12e/0x1a0 mm/slub.c:1807
 slab_free mm/slub.c:3787 [inline]
 __kmem_cache_free+0x71/0x110 mm/slub.c:3800
 dbUnmount+0xf4/0x110 fs/jfs/jfs_dmap.c:264
 jfs_mount_rw+0x545/0x740 fs/jfs/jfs_mount.c:247
 jfs_remount+0x3db/0x710 fs/jfs/super.c:454
 reconfigure_super+0x3bc/0x7b0 fs/super.c:935
 vfs_fsconfig_locked fs/fsopen.c:254 [inline]
 __do_sys_fsconfig fs/fsopen.c:439 [inline]
 __se_sys_fsconfig+0xad5/0x1060 fs/fsopen.c:314
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
[...]

JFS_SBI(ipbmap-&gt;i_sb)-&gt;bmap wasn't set to NULL after kfree() in
dbUnmount().

Syzkaller uses faultinject to reproduce this KASAN double-free
warning. The issue is triggered if either diMount() or dbMount() fail
in jfs_remount(), since diUnmount() or dbUnmount() already happened in
such a case - they will do double-free on next execution: jfs_umount
or jfs_remount.

Tested on both upstream and jfs-next by syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54127/">CVE-2023-54127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54127">CVE-2023-54127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256119">SUSE bug 1256119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54128</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54128" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54128" ref_url="https://www.suse.com/security/cve/CVE-2023-54128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: drop peer group ids under namespace lock

When cleaning up peer group ids in the failure path we need to make sure
to hold on to the namespace lock. Otherwise another thread might just
turn the mount from a shared into a non-shared mount concurrently.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54128/">CVE-2023-54128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54128">CVE-2023-54128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256112">SUSE bug 1256112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54129</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54129" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54129" ref_url="https://www.suse.com/security/cve/CVE-2023-54129" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-af: Add validation for lmac type

Upon physical link change, firmware reports to the kernel about the
change along with the details like speed, lmac_type_id, etc.
Kernel derives lmac_type based on lmac_type_id received from firmware.

In a few scenarios, firmware returns an invalid lmac_type_id, which
is resulting in below kernel panic. This patch adds the missing
validation of the lmac_type_id field.

Internal error: Oops: 96000005 [#1] PREEMPT SMP
[   35.321595] Modules linked in:
[   35.328982] CPU: 0 PID: 31 Comm: kworker/0:1 Not tainted
5.4.210-g2e3169d8e1bc-dirty #17
[   35.337014] Hardware name: Marvell CN103XX board (DT)
[   35.344297] Workqueue: events work_for_cpu_fn
[   35.352730] pstate: 40400089 (nZcv daIf +PAN -UAO)
[   35.360267] pc : strncpy+0x10/0x30
[   35.366595] lr : cgx_link_change_handler+0x90/0x180
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54129/">CVE-2023-54129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54129">CVE-2023-54129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256113">SUSE bug 1256113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54130</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54130" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54130" ref_url="https://www.suse.com/security/cve/CVE-2023-54130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling

Commit 55d1cbbbb29e ("hfs/hfsplus: use WARN_ON for sanity check") fixed
a build warning by turning a comment into a WARN_ON(), but it turns out
that syzbot then complains because it can trigger said warning with a
corrupted hfs image.

The warning actually does warn about a bad situation, but we are much
better off just handling it as the error it is.  So rather than warn
about us doing bad things, stop doing the bad things and return -EIO.

While at it, also fix a memory leak that was introduced by an earlier
fix for a similar syzbot warning situation, and add a check for one case
that historically wasn't handled at all (ie neither comment nor
subsequent WARN_ON).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54130/">CVE-2023-54130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54130">CVE-2023-54130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256114">SUSE bug 1256114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54131</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54131" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54131" ref_url="https://www.suse.com/security/cve/CVE-2023-54131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rt2x00: Fix memory leak when handling surveys

When removing a rt2x00 device, its associated channel surveys
are not freed, causing a memory leak observable with kmemleak:

unreferenced object 0xffff9620f0881a00 (size 512):
  comm "systemd-udevd", pid 2290, jiffies 4294906974 (age 33.768s)
  hex dump (first 32 bytes):
    70 44 12 00 00 00 00 00 92 8a 00 00 00 00 00 00  pD..............
    00 00 00 00 00 00 00 00 ab 87 01 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffffb0ed858b&gt;] __kmalloc+0x4b/0x130
    [&lt;ffffffffc1b0f29b&gt;] rt2800_probe_hw+0xc2b/0x1380 [rt2800lib]
    [&lt;ffffffffc1a9496e&gt;] rt2800usb_probe_hw+0xe/0x60 [rt2800usb]
    [&lt;ffffffffc1ae491a&gt;] rt2x00lib_probe_dev+0x21a/0x7d0 [rt2x00lib]
    [&lt;ffffffffc1b3b83e&gt;] rt2x00usb_probe+0x1be/0x980 [rt2x00usb]
    [&lt;ffffffffc05981e2&gt;] usb_probe_interface+0xe2/0x310 [usbcore]
    [&lt;ffffffffb13be2d5&gt;] really_probe+0x1a5/0x410
    [&lt;ffffffffb13be5c8&gt;] __driver_probe_device+0x78/0x180
    [&lt;ffffffffb13be6fe&gt;] driver_probe_device+0x1e/0x90
    [&lt;ffffffffb13be972&gt;] __driver_attach+0xd2/0x1c0
    [&lt;ffffffffb13bbc57&gt;] bus_for_each_dev+0x77/0xd0
    [&lt;ffffffffb13bd2a2&gt;] bus_add_driver+0x112/0x210
    [&lt;ffffffffb13bfc6c&gt;] driver_register+0x5c/0x120
    [&lt;ffffffffc0596ae8&gt;] usb_register_driver+0x88/0x150 [usbcore]
    [&lt;ffffffffb0c011c4&gt;] do_one_initcall+0x44/0x220
    [&lt;ffffffffb0d6134c&gt;] do_init_module+0x4c/0x220

Fix this by freeing the channel surveys on device removal.

Tested with a RT3070 based USB wireless adapter.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54131/">CVE-2023-54131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54131">CVE-2023-54131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256115">SUSE bug 1256115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54132</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54132" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54132" ref_url="https://www.suse.com/security/cve/CVE-2023-54132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: stop parsing non-compact HEAD index if clusterofs is invalid

Syzbot generated a crafted image [1] with a non-compact HEAD index of
clusterofs 33024 while valid numbers should be 0 ~ lclustersize-1,
which causes the following unexpected behavior as below:

 BUG: unable to handle page fault for address: fffff52101a3fff9
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 23ffed067 P4D 23ffed067 PUD 0
 Oops: 0000 [#1] PREEMPT SMP KASAN
 CPU: 1 PID: 4398 Comm: kworker/u5:1 Not tainted 6.3.0-rc6-syzkaller-g09a9639e56c0 #0
 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
 Workqueue: erofs_worker z_erofs_decompressqueue_work
 RIP: 0010:z_erofs_decompress_queue+0xb7e/0x2b40
 ...
 Call Trace:
  &lt;TASK&gt;
  z_erofs_decompressqueue_work+0x99/0xe0
  process_one_work+0x8f6/0x1170
  worker_thread+0xa63/0x1210
  kthread+0x270/0x300
  ret_from_fork+0x1f/0x30

Note that normal images or images using compact indexes are not
impacted.  Let's fix this now.

[1] https://lore.kernel.org/r/000000000000ec75b005ee97fbaa@google.com
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54132/">CVE-2023-54132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54132">CVE-2023-54132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256103">SUSE bug 1256103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54133</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54133" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54133" ref_url="https://www.suse.com/security/cve/CVE-2023-54133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfp: clean mc addresses in application firmware when closing port

When moving devices from one namespace to another, mc addresses are
cleaned in software while not removed from application firmware. Thus
the mc addresses are remained and will cause resource leak.

Now use `__dev_mc_unsync` to clean mc addresses when closing port.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54133/">CVE-2023-54133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54133">CVE-2023-54133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256104">SUSE bug 1256104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54134</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54134" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54134" ref_url="https://www.suse.com/security/cve/CVE-2023-54134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

autofs: fix memory leak of waitqueues in autofs_catatonic_mode

Syzkaller reports a memory leak:

BUG: memory leak
unreferenced object 0xffff88810b279e00 (size 96):
  comm "syz-executor399", pid 3631, jiffies 4294964921 (age 23.870s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 08 9e 27 0b 81 88 ff ff  ..........'.....
    08 9e 27 0b 81 88 ff ff 00 00 00 00 00 00 00 00  ..'.............
  backtrace:
    [&lt;ffffffff814cfc90&gt;] kmalloc_trace+0x20/0x90 mm/slab_common.c:1046
    [&lt;ffffffff81bb75ca&gt;] kmalloc include/linux/slab.h:576 [inline]
    [&lt;ffffffff81bb75ca&gt;] autofs_wait+0x3fa/0x9a0 fs/autofs/waitq.c:378
    [&lt;ffffffff81bb88a7&gt;] autofs_do_expire_multi+0xa7/0x3e0 fs/autofs/expire.c:593
    [&lt;ffffffff81bb8c33&gt;] autofs_expire_multi+0x53/0x80 fs/autofs/expire.c:619
    [&lt;ffffffff81bb6972&gt;] autofs_root_ioctl_unlocked+0x322/0x3b0 fs/autofs/root.c:897
    [&lt;ffffffff81bb6a95&gt;] autofs_root_ioctl+0x25/0x30 fs/autofs/root.c:910
    [&lt;ffffffff81602a9c&gt;] vfs_ioctl fs/ioctl.c:51 [inline]
    [&lt;ffffffff81602a9c&gt;] __do_sys_ioctl fs/ioctl.c:870 [inline]
    [&lt;ffffffff81602a9c&gt;] __se_sys_ioctl fs/ioctl.c:856 [inline]
    [&lt;ffffffff81602a9c&gt;] __x64_sys_ioctl+0xfc/0x140 fs/ioctl.c:856
    [&lt;ffffffff84608225&gt;] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [&lt;ffffffff84608225&gt;] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
    [&lt;ffffffff84800087&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd

autofs_wait_queue structs should be freed if their wait_ctr becomes zero.
Otherwise they will be lost.

In this case an AUTOFS_IOC_EXPIRE_MULTI ioctl is done, then a new
waitqueue struct is allocated in autofs_wait(), its initial wait_ctr
equals 2. After that wait_event_killable() is interrupted (it returns
-ERESTARTSYS), so that 'wq-&gt;name.name == NULL' condition may be not
satisfied. Actually, this condition can be satisfied when
autofs_wait_release() or autofs_catatonic_mode() is called and, what is
also important, wait_ctr is decremented in those places. Upon the exit of
autofs_wait(), wait_ctr is decremented to 1. Then the unmounting process
begins: kill_sb calls autofs_catatonic_mode(), which should have freed the
waitqueues, but it only decrements its usage counter to zero which is not
a correct behaviour.

edit:imk
This description is of course not correct. The umount performed as a result
of an expire is a umount of a mount that has been automounted, it's not the
autofs mount itself. They happen independently, usually after everything
mounted within the autofs file system has been expired away. If everything
hasn't been expired away the automount daemon can still exit leaving mounts
in place. But expires done in both cases will result in a notification that
calls autofs_wait_release() with a result status. The problem case is the
summary execution of of the automount daemon. In this case any waiting
processes won't be woken up until either they are terminated or the mount
is umounted.
end edit: imk

So in catatonic mode we should free waitqueues which counter becomes zero.

edit: imk
Initially I was concerned that the calling of autofs_wait_release() and
autofs_catatonic_mode() was not mutually exclusive but that can't be the
case (obviously) because the queue entry (or entries) is removed from the
list when either of these two functions are called. Consequently the wait
entry will be freed by only one of these functions or by the woken process
in autofs_wait() depending on the order of the calls.
end edit: imk
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54134/">CVE-2023-54134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54134">CVE-2023-54134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256106">SUSE bug 1256106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54135</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54135" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54135" ref_url="https://www.suse.com/security/cve/CVE-2023-54135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

maple_tree: fix potential out-of-bounds access in mas_wr_end_piv()

Check the write offset end bounds before using it as the offset into the
pivot array.  This avoids a possible out-of-bounds access on the pivot
array if the write extends to the last slot in the node, in which case the
node maximum should be used as the end pivot.

akpm: this doesn't affect any current callers, but new users of mapletree
may encounter this problem if backported into earlier kernels, so let's
fix it in -stable kernels in case of this.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54135/">CVE-2023-54135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54135">CVE-2023-54135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256107">SUSE bug 1256107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54136</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54136" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54136" ref_url="https://www.suse.com/security/cve/CVE-2023-54136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: sprd: Fix DMA buffer leak issue

Release DMA buffer when _probe() returns failure to avoid memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54136/">CVE-2023-54136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54136">CVE-2023-54136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256099">SUSE bug 1256099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54137</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54137" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54137" ref_url="https://www.suse.com/security/cve/CVE-2023-54137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio/type1: fix cap_migration information leak

Fix an information leak where an uninitialized hole in struct
vfio_iommu_type1_info_cap_migration on the stack is exposed to userspace.

The definition of struct vfio_iommu_type1_info_cap_migration contains a hole as
shown in this pahole(1) output:

  struct vfio_iommu_type1_info_cap_migration {
          struct vfio_info_cap_header header;              /*     0     8 */
          __u32                      flags;                /*     8     4 */

          /* XXX 4 bytes hole, try to pack */

          __u64                      pgsize_bitmap;        /*    16     8 */
          __u64                      max_dirty_bitmap_size; /*    24     8 */

          /* size: 32, cachelines: 1, members: 4 */
          /* sum members: 28, holes: 1, sum holes: 4 */
          /* last cacheline: 32 bytes */
  };

The cap_mig variable is filled in without initializing the hole:

  static int vfio_iommu_migration_build_caps(struct vfio_iommu *iommu,
                         struct vfio_info_cap *caps)
  {
      struct vfio_iommu_type1_info_cap_migration cap_mig;

      cap_mig.header.id = VFIO_IOMMU_TYPE1_INFO_CAP_MIGRATION;
      cap_mig.header.version = 1;

      cap_mig.flags = 0;
      /* support minimum pgsize */
      cap_mig.pgsize_bitmap = (size_t)1 &lt;&lt; __ffs(iommu-&gt;pgsize_bitmap);
      cap_mig.max_dirty_bitmap_size = DIRTY_BITMAP_SIZE_MAX;

      return vfio_info_add_capability(caps, &amp;cap_mig.header, sizeof(cap_mig));
  }

The structure is then copied to a temporary location on the heap. At this point
it's already too late and ioctl(VFIO_IOMMU_GET_INFO) copies it to userspace
later:

  int vfio_info_add_capability(struct vfio_info_cap *caps,
                   struct vfio_info_cap_header *cap, size_t size)
  {
      struct vfio_info_cap_header *header;

      header = vfio_info_cap_add(caps, size, cap-&gt;id, cap-&gt;version);
      if (IS_ERR(header))
          return PTR_ERR(header);

      memcpy(header + 1, cap + 1, size - sizeof(*header));

      return 0;
  }

This issue was found by code inspection.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54137/">CVE-2023-54137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54137">CVE-2023-54137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256100">SUSE bug 1256100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54138</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54138" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54138" ref_url="https://www.suse.com/security/cve/CVE-2023-54138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: fix NULL-deref on irq uninstall

In case of early initialisation errors and on platforms that do not use
the DPU controller, the deinitilisation code can be called with the kms
pointer set to NULL.

Patchwork: https://patchwork.freedesktop.org/patch/525104/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54138/">CVE-2023-54138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54138">CVE-2023-54138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256101">SUSE bug 1256101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54139</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54139" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54139" ref_url="https://www.suse.com/security/cve/CVE-2023-54139" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing/user_events: Ensure write index cannot be negative

The write index indicates which event the data is for and accesses a
per-file array. The index is passed by user processes during write()
calls as the first 4 bytes. Ensure that it cannot be negative by
returning -EINVAL to prevent out of bounds accesses.

Update ftrace self-test to ensure this occurs properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54139/">CVE-2023-54139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54139">CVE-2023-54139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256102">SUSE bug 1256102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54140</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54140" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54140" ref_url="https://www.suse.com/security/cve/CVE-2023-54140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse

A syzbot stress test using a corrupted disk image reported that
mark_buffer_dirty() called from __nilfs_mark_inode_dirty() or
nilfs_palloc_commit_alloc_entry() may output a kernel warning, and can
panic if the kernel is booted with panic_on_warn.

This is because nilfs2 keeps buffer pointers in local structures for some
metadata and reuses them, but such buffers may be forcibly discarded by
nilfs_clear_dirty_page() in some critical situations.

This issue is reported to appear after commit 28a65b49eb53 ("nilfs2: do
not write dirty data after degenerating to read-only"), but the issue has
potentially existed before.

Fix this issue by checking the uptodate flag when attempting to reuse an
internally held buffer, and reloading the metadata instead of reusing the
buffer if the flag was lost.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54140/">CVE-2023-54140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54140">CVE-2023-54140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256093">SUSE bug 1256093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54141</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54141" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54141" ref_url="https://www.suse.com/security/cve/CVE-2023-54141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: Add missing hw_ops-&gt;get_ring_selector() for IPQ5018

During sending data after clients connected, hw_ops-&gt;get_ring_selector()
will be called. But for IPQ5018, this member isn't set, and the
following NULL pointer exception will be occurred:

	[   38.840478] 8&lt;--- cut here ---
	[   38.840517] Unable to handle kernel NULL pointer dereference at virtual address 00000000
	...
	[   38.923161] PC is at 0x0
	[   38.927930] LR is at ath11k_dp_tx+0x70/0x730 [ath11k]
	...
	[   39.063264] Process hostapd (pid: 1034, stack limit = 0x801ceb3d)
	[   39.068994] Stack: (0x856a9a68 to 0x856aa000)
	...
	[   39.438467] [&lt;7f323804&gt;] (ath11k_dp_tx [ath11k]) from [&lt;7f314e6c&gt;] (ath11k_mac_op_tx+0x80/0x190 [ath11k])
	[   39.446607] [&lt;7f314e6c&gt;] (ath11k_mac_op_tx [ath11k]) from [&lt;7f17dbe0&gt;] (ieee80211_handle_wake_tx_queue+0x7c/0xc0 [mac80211])
	[   39.456162] [&lt;7f17dbe0&gt;] (ieee80211_handle_wake_tx_queue [mac80211]) from [&lt;7f174450&gt;] (ieee80211_probereq_get+0x584/0x704 [mac80211])
	[   39.467443] [&lt;7f174450&gt;] (ieee80211_probereq_get [mac80211]) from [&lt;7f178c40&gt;] (ieee80211_tx_prepare_skb+0x1f8/0x248 [mac80211])
	[   39.479334] [&lt;7f178c40&gt;] (ieee80211_tx_prepare_skb [mac80211]) from [&lt;7f179e28&gt;] (__ieee80211_subif_start_xmit+0x32c/0x3d4 [mac80211])
	[   39.491053] [&lt;7f179e28&gt;] (__ieee80211_subif_start_xmit [mac80211]) from [&lt;7f17af08&gt;] (ieee80211_tx_control_port+0x19c/0x288 [mac80211])
	[   39.502946] [&lt;7f17af08&gt;] (ieee80211_tx_control_port [mac80211]) from [&lt;7f0fc704&gt;] (nl80211_tx_control_port+0x174/0x1d4 [cfg80211])
	[   39.515017] [&lt;7f0fc704&gt;] (nl80211_tx_control_port [cfg80211]) from [&lt;808ceac4&gt;] (genl_rcv_msg+0x154/0x340)
	[   39.526814] [&lt;808ceac4&gt;] (genl_rcv_msg) from [&lt;808cdb74&gt;] (netlink_rcv_skb+0xb8/0x11c)
	[   39.536446] [&lt;808cdb74&gt;] (netlink_rcv_skb) from [&lt;808ce1d0&gt;] (genl_rcv+0x28/0x34)
	[   39.544344] [&lt;808ce1d0&gt;] (genl_rcv) from [&lt;808cd234&gt;] (netlink_unicast+0x174/0x274)
	[   39.551895] [&lt;808cd234&gt;] (netlink_unicast) from [&lt;808cd510&gt;] (netlink_sendmsg+0x1dc/0x440)
	[   39.559362] [&lt;808cd510&gt;] (netlink_sendmsg) from [&lt;808596e0&gt;] (____sys_sendmsg+0x1a8/0x1fc)
	[   39.567697] [&lt;808596e0&gt;] (____sys_sendmsg) from [&lt;8085b1a8&gt;] (___sys_sendmsg+0xa4/0xdc)
	[   39.575941] [&lt;8085b1a8&gt;] (___sys_sendmsg) from [&lt;8085b310&gt;] (sys_sendmsg+0x44/0x74)
	[   39.583841] [&lt;8085b310&gt;] (sys_sendmsg) from [&lt;80300060&gt;] (ret_fast_syscall+0x0/0x40)
	...
	[   39.620734] Code: bad PC value
	[   39.625869] ---[ end trace 8aef983ad3cbc032 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54141/">CVE-2023-54141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54141">CVE-2023-54141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256094">SUSE bug 1256094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54142</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54142" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54142" ref_url="https://www.suse.com/security/cve/CVE-2023-54142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gtp: Fix use-after-free in __gtp_encap_destroy().

syzkaller reported use-after-free in __gtp_encap_destroy(). [0]

It shows the same process freed sk and touched it illegally.

Commit e198987e7dd7 ("gtp: fix suspicious RCU usage") added lock_sock()
and release_sock() in __gtp_encap_destroy() to protect sk-&gt;sk_user_data,
but release_sock() is called after sock_put() releases the last refcnt.

[0]:
BUG: KASAN: slab-use-after-free in instrument_atomic_read_write include/linux/instrumented.h:96 [inline]
BUG: KASAN: slab-use-after-free in atomic_try_cmpxchg_acquire include/linux/atomic/atomic-instrumented.h:541 [inline]
BUG: KASAN: slab-use-after-free in queued_spin_lock include/asm-generic/qspinlock.h:111 [inline]
BUG: KASAN: slab-use-after-free in do_raw_spin_lock include/linux/spinlock.h:186 [inline]
BUG: KASAN: slab-use-after-free in __raw_spin_lock_bh include/linux/spinlock_api_smp.h:127 [inline]
BUG: KASAN: slab-use-after-free in _raw_spin_lock_bh+0x75/0xe0 kernel/locking/spinlock.c:178
Write of size 4 at addr ffff88800dbef398 by task syz-executor.2/2401

CPU: 1 PID: 2401 Comm: syz-executor.2 Not tainted 6.4.0-rc5-01219-gfa0e21fa4443 #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x72/0xa0 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:351 [inline]
 print_report+0xcc/0x620 mm/kasan/report.c:462
 kasan_report+0xb2/0xe0 mm/kasan/report.c:572
 check_region_inline mm/kasan/generic.c:181 [inline]
 kasan_check_range+0x39/0x1c0 mm/kasan/generic.c:187
 instrument_atomic_read_write include/linux/instrumented.h:96 [inline]
 atomic_try_cmpxchg_acquire include/linux/atomic/atomic-instrumented.h:541 [inline]
 queued_spin_lock include/asm-generic/qspinlock.h:111 [inline]
 do_raw_spin_lock include/linux/spinlock.h:186 [inline]
 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:127 [inline]
 _raw_spin_lock_bh+0x75/0xe0 kernel/locking/spinlock.c:178
 spin_lock_bh include/linux/spinlock.h:355 [inline]
 release_sock+0x1f/0x1a0 net/core/sock.c:3526
 gtp_encap_disable_sock drivers/net/gtp.c:651 [inline]
 gtp_encap_disable+0xb9/0x220 drivers/net/gtp.c:664
 gtp_dev_uninit+0x19/0x50 drivers/net/gtp.c:728
 unregister_netdevice_many_notify+0x97e/0x1520 net/core/dev.c:10841
 rtnl_delete_link net/core/rtnetlink.c:3216 [inline]
 rtnl_dellink+0x3c0/0xb30 net/core/rtnetlink.c:3268
 rtnetlink_rcv_msg+0x450/0xb10 net/core/rtnetlink.c:6423
 netlink_rcv_skb+0x15d/0x450 net/netlink/af_netlink.c:2548
 netlink_unicast_kernel net/netlink/af_netlink.c:1339 [inline]
 netlink_unicast+0x700/0x930 net/netlink/af_netlink.c:1365
 netlink_sendmsg+0x91c/0xe30 net/netlink/af_netlink.c:1913
 sock_sendmsg_nosec net/socket.c:724 [inline]
 sock_sendmsg+0x1b7/0x200 net/socket.c:747
 ____sys_sendmsg+0x75a/0x990 net/socket.c:2493
 ___sys_sendmsg+0x11d/0x1c0 net/socket.c:2547
 __sys_sendmsg+0xfe/0x1d0 net/socket.c:2576
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3f/0x90 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f1168b1fe5d
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48
RSP: 002b:00007f1167edccc8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00000000004bbf80 RCX: 00007f1168b1fe5d
RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000003
RBP: 00000000004bbf80 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007f1168b80530 R15: 0000000000000000
 &lt;/TASK&gt;

Allocated by task 1483:
 kasan_save_stack+0x22/0x50 mm/kasan/common.c:45
 kasan_set_track+0x25/0x30 mm/kasan/common.c:52
 __kasan_slab_alloc+0x
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-12"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54142/">CVE-2023-54142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54142">CVE-2023-54142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256095">SUSE bug 1256095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256097">SUSE bug 1256097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54143</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54143" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54143" ref_url="https://www.suse.com/security/cve/CVE-2023-54143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mediatek: vcodec: fix resource leaks in vdec_msg_queue_init()

If we encounter any error in the vdec_msg_queue_init() then we need
to set "msg_queue-&gt;wdma_addr.size = 0;".  Normally, this is done
inside the vdec_msg_queue_deinit() function.  However, if the
first call to allocate &amp;msg_queue-&gt;wdma_addr fails, then the
vdec_msg_queue_deinit() function is a no-op.  For that situation, just
set the size to zero explicitly and return.

There were two other error paths which did not clean up before returning.
Change those error paths to goto mem_alloc_err.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54143/">CVE-2023-54143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54143">CVE-2023-54143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256096">SUSE bug 1256096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54144</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54144" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54144" ref_url="https://www.suse.com/security/cve/CVE-2023-54144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix kernel warning during topology setup

This patch fixes the following kernel warning seen during
driver load by correctly initializing the p2plink attr before
creating the sysfs file:

[  +0.002865] ------------[ cut here ]------------
[  +0.002327] kobject: '(null)' (0000000056260cfb): is not initialized, yet kobject_put() is being called.
[  +0.004780] WARNING: CPU: 32 PID: 1006 at lib/kobject.c:718 kobject_put+0xaa/0x1c0
[  +0.001361] Call Trace:
[  +0.001234]  &lt;TASK&gt;
[  +0.001067]  kfd_remove_sysfs_node_entry+0x24a/0x2d0 [amdgpu]
[  +0.003147]  kfd_topology_update_sysfs+0x3d/0x750 [amdgpu]
[  +0.002890]  kfd_topology_add_device+0xbd7/0xc70 [amdgpu]
[  +0.002844]  ? lock_release+0x13c/0x2e0
[  +0.001936]  ? smu_cmn_send_smc_msg_with_param+0x1e8/0x2d0 [amdgpu]
[  +0.003313]  ? amdgpu_dpm_get_mclk+0x54/0x60 [amdgpu]
[  +0.002703]  kgd2kfd_device_init.cold+0x39f/0x4ed [amdgpu]
[  +0.002930]  amdgpu_amdkfd_device_init+0x13d/0x1f0 [amdgpu]
[  +0.002944]  amdgpu_device_init.cold+0x1464/0x17b4 [amdgpu]
[  +0.002970]  ? pci_bus_read_config_word+0x43/0x80
[  +0.002380]  amdgpu_driver_load_kms+0x15/0x100 [amdgpu]
[  +0.002744]  amdgpu_pci_probe+0x147/0x370 [amdgpu]
[  +0.002522]  local_pci_probe+0x40/0x80
[  +0.001896]  work_for_cpu_fn+0x10/0x20
[  +0.001892]  process_one_work+0x26e/0x5a0
[  +0.002029]  worker_thread+0x1fd/0x3e0
[  +0.001890]  ? process_one_work+0x5a0/0x5a0
[  +0.002115]  kthread+0xea/0x110
[  +0.001618]  ? kthread_complete_and_exit+0x20/0x20
[  +0.002422]  ret_from_fork+0x1f/0x30
[  +0.001808]  &lt;/TASK&gt;
[  +0.001103] irq event stamp: 59837
[  +0.001718] hardirqs last  enabled at (59849): [&lt;ffffffffb30fab12&gt;] __up_console_sem+0x52/0x60
[  +0.004414] hardirqs last disabled at (59860): [&lt;ffffffffb30faaf7&gt;] __up_console_sem+0x37/0x60
[  +0.004414] softirqs last  enabled at (59654): [&lt;ffffffffb307d9c7&gt;] irq_exit_rcu+0xd7/0x130
[  +0.004205] softirqs last disabled at (59649): [&lt;ffffffffb307d9c7&gt;] irq_exit_rcu+0xd7/0x130
[  +0.004203] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54144/">CVE-2023-54144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54144">CVE-2023-54144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256088">SUSE bug 1256088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54145</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54145" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54145" ref_url="https://www.suse.com/security/cve/CVE-2023-54145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: drop unnecessary user-triggerable WARN_ONCE in verifierl log

It's trivial for user to trigger "verifier log line truncated" warning,
as verifier has a fixed-sized buffer of 1024 bytes (as of now), and there are at
least two pieces of user-provided information that can be output through
this buffer, and both can be arbitrarily sized by user:
  - BTF names;
  - BTF.ext source code lines strings.

Verifier log buffer should be properly sized for typical verifier state
output. But it's sort-of expected that this buffer won't be long enough
in some circumstances. So let's drop the check. In any case code will
work correctly, at worst truncating a part of a single line output.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54145/">CVE-2023-54145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54145">CVE-2023-54145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256090">SUSE bug 1256090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54146</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54146" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54146" ref_url="https://www.suse.com/security/cve/CVE-2023-54146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/kexec: Fix double-free of elf header buffer

After

  b3e34a47f989 ("x86/kexec: fix memory leak of elf header buffer"),

freeing image-&gt;elf_headers in the error path of crash_load_segments()
is not needed because kimage_file_post_load_cleanup() will take
care of that later. And not clearing it could result in a double-free.

Drop the superfluous vfree() call at the error path of
crash_load_segments().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54146/">CVE-2023-54146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54146">CVE-2023-54146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256091">SUSE bug 1256091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54147</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54147" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54147" ref_url="https://www.suse.com/security/cve/CVE-2023-54147" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: platform: mtk-mdp3: Add missing check and free for ida_alloc

Add the check for the return value of the ida_alloc in order to avoid
NULL pointer dereference.
Moreover, free allocated "ctx-&gt;id" if mdp_m2m_open fails later in order
to avoid memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54147/">CVE-2023-54147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54147">CVE-2023-54147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256092">SUSE bug 1256092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54148</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54148" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54148" ref_url="https://www.suse.com/security/cve/CVE-2023-54148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Move representor neigh cleanup to profile cleanup_tx

For IP tunnel encapsulation in ECMP (Equal-Cost Multipath) mode, as
the flow is duplicated to the peer eswitch, the related neighbour
information on the peer uplink representor is created as well.

In the cited commit, eswitch devcom unpair is moved to uplink unload
API, specifically the profile-&gt;cleanup_tx. If there is a encap rule
offloaded in ECMP mode, when one eswitch does unpair (because of
unloading the driver, for instance), and the peer rule from the peer
eswitch is going to be deleted, the use-after-free error is triggered
while accessing neigh info, as it is already cleaned up in uplink's
profile-&gt;disable, which is before its profile-&gt;cleanup_tx.

To fix this issue, move the neigh cleanup to profile's cleanup_tx
callback, and after mlx5e_cleanup_uplink_rep_tx is called. The neigh
init is moved to init_tx for symmeter.

[ 2453.376299] BUG: KASAN: slab-use-after-free in mlx5e_rep_neigh_entry_release+0x109/0x3a0 [mlx5_core]
[ 2453.379125] Read of size 4 at addr ffff888127af9008 by task modprobe/2496

[ 2453.381542] CPU: 7 PID: 2496 Comm: modprobe Tainted: G    B              6.4.0-rc7+ #15
[ 2453.383386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[ 2453.384335] Call Trace:
[ 2453.384625]  &lt;TASK&gt;
[ 2453.384891]  dump_stack_lvl+0x33/0x50
[ 2453.385285]  print_report+0xc2/0x610
[ 2453.385667]  ? __virt_addr_valid+0xb1/0x130
[ 2453.386091]  ? mlx5e_rep_neigh_entry_release+0x109/0x3a0 [mlx5_core]
[ 2453.386757]  kasan_report+0xae/0xe0
[ 2453.387123]  ? mlx5e_rep_neigh_entry_release+0x109/0x3a0 [mlx5_core]
[ 2453.387798]  mlx5e_rep_neigh_entry_release+0x109/0x3a0 [mlx5_core]
[ 2453.388465]  mlx5e_rep_encap_entry_detach+0xa6/0xe0 [mlx5_core]
[ 2453.389111]  mlx5e_encap_dealloc+0xa7/0x100 [mlx5_core]
[ 2453.389706]  mlx5e_tc_tun_encap_dests_unset+0x61/0xb0 [mlx5_core]
[ 2453.390361]  mlx5_free_flow_attr_actions+0x11e/0x340 [mlx5_core]
[ 2453.391015]  ? complete_all+0x43/0xd0
[ 2453.391398]  ? free_flow_post_acts+0x38/0x120 [mlx5_core]
[ 2453.392004]  mlx5e_tc_del_fdb_flow+0x4ae/0x690 [mlx5_core]
[ 2453.392618]  mlx5e_tc_del_fdb_peers_flow+0x308/0x370 [mlx5_core]
[ 2453.393276]  mlx5e_tc_clean_fdb_peer_flows+0xf5/0x140 [mlx5_core]
[ 2453.393925]  mlx5_esw_offloads_unpair+0x86/0x540 [mlx5_core]
[ 2453.394546]  ? mlx5_esw_offloads_set_ns_peer.isra.0+0x180/0x180 [mlx5_core]
[ 2453.395268]  ? down_write+0xaa/0x100
[ 2453.395652]  mlx5_esw_offloads_devcom_event+0x203/0x530 [mlx5_core]
[ 2453.396317]  mlx5_devcom_send_event+0xbb/0x190 [mlx5_core]
[ 2453.396917]  mlx5_esw_offloads_devcom_cleanup+0xb0/0xd0 [mlx5_core]
[ 2453.397582]  mlx5e_tc_esw_cleanup+0x42/0x120 [mlx5_core]
[ 2453.398182]  mlx5e_rep_tc_cleanup+0x15/0x30 [mlx5_core]
[ 2453.398768]  mlx5e_cleanup_rep_tx+0x6c/0x80 [mlx5_core]
[ 2453.399367]  mlx5e_detach_netdev+0xee/0x120 [mlx5_core]
[ 2453.399957]  mlx5e_netdev_change_profile+0x84/0x170 [mlx5_core]
[ 2453.400598]  mlx5e_vport_rep_unload+0xe0/0xf0 [mlx5_core]
[ 2453.403781]  mlx5_eswitch_unregister_vport_reps+0x15e/0x190 [mlx5_core]
[ 2453.404479]  ? mlx5_eswitch_register_vport_reps+0x200/0x200 [mlx5_core]
[ 2453.405170]  ? up_write+0x39/0x60
[ 2453.405529]  ? kernfs_remove_by_name_ns+0xb7/0xe0
[ 2453.405985]  auxiliary_bus_remove+0x2e/0x40
[ 2453.406405]  device_release_driver_internal+0x243/0x2d0
[ 2453.406900]  ? kobject_put+0x42/0x2d0
[ 2453.407284]  bus_remove_device+0x128/0x1d0
[ 2453.407687]  device_del+0x240/0x550
[ 2453.408053]  ? waiting_for_supplier_show+0xe0/0xe0
[ 2453.408511]  ? kobject_put+0xfa/0x2d0
[ 2453.408889]  ? __kmem_cache_free+0x14d/0x280
[ 2453.409310]  mlx5_rescan_drivers_locked.part.0+0xcd/0x2b0 [mlx5_core]
[ 2453.409973]  mlx5_unregister_device+0x40/0x50 [mlx5_core]
[ 2453.410561]  mlx5_uninit_one+0x3d/0x110 [mlx5_core]
[ 2453.411111]  remove_one+0x89/0x130 [mlx5_core]
[ 24
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54148/">CVE-2023-54148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54148">CVE-2023-54148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256084">SUSE bug 1256084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54149</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54149" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54149" ref_url="https://www.suse.com/security/cve/CVE-2023-54149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: avoid suspicious RCU usage for synced VLAN-aware MAC addresses

When using the felix driver (the only one which supports UC filtering
and MC filtering) as a DSA master for a random other DSA switch, one can
see the following stack trace when the downstream switch ports join a
VLAN-aware bridge:

=============================
WARNING: suspicious RCU usage
-----------------------------
net/8021q/vlan_core.c:238 suspicious rcu_dereference_protected() usage!

stack backtrace:
Workqueue: dsa_ordered dsa_slave_switchdev_event_work
Call trace:
 lockdep_rcu_suspicious+0x170/0x210
 vlan_for_each+0x8c/0x188
 dsa_slave_sync_uc+0x128/0x178
 __hw_addr_sync_dev+0x138/0x158
 dsa_slave_set_rx_mode+0x58/0x70
 __dev_set_rx_mode+0x88/0xa8
 dev_uc_add+0x74/0xa0
 dsa_port_bridge_host_fdb_add+0xec/0x180
 dsa_slave_switchdev_event_work+0x7c/0x1c8
 process_one_work+0x290/0x568

What it's saying is that vlan_for_each() expects rtnl_lock() context and
it's not getting it, when it's called from the DSA master's ndo_set_rx_mode().

The caller of that - dsa_slave_set_rx_mode() - is the slave DSA
interface's dsa_port_bridge_host_fdb_add() which comes from the deferred
dsa_slave_switchdev_event_work().

We went to great lengths to avoid the rtnl_lock() context in that call
path in commit 0faf890fc519 ("net: dsa: drop rtnl_lock from
dsa_slave_switchdev_event_work"), and calling rtnl_lock() is simply not
an option due to the possibility of deadlocking when calling
dsa_flush_workqueue() from the call paths that do hold rtnl_lock() -
basically all of them.

So, when the DSA master calls vlan_for_each() from its ndo_set_rx_mode(),
the state of the 8021q driver on this device is really not protected
from concurrent access by anything.

Looking at net/8021q/, I don't think that vlan_info-&gt;vid_list was
particularly designed with RCU traversal in mind, so introducing an RCU
read-side form of vlan_for_each() - vlan_for_each_rcu() - won't be so
easy, and it also wouldn't be exactly what we need anyway.

In general I believe that the solution isn't in net/8021q/ anyway;
vlan_for_each() is not cut out for this task. DSA doesn't need rtnl_lock()
to be held per se - since it's not a netdev state change that we're
blocking, but rather, just concurrent additions/removals to a VLAN list.
We don't even need sleepable context - the callback of vlan_for_each()
just schedules deferred work.

The proposed escape is to remove the dependency on vlan_for_each() and
to open-code a non-sleepable, rtnl-free alternative to that, based on
copies of the VLAN list modified from .ndo_vlan_rx_add_vid() and
.ndo_vlan_rx_kill_vid().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54149/">CVE-2023-54149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54149">CVE-2023-54149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256085">SUSE bug 1256085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54150</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54150" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54150" ref_url="https://www.suse.com/security/cve/CVE-2023-54150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd: Fix an out of bounds error in BIOS parser

The array is hardcoded to 8 in atomfirmware.h, but firmware provides
a bigger one sometimes. Deferencing the larger array causes an out
of bounds error.

commit 4fc1ba4aa589 ("drm/amd/display: fix array index out of bound error
in bios parser") fixed some of this, but there are two other cases
not covered by it.  Fix those as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54150/">CVE-2023-54150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54150">CVE-2023-54150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256086">SUSE bug 1256086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54151</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54151" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54151" ref_url="https://www.suse.com/security/cve/CVE-2023-54151" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: Fix system crash due to lack of free space in LFS

When f2fs tries to checkpoint during foreground gc in LFS mode, system
crash occurs due to lack of free space if the amount of dirty node and
dentry pages generated by data migration exceeds free space.
The reproduction sequence is as follows.

 - 20GiB capacity block device (null_blk)
 - format and mount with LFS mode
 - create a file and write 20,000MiB
 - 4k random write on full range of the file

 RIP: 0010:new_curseg+0x48a/0x510 [f2fs]
 Code: 55 e7 f5 89 c0 48 0f af c3 48 8b 5d c0 48 c1 e8 20 83 c0 01 89 43 6c 48 83 c4 28 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc &lt;0f&gt; 0b f0 41 80 4f 48 04 45 85 f6 0f 84 ba fd ff ff e9 ef fe ff ff
 RSP: 0018:ffff977bc397b218 EFLAGS: 00010246
 RAX: 00000000000027b9 RBX: 0000000000000000 RCX: 00000000000027c0
 RDX: 0000000000000000 RSI: 00000000000027b9 RDI: ffff8c25ab4e74f8
 RBP: ffff977bc397b268 R08: 00000000000027b9 R09: ffff8c29e4a34b40
 R10: 0000000000000001 R11: ffff977bc397b0d8 R12: 0000000000000000
 R13: ffff8c25b4dd81a0 R14: 0000000000000000 R15: ffff8c2f667f9000
 FS: 0000000000000000(0000) GS:ffff8c344ec80000(0000) knlGS:0000000000000000
 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000000c00055d000 CR3: 0000000e30810003 CR4: 00000000003706e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
 &lt;TASK&gt;
 allocate_segment_by_default+0x9c/0x110 [f2fs]
 f2fs_allocate_data_block+0x243/0xa30 [f2fs]
 ? __mod_lruvec_page_state+0xa0/0x150
 do_write_page+0x80/0x160 [f2fs]
 f2fs_do_write_node_page+0x32/0x50 [f2fs]
 __write_node_page+0x339/0x730 [f2fs]
 f2fs_sync_node_pages+0x5a6/0x780 [f2fs]
 block_operations+0x257/0x340 [f2fs]
 f2fs_write_checkpoint+0x102/0x1050 [f2fs]
 f2fs_gc+0x27c/0x630 [f2fs]
 ? folio_mark_dirty+0x36/0x70
 f2fs_balance_fs+0x16f/0x180 [f2fs]

This patch adds checking whether free sections are enough before checkpoint
during gc.

[Jaegeuk Kim: code clean-up]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54151/">CVE-2023-54151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54151">CVE-2023-54151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256087">SUSE bug 1256087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54152</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54152" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54152" ref_url="https://www.suse.com/security/cve/CVE-2023-54152" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: prevent deadlock by moving j1939_sk_errqueue()

This commit addresses a deadlock situation that can occur in certain
scenarios, such as when running data TP/ETP transfer and subscribing to
the error queue while receiving a net down event. The deadlock involves
locks in the following order:

3
  j1939_session_list_lock -&gt;  active_session_list_lock
  j1939_session_activate
  ...
  j1939_sk_queue_activate_next -&gt; sk_session_queue_lock
  ...
  j1939_xtp_rx_eoma_one

2
  j1939_sk_queue_drop_all  -&gt;  sk_session_queue_lock
  ...
  j1939_sk_netdev_event_netdown -&gt; j1939_socks_lock
  j1939_netdev_notify

1
  j1939_sk_errqueue -&gt; j1939_socks_lock
  __j1939_session_cancel -&gt; active_session_list_lock
  j1939_tp_rxtimer

       CPU0                    CPU1
       ----                    ----
  lock(&amp;priv-&gt;active_session_list_lock);
                               lock(&amp;jsk-&gt;sk_session_queue_lock);
                               lock(&amp;priv-&gt;active_session_list_lock);
  lock(&amp;priv-&gt;j1939_socks_lock);

The solution implemented in this commit is to move the
j1939_sk_errqueue() call out of the active_session_list_lock context,
thus preventing the deadlock situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54152/">CVE-2023-54152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54152">CVE-2023-54152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256080">SUSE bug 1256080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54153</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54153" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54153" ref_url="https://www.suse.com/security/cve/CVE-2023-54153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: turn quotas off if mount failed after enabling quotas

Yi found during a review of the patch "ext4: don't BUG on inconsistent
journal feature" that when ext4_mark_recovery_complete() returns an error
value, the error handling path does not turn off the enabled quotas,
which triggers the following kmemleak:

================================================================
unreferenced object 0xffff8cf68678e7c0 (size 64):
comm "mount", pid 746, jiffies 4294871231 (age 11.540s)
hex dump (first 32 bytes):
00 90 ef 82 f6 8c ff ff 00 00 00 00 41 01 00 00  ............A...
c7 00 00 00 bd 00 00 00 0a 00 00 00 48 00 00 00  ............H...
backtrace:
[&lt;00000000c561ef24&gt;] __kmem_cache_alloc_node+0x4d4/0x880
[&lt;00000000d4e621d7&gt;] kmalloc_trace+0x39/0x140
[&lt;00000000837eee74&gt;] v2_read_file_info+0x18a/0x3a0
[&lt;0000000088f6c877&gt;] dquot_load_quota_sb+0x2ed/0x770
[&lt;00000000340a4782&gt;] dquot_load_quota_inode+0xc6/0x1c0
[&lt;0000000089a18bd5&gt;] ext4_enable_quotas+0x17e/0x3a0 [ext4]
[&lt;000000003a0268fa&gt;] __ext4_fill_super+0x3448/0x3910 [ext4]
[&lt;00000000b0f2a8a8&gt;] ext4_fill_super+0x13d/0x340 [ext4]
[&lt;000000004a9489c4&gt;] get_tree_bdev+0x1dc/0x370
[&lt;000000006e723bf1&gt;] ext4_get_tree+0x1d/0x30 [ext4]
[&lt;00000000c7cb663d&gt;] vfs_get_tree+0x31/0x160
[&lt;00000000320e1bed&gt;] do_new_mount+0x1d5/0x480
[&lt;00000000c074654c&gt;] path_mount+0x22e/0xbe0
[&lt;0000000003e97a8e&gt;] do_mount+0x95/0xc0
[&lt;000000002f3d3736&gt;] __x64_sys_mount+0xc4/0x160
[&lt;0000000027d2140c&gt;] do_syscall_64+0x3f/0x90
================================================================

To solve this problem, we add a "failed_mount10" tag, and call
ext4_quota_off_umount() in this tag to release the enabled qoutas.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54153/">CVE-2023-54153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54153">CVE-2023-54153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256081">SUSE bug 1256081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54154</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54154" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54154" ref_url="https://www.suse.com/security/cve/CVE-2023-54154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: core: Fix target_cmd_counter leak

The target_cmd_counter struct allocated via target_alloc_cmd_counter() is
never freed, resulting in leaks across various transport types, e.g.:

 unreferenced object 0xffff88801f920120 (size 96):
  comm "sh", pid 102, jiffies 4294892535 (age 713.412s)
  hex dump (first 32 bytes):
    07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 38 01 92 1f 80 88 ff ff  ........8.......
  backtrace:
    [&lt;00000000e58a6252&gt;] kmalloc_trace+0x11/0x20
    [&lt;0000000043af4b2f&gt;] target_alloc_cmd_counter+0x17/0x90 [target_core_mod]
    [&lt;000000007da2dfa7&gt;] target_setup_session+0x2d/0x140 [target_core_mod]
    [&lt;0000000068feef86&gt;] tcm_loop_tpg_nexus_store+0x19b/0x350 [tcm_loop]
    [&lt;000000006a80e021&gt;] configfs_write_iter+0xb1/0x120
    [&lt;00000000e9f4d860&gt;] vfs_write+0x2e4/0x3c0
    [&lt;000000008143433b&gt;] ksys_write+0x80/0xb0
    [&lt;00000000a7df29b2&gt;] do_syscall_64+0x42/0x90
    [&lt;0000000053f45fb8&gt;] entry_SYSCALL_64_after_hwframe+0x6e/0xd8

Free the structure alongside the corresponding iscsit_conn / se_sess
parent.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54154/">CVE-2023-54154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54154">CVE-2023-54154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256082">SUSE bug 1256082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54155</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54155" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54155" ref_url="https://www.suse.com/security/cve/CVE-2023-54155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: core: remove unnecessary frame_sz check in bpf_xdp_adjust_tail()

Syzkaller reported the following issue:
=======================================
Too BIG xdp-&gt;frame_sz = 131072
WARNING: CPU: 0 PID: 5020 at net/core/filter.c:4121
  ____bpf_xdp_adjust_tail net/core/filter.c:4121 [inline]
WARNING: CPU: 0 PID: 5020 at net/core/filter.c:4121
  bpf_xdp_adjust_tail+0x466/0xa10 net/core/filter.c:4103
...
Call Trace:
 &lt;TASK&gt;
 bpf_prog_4add87e5301a4105+0x1a/0x1c
 __bpf_prog_run include/linux/filter.h:600 [inline]
 bpf_prog_run_xdp include/linux/filter.h:775 [inline]
 bpf_prog_run_generic_xdp+0x57e/0x11e0 net/core/dev.c:4721
 netif_receive_generic_xdp net/core/dev.c:4807 [inline]
 do_xdp_generic+0x35c/0x770 net/core/dev.c:4866
 tun_get_user+0x2340/0x3ca0 drivers/net/tun.c:1919
 tun_chr_write_iter+0xe8/0x210 drivers/net/tun.c:2043
 call_write_iter include/linux/fs.h:1871 [inline]
 new_sync_write fs/read_write.c:491 [inline]
 vfs_write+0x650/0xe40 fs/read_write.c:584
 ksys_write+0x12f/0x250 fs/read_write.c:637
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

xdp-&gt;frame_sz &gt; PAGE_SIZE check was introduced in commit c8741e2bfe87
("xdp: Allow bpf_xdp_adjust_tail() to grow packet size"). But Jesper
Dangaard Brouer &lt;jbrouer@redhat.com&gt; noted that after introducing the
xdp_init_buff() which all XDP driver use - it's safe to remove this
check. The original intend was to catch cases where XDP drivers have
not been updated to use xdp.frame_sz, but that is not longer a concern
(since xdp_init_buff).

Running the initial syzkaller repro it was discovered that the
contiguous physical memory allocation is used for both xdp paths in
tun_get_user(), e.g. tun_build_skb() and tun_alloc_skb(). It was also
stated by Jesper Dangaard Brouer &lt;jbrouer@redhat.com&gt; that XDP can
work on higher order pages, as long as this is contiguous physical
memory (e.g. a page).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54155/">CVE-2023-54155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54155">CVE-2023-54155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256083">SUSE bug 1256083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54156</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54156" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54156" ref_url="https://www.suse.com/security/cve/CVE-2023-54156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sfc: fix crash when reading stats while NIC is resetting

efx_net_stats() (.ndo_get_stats64) can be called during an ethtool
 selftest, during which time nic_data-&gt;mc_stats is NULL as the NIC has
 been fini'd.  In this case do not attempt to fetch the latest stats
 from the hardware, else we will crash on a NULL dereference:
    BUG: kernel NULL pointer dereference, address: 0000000000000038
    RIP efx_nic_update_stats
    abridged calltrace:
    efx_ef10_update_stats_pf
    efx_net_stats
    dev_get_stats
    dev_seq_printf_stats
Skipping the read is safe, we will simply give out stale stats.
To ensure that the free in efx_ef10_fini_nic() does not race against
 efx_ef10_update_stats_pf(), which could cause a TOCTTOU bug, take the
 efx-&gt;stats_lock in fini_nic (it is already held across update_stats).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-30"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54156/">CVE-2023-54156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54156">CVE-2023-54156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255704">SUSE bug 1255704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54157</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54157" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54157" ref_url="https://www.suse.com/security/cve/CVE-2023-54157" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binder: fix UAF of alloc-&gt;vma in race with munmap()

[ cmllamas: clean forward port from commit 015ac18be7de ("binder: fix
  UAF of alloc-&gt;vma in race with munmap()") in 5.10 stable. It is needed
  in mainline after the revert of commit a43cfc87caaf ("android: binder:
  stop saving a pointer to the VMA") as pointed out by Liam. The commit
  log and tags have been tweaked to reflect this. ]

In commit 720c24192404 ("ANDROID: binder: change down_write to
down_read") binder assumed the mmap read lock is sufficient to protect
alloc-&gt;vma inside binder_update_page_range(). This used to be accurate
until commit dd2283f2605e ("mm: mmap: zap pages with read mmap_sem in
munmap"), which now downgrades the mmap_lock after detaching the vma
from the rbtree in munmap(). Then it proceeds to teardown and free the
vma with only the read lock held.

This means that accesses to alloc-&gt;vma in binder_update_page_range() now
will race with vm_area_free() in munmap() and can cause a UAF as shown
in the following KASAN trace:

  ==================================================================
  BUG: KASAN: use-after-free in vm_insert_page+0x7c/0x1f0
  Read of size 8 at addr ffff16204ad00600 by task server/558

  CPU: 3 PID: 558 Comm: server Not tainted 5.10.150-00001-gdc8dcf942daa #1
  Hardware name: linux,dummy-virt (DT)
  Call trace:
   dump_backtrace+0x0/0x2a0
   show_stack+0x18/0x2c
   dump_stack+0xf8/0x164
   print_address_description.constprop.0+0x9c/0x538
   kasan_report+0x120/0x200
   __asan_load8+0xa0/0xc4
   vm_insert_page+0x7c/0x1f0
   binder_update_page_range+0x278/0x50c
   binder_alloc_new_buf+0x3f0/0xba0
   binder_transaction+0x64c/0x3040
   binder_thread_write+0x924/0x2020
   binder_ioctl+0x1610/0x2e5c
   __arm64_sys_ioctl+0xd4/0x120
   el0_svc_common.constprop.0+0xac/0x270
   do_el0_svc+0x38/0xa0
   el0_svc+0x1c/0x2c
   el0_sync_handler+0xe8/0x114
   el0_sync+0x180/0x1c0

  Allocated by task 559:
   kasan_save_stack+0x38/0x6c
   __kasan_kmalloc.constprop.0+0xe4/0xf0
   kasan_slab_alloc+0x18/0x2c
   kmem_cache_alloc+0x1b0/0x2d0
   vm_area_alloc+0x28/0x94
   mmap_region+0x378/0x920
   do_mmap+0x3f0/0x600
   vm_mmap_pgoff+0x150/0x17c
   ksys_mmap_pgoff+0x284/0x2dc
   __arm64_sys_mmap+0x84/0xa4
   el0_svc_common.constprop.0+0xac/0x270
   do_el0_svc+0x38/0xa0
   el0_svc+0x1c/0x2c
   el0_sync_handler+0xe8/0x114
   el0_sync+0x180/0x1c0

  Freed by task 560:
   kasan_save_stack+0x38/0x6c
   kasan_set_track+0x28/0x40
   kasan_set_free_info+0x24/0x4c
   __kasan_slab_free+0x100/0x164
   kasan_slab_free+0x14/0x20
   kmem_cache_free+0xc4/0x34c
   vm_area_free+0x1c/0x2c
   remove_vma+0x7c/0x94
   __do_munmap+0x358/0x710
   __vm_munmap+0xbc/0x130
   __arm64_sys_munmap+0x4c/0x64
   el0_svc_common.constprop.0+0xac/0x270
   do_el0_svc+0x38/0xa0
   el0_svc+0x1c/0x2c
   el0_sync_handler+0xe8/0x114
   el0_sync+0x180/0x1c0

  [...]
  ==================================================================

To prevent the race above, revert back to taking the mmap write lock
inside binder_update_page_range(). One might expect an increase of mmap
lock contention. However, binder already serializes these calls via top
level alloc-&gt;mutex. Also, there was no performance impact shown when
running the binder benchmark tests.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-30"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54157/">CVE-2023-54157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54157">CVE-2023-54157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255705">SUSE bug 1255705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54158</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54158" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54158" ref_url="https://www.suse.com/security/cve/CVE-2023-54158" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: don't free qgroup space unless specified

Boris noticed in his simple quotas testing that he was getting a leak
with Sweet Tea's change to subvol create that stopped doing a
transaction commit.  This was just a side effect of that change.

In the delayed inode code we have an optimization that will free extra
reservations if we think we can pack a dir item into an already modified
leaf.  Previously this wouldn't be triggered in the subvolume create
case because we'd commit the transaction, it was still possible but
much harder to trigger.  It could actually be triggered if we did a
mkdir &amp;&amp; subvol create with qgroups enabled.

This occurs because in btrfs_insert_delayed_dir_index(), which gets
called when we're adding the dir item, we do the following:

  btrfs_block_rsv_release(fs_info, trans-&gt;block_rsv, bytes, NULL);

if we're able to skip reserving space.

The problem here is that trans-&gt;block_rsv points at the temporary block
rsv for the subvolume create, which has qgroup reservations in the block
rsv.

This is a problem because btrfs_block_rsv_release() will do the
following:

  if (block_rsv-&gt;qgroup_rsv_reserved &gt;= block_rsv-&gt;qgroup_rsv_size) {
	  qgroup_to_release = block_rsv-&gt;qgroup_rsv_reserved -
		  block_rsv-&gt;qgroup_rsv_size;
	  block_rsv-&gt;qgroup_rsv_reserved = block_rsv-&gt;qgroup_rsv_size;
  }

The temporary block rsv just has -&gt;qgroup_rsv_reserved set,
-&gt;qgroup_rsv_size == 0.  The optimization in
btrfs_insert_delayed_dir_index() sets -&gt;qgroup_rsv_reserved = 0.  Then
later on when we call btrfs_subvolume_release_metadata() which has

  btrfs_block_rsv_release(fs_info, rsv, (u64)-1, &amp;qgroup_to_release);
  btrfs_qgroup_convert_reserved_meta(root, qgroup_to_release);

qgroup_to_release is set to 0, and we do not convert the reserved
metadata space.

The problem here is that the block rsv code has been unconditionally
messing with -&gt;qgroup_rsv_reserved, because the main place this is used
is delalloc, and any time we call btrfs_block_rsv_release() we do it
with qgroup_to_release set, and thus do the proper accounting.

The subvolume code is the only other code that uses the qgroup
reservation stuff, but it's intermingled with the above optimization,
and thus was getting its reservation freed out from underneath it and
thus leaking the reserved space.

The solution is to simply not mess with the qgroup reservations if we
don't have qgroup_to_release set.  This works with the existing code as
anything that messes with the delalloc reservations always have
qgroup_to_release set.  This fixes the leak that Boris was observing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54158/">CVE-2023-54158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54158">CVE-2023-54158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256076">SUSE bug 1256076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54159</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54159" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54159" ref_url="https://www.suse.com/security/cve/CVE-2023-54159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: mtu3: fix kernel panic at qmu transfer done irq handler

When handle qmu transfer irq, it will unlock @mtu-&gt;lock before give back
request, if another thread handle disconnect event at the same time, and
try to disable ep, it may lock @mtu-&gt;lock and free qmu ring, then qmu
irq hanlder may get a NULL gpd, avoid the KE by checking gpd's value before
handling it.

e.g.
qmu done irq on cpu0                 thread running on cpu1

qmu_done_tx()
  handle gpd [0]
    mtu3_requ_complete()        mtu3_gadget_ep_disable()
      unlock @mtu-&gt;lock
        give back request         lock @mtu-&gt;lock
                                    mtu3_ep_disable()
                                      mtu3_gpd_ring_free()
                                   unlock @mtu-&gt;lock
      lock @mtu-&gt;lock
    get next gpd [1]

[1]: goto [0] to handle next gpd, and next gpd may be NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-30"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54159/">CVE-2023-54159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54159">CVE-2023-54159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255697">SUSE bug 1255697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54160</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54160" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54160" ref_url="https://www.suse.com/security/cve/CVE-2023-54160" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_sdei: Fix sleep from invalid context BUG

Running a preempt-rt (v6.2-rc3-rt1) based kernel on an Ampere Altra
triggers:

  BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46
  in_atomic(): 0, irqs_disabled(): 128, non_block: 0, pid: 24, name: cpuhp/0
  preempt_count: 0, expected: 0
  RCU nest depth: 0, expected: 0
  3 locks held by cpuhp/0/24:
    #0: ffffda30217c70d0 (cpu_hotplug_lock){++++}-{0:0}, at: cpuhp_thread_fun+0x5c/0x248
    #1: ffffda30217c7120 (cpuhp_state-up){+.+.}-{0:0}, at: cpuhp_thread_fun+0x5c/0x248
    #2: ffffda3021c711f0 (sdei_list_lock){....}-{3:3}, at: sdei_cpuhp_up+0x3c/0x130
  irq event stamp: 36
  hardirqs last  enabled at (35): [&lt;ffffda301e85b7bc&gt;] finish_task_switch+0xb4/0x2b0
  hardirqs last disabled at (36): [&lt;ffffda301e812fec&gt;] cpuhp_thread_fun+0x21c/0x248
  softirqs last  enabled at (0): [&lt;ffffda301e80b184&gt;] copy_process+0x63c/0x1ac0
  softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0
  CPU: 0 PID: 24 Comm: cpuhp/0 Not tainted 5.19.0-rc3-rt5-[...]
  Hardware name: WIWYNN Mt.Jade Server [...]
  Call trace:
    dump_backtrace+0x114/0x120
    show_stack+0x20/0x70
    dump_stack_lvl+0x9c/0xd8
    dump_stack+0x18/0x34
    __might_resched+0x188/0x228
    rt_spin_lock+0x70/0x120
    sdei_cpuhp_up+0x3c/0x130
    cpuhp_invoke_callback+0x250/0xf08
    cpuhp_thread_fun+0x120/0x248
    smpboot_thread_fn+0x280/0x320
    kthread+0x130/0x140
    ret_from_fork+0x10/0x20

sdei_cpuhp_up() is called in the STARTING hotplug section,
which runs with interrupts disabled. Use a CPUHP_AP_ONLINE_DYN entry
instead to execute the cpuhp cb later, with preemption enabled.

SDEI originally got its own cpuhp slot to allow interacting
with perf. It got superseded by pNMI and this early slot is not
relevant anymore. [1]

Some SDEI calls (e.g. SDEI_1_0_FN_SDEI_PE_MASK) take actions on the
calling CPU. It is checked that preemption is disabled for them.
_ONLINE cpuhp cb are executed in the 'per CPU hotplug thread'.
Preemption is enabled in those threads, but their cpumask is limited
to 1 CPU.
Move 'WARN_ON_ONCE(preemptible())' statements so that SDEI cpuhp cb
don't trigger them.

Also add a check for the SDEI_1_0_FN_SDEI_PRIVATE_RESET SDEI call
which acts on the calling CPU.

[1]:
https://lore.kernel.org/all/5813b8c5-ae3e-87fd-fccc-94c9cd08816d@arm.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54160/">CVE-2023-54160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54160">CVE-2023-54160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256077">SUSE bug 1256077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54162</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54162" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54162" ref_url="https://www.suse.com/security/cve/CVE-2023-54162" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix possible memory leak in smb2_lock()

argv needs to be free when setup_async_work fails or when the current
process is woken up.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54162/">CVE-2023-54162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54162">CVE-2023-54162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256079">SUSE bug 1256079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54164</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54164" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54164" ref_url="https://www.suse.com/security/cve/CVE-2023-54164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: ISO: fix iso_conn related locking and validity issues

sk-&gt;sk_state indicates whether iso_pi(sk)-&gt;conn is valid. Operations
that check/update sk_state and access conn should hold lock_sock,
otherwise they can race.

The order of taking locks is hci_dev_lock &gt; lock_sock &gt; iso_conn_lock,
which is how it is in connect/disconnect_cfm -&gt; iso_conn_del -&gt;
iso_chan_del.

Fix locking in iso_connect_cis/bis and sendmsg/recvmsg to take lock_sock
around updating sk_state and conn.

iso_conn_del must not occur during iso_connect_cis/bis, as it frees the
iso_conn. Hold hdev-&gt;lock longer to prevent that.

This should not reintroduce the issue fixed in commit 241f51931c35
("Bluetooth: ISO: Avoid circular locking dependency"), since the we
acquire locks in order. We retain the fix in iso_sock_connect to release
lock_sock before iso_connect_* acquires hdev-&gt;lock.

Similarly for commit 6a5ad251b7cd ("Bluetooth: ISO: Fix possible
circular locking dependency"). We retain the fix in iso_conn_ready to
not acquire iso_conn_lock before lock_sock.

iso_conn_add shall return iso_conn with valid hcon. Make it so also when
reusing an old CIS connection waiting for disconnect timeout (see
__iso_sock_close where conn-&gt;hcon is set to NULL).

Trace with iso_conn_del after iso_chan_add in iso_connect_cis:
===============================================================
iso_sock_create:771: sock 00000000be9b69b7
iso_sock_init:693: sk 000000004dff667e
iso_sock_bind:827: sk 000000004dff667e 70:1a:b8:98:ff:a2 type 1
iso_sock_setsockopt:1289: sk 000000004dff667e
iso_sock_setsockopt:1289: sk 000000004dff667e
iso_sock_setsockopt:1289: sk 000000004dff667e
iso_sock_connect:875: sk 000000004dff667e
iso_connect_cis:353: 70:1a:b8:98:ff:a2 -&gt; 28:3d:c2:4a:7e:da
hci_get_route:1199: 70:1a:b8:98:ff:a2 -&gt; 28:3d:c2:4a:7e:da
hci_conn_add:1005: hci0 dst 28:3d:c2:4a:7e:da
iso_conn_add:140: hcon 000000007b65d182 conn 00000000daf8625e
__iso_chan_add:214: conn 00000000daf8625e
iso_connect_cfm:1700: hcon 000000007b65d182 bdaddr 28:3d:c2:4a:7e:da status 12
iso_conn_del:187: hcon 000000007b65d182 conn 00000000daf8625e, err 16
iso_sock_clear_timer:117: sock 000000004dff667e state 3
    &lt;Note: sk_state is BT_BOUND (3), so iso_connect_cis is still
    running at this point&gt;
iso_chan_del:153: sk 000000004dff667e, conn 00000000daf8625e, err 16
hci_conn_del:1151: hci0 hcon 000000007b65d182 handle 65535
hci_conn_unlink:1102: hci0: hcon 000000007b65d182
hci_chan_list_flush:2780: hcon 000000007b65d182
iso_sock_getsockopt:1376: sk 000000004dff667e
iso_sock_getname:1070: sock 00000000be9b69b7, sk 000000004dff667e
iso_sock_getname:1070: sock 00000000be9b69b7, sk 000000004dff667e
iso_sock_getsockopt:1376: sk 000000004dff667e
iso_sock_getname:1070: sock 00000000be9b69b7, sk 000000004dff667e
iso_sock_getname:1070: sock 00000000be9b69b7, sk 000000004dff667e
iso_sock_shutdown:1434: sock 00000000be9b69b7, sk 000000004dff667e, how 1
__iso_sock_close:632: sk 000000004dff667e state 5 socket 00000000be9b69b7
     &lt;Note: sk_state is BT_CONNECT (5), even though iso_chan_del sets
     BT_CLOSED (6). Only iso_connect_cis sets it to BT_CONNECT, so it
     must be that iso_chan_del occurred between iso_chan_add and end of
     iso_connect_cis.&gt;
BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 8000000006467067 P4D 8000000006467067 PUD 3f5f067 PMD 0
Oops: 0000 [#1] PREEMPT SMP PTI
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014
RIP: 0010:__iso_sock_close (net/bluetooth/iso.c:664) bluetooth
===============================================================

Trace with iso_conn_del before iso_chan_add in iso_connect_cis:
===============================================================
iso_connect_cis:356: 70:1a:b8:98:ff:a2 -&gt; 28:3d:c2:4a:7e:da
...
iso_conn_add:140: hcon 0000000093bc551f conn 00000000768ae504
hci_dev_put:1487: hci0 orig refcnt 21
hci_event_packet:7607: hci0: e
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54164/">CVE-2023-54164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54164">CVE-2023-54164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256071">SUSE bug 1256071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54165</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54165" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54165" ref_url="https://www.suse.com/security/cve/CVE-2023-54165" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

zsmalloc: move LRU update from zs_map_object() to zs_malloc()

Under memory pressure, we sometimes observe the following crash:

[ 5694.832838] ------------[ cut here ]------------
[ 5694.842093] list_del corruption, ffff888014b6a448-&gt;next is LIST_POISON1 (dead000000000100)
[ 5694.858677] WARNING: CPU: 33 PID: 418824 at lib/list_debug.c:47 __list_del_entry_valid+0x42/0x80
[ 5694.961820] CPU: 33 PID: 418824 Comm: fuse_counters.s Kdump: loaded Tainted: G S                5.19.0-0_fbk3_rc3_hoangnhatpzsdynshrv41_10870_g85a9558a25de #1
[ 5694.990194] Hardware name: Wiwynn Twin Lakes MP/Twin Lakes Passive MP, BIOS YMM16 05/24/2021
[ 5695.007072] RIP: 0010:__list_del_entry_valid+0x42/0x80
[ 5695.017351] Code: 08 48 83 c2 22 48 39 d0 74 24 48 8b 10 48 39 f2 75 2c 48 8b 51 08 b0 01 48 39 f2 75 34 c3 48 c7 c7 55 d7 78 82 e8 4e 45 3b 00 &lt;0f&gt; 0b eb 31 48 c7 c7 27 a8 70 82 e8 3e 45 3b 00 0f 0b eb 21 48 c7
[ 5695.054919] RSP: 0018:ffffc90027aef4f0 EFLAGS: 00010246
[ 5695.065366] RAX: 41fe484987275300 RBX: ffff888008988180 RCX: 0000000000000000
[ 5695.079636] RDX: ffff88886006c280 RSI: ffff888860060480 RDI: ffff888860060480
[ 5695.093904] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffc90027aef370
[ 5695.108175] R10: 0000000000000000 R11: ffffffff82fdf1c0 R12: 0000000010000002
[ 5695.122447] R13: ffff888014b6a448 R14: ffff888014b6a420 R15: 00000000138dc240
[ 5695.136717] FS:  00007f23a7d3f740(0000) GS:ffff888860040000(0000) knlGS:0000000000000000
[ 5695.152899] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 5695.164388] CR2: 0000560ceaab6ac0 CR3: 000000001c06c001 CR4: 00000000007706e0
[ 5695.178659] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 5695.192927] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 5695.207197] PKRU: 55555554
[ 5695.212602] Call Trace:
[ 5695.217486]  &lt;TASK&gt;
[ 5695.221674]  zs_map_object+0x91/0x270
[ 5695.229000]  zswap_frontswap_store+0x33d/0x870
[ 5695.237885]  ? do_raw_spin_lock+0x5d/0xa0
[ 5695.245899]  __frontswap_store+0x51/0xb0
[ 5695.253742]  swap_writepage+0x3c/0x60
[ 5695.261063]  shrink_page_list+0x738/0x1230
[ 5695.269255]  shrink_lruvec+0x5ec/0xcd0
[ 5695.276749]  ? shrink_slab+0x187/0x5f0
[ 5695.284240]  ? mem_cgroup_iter+0x6e/0x120
[ 5695.292255]  shrink_node+0x293/0x7b0
[ 5695.299402]  do_try_to_free_pages+0xea/0x550
[ 5695.307940]  try_to_free_pages+0x19a/0x490
[ 5695.316126]  __folio_alloc+0x19ff/0x3e40
[ 5695.323971]  ? __filemap_get_folio+0x8a/0x4e0
[ 5695.332681]  ? walk_component+0x2a8/0xb50
[ 5695.340697]  ? generic_permission+0xda/0x2a0
[ 5695.349231]  ? __filemap_get_folio+0x8a/0x4e0
[ 5695.357940]  ? walk_component+0x2a8/0xb50
[ 5695.365955]  vma_alloc_folio+0x10e/0x570
[ 5695.373796]  ? walk_component+0x52/0xb50
[ 5695.381634]  wp_page_copy+0x38c/0xc10
[ 5695.388953]  ? filename_lookup+0x378/0xbc0
[ 5695.397140]  handle_mm_fault+0x87f/0x1800
[ 5695.405157]  do_user_addr_fault+0x1bd/0x570
[ 5695.413520]  exc_page_fault+0x5d/0x110
[ 5695.421017]  asm_exc_page_fault+0x22/0x30

After some investigation, I have found the following issue: unlike other
zswap backends, zsmalloc performs the LRU list update at the object
mapping time, rather than when the slot for the object is allocated.
This deviation was discussed and agreed upon during the review process
of the zsmalloc writeback patch series:

https://lore.kernel.org/lkml/Y3flcAXNxxrvy3ZH@cmpxchg.org/

Unfortunately, this introduces a subtle bug that occurs when there is a
concurrent store and reclaim, which interleave as follows:

zswap_frontswap_store()            shrink_worker()
  zs_malloc()                        zs_zpool_shrink()
    spin_lock(&amp;pool-&gt;lock)             zs_reclaim_page()
    zspage = find_get_zspage()
    spin_unlock(&amp;pool-&gt;lock)
                                         spin_lock(&amp;pool-&gt;lock)
                                         zspage = list_first_entry(&amp;pool-&gt;lru)
                  
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54165/">CVE-2023-54165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54165">CVE-2023-54165 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256072">SUSE bug 1256072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54166</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54166" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54166" ref_url="https://www.suse.com/security/cve/CVE-2023-54166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igc: Fix Kernel Panic during ndo_tx_timeout callback

The Xeon validation group has been carrying out some loaded tests
with various HW configurations, and they have seen some transmit
queue time out happening during the test. This will cause the
reset adapter function to be called by igc_tx_timeout().
Similar race conditions may arise when the interface is being brought
down and up in igc_reinit_locked(), an interrupt being generated, and
igc_clean_tx_irq() being called to complete the TX.

When the igc_tx_timeout() function is invoked, this patch will turn
off all TX ring HW queues during igc_down() process. TX ring HW queues
will be activated again during the igc_configure_tx_ring() process
when performing the igc_up() procedure later.

This patch also moved existing igc_disable_tx_ring_hw() to avoid using
forward declaration.

Kernel trace:
[ 7678.747813] ------------[ cut here ]------------
[ 7678.757914] NETDEV WATCHDOG: enp1s0 (igc): transmit queue 2 timed out
[ 7678.770117] WARNING: CPU: 0 PID: 13 at net/sched/sch_generic.c:525 dev_watchdog+0x1ae/0x1f0
[ 7678.784459] Modules linked in: xt_conntrack nft_chain_nat xt_MASQUERADE xt_addrtype nft_compat
nf_tables nfnetlink br_netfilter bridge stp llc overlay dm_mod emrcha(PO) emriio(PO) rktpm(PO)
cegbuf_mod(PO) patch_update(PO) se(PO) sgx_tgts(PO) mktme(PO) keylocker(PO) svtdx(PO) svfs_pci_hotplug(PO)
vtd_mod(PO) davemem(PO) svmabort(PO) svindexio(PO) usbx2(PO) ehci_sched(PO) svheartbeat(PO) ioapic(PO)
sv8259(PO) svintr(PO) lt(PO) pcierootport(PO) enginefw_mod(PO) ata(PO) smbus(PO) spiflash_cdf(PO) arden(PO)
dsa_iax(PO) oobmsm_punit(PO) cpm(PO) svkdb(PO) ebg_pch(PO) pch(PO) sviotargets(PO) svbdf(PO) svmem(PO)
svbios(PO) dram(PO) svtsc(PO) targets(PO) superio(PO) svkernel(PO) cswitch(PO) mcf(PO) pentiumIII_mod(PO)
fs_svfs(PO) mdevdefdb(PO) svfs_os_services(O) ixgbe mdio mdio_devres libphy emeraldrapids_svdefs(PO)
regsupport(O) libnvdimm nls_cp437 snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_intel
snd_intel_dspcfg snd_hda_codec snd_hwdep x86_pkg_temp_thermal snd_hda_core snd_pcm snd_timer isst_if_mbox_pci
[ 7678.784496]  input_leds isst_if_mmio sg snd isst_if_common soundcore wmi button sad9(O) drm fuse backlight
configfs efivarfs ip_tables x_tables vmd sdhci led_class rtl8150 r8152 hid_generic pegasus mmc_block usbhid
mmc_core hid megaraid_sas ixgb igb i2c_algo_bit ice i40e hpsa scsi_transport_sas e1000e e1000 e100 ax88179_178a
usbnet xhci_pci sd_mod xhci_hcd t10_pi crc32c_intel crc64_rocksoft igc crc64 crc_t10dif usbcore
crct10dif_generic ptp crct10dif_common usb_common pps_core
[ 7679.200403] RIP: 0010:dev_watchdog+0x1ae/0x1f0
[ 7679.210201] Code: 28 e9 53 ff ff ff 4c 89 e7 c6 05 06 42 b9 00 01 e8 17 d1 fb ff 44 89 e9 4c
89 e6 48 c7 c7 40 ad fb 81 48 89 c2 e8 52 62 82 ff &lt;0f&gt; 0b e9 72 ff ff ff 65 8b 05 80 7d 7c 7e
89 c0 48 0f a3 05 0a c1
[ 7679.245438] RSP: 0018:ffa00000001f7d90 EFLAGS: 00010282
[ 7679.256021] RAX: 0000000000000000 RBX: ff11000109938440 RCX: 0000000000000000
[ 7679.268710] RDX: ff11000361e26cd8 RSI: ff11000361e1b880 RDI: ff11000361e1b880
[ 7679.281314] RBP: ffa00000001f7da8 R08: ff1100035f8fffe8 R09: 0000000000027ffb
[ 7679.293840] R10: 0000000000001f0a R11: ff1100035f840000 R12: ff11000109938000
[ 7679.306276] R13: 0000000000000002 R14: dead000000000122 R15: ffa00000001f7e18
[ 7679.318648] FS:  0000000000000000(0000) GS:ff11000361e00000(0000) knlGS:0000000000000000
[ 7679.332064] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 7679.342757] CR2: 00007ffff7fca168 CR3: 000000013b08a006 CR4: 0000000000471ef8
[ 7679.354984] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 7679.367207] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[ 7679.379370] PKRU: 55555554
[ 7679.386446] Call Trace:
[ 7679.393152]  &lt;TASK&gt;
[ 7679.399363]  ? __pfx_dev_watchdog+0x10/0x10
[ 7679.407870]  call_timer_fn+0x31/0x110
[ 7679.415698]  e
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54166/">CVE-2023-54166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54166">CVE-2023-54166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256074">SUSE bug 1256074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54167</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54167" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54167" ref_url="https://www.suse.com/security/cve/CVE-2023-54167" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

m68k: mm: Move initrd phys_to_virt handling after paging_init()

When booting with an initial ramdisk on platforms where physical memory
does not start at address zero (e.g. on Amiga):

    initrd: 0ef0602c - 0f800000
    Zone ranges:
      DMA      [mem 0x0000000008000000-0x000000f7ffffffff]
      Normal   empty
    Movable zone start for each node
    Early memory node ranges
      node   0: [mem 0x0000000008000000-0x000000000f7fffff]
    Initmem setup node 0 [mem 0x0000000008000000-0x000000000f7fffff]
    Unable to handle kernel access at virtual address (ptrval)
    Oops: 00000000
    Modules linked in:
    PC: [&lt;00201d3c&gt;] memcmp+0x28/0x56

As phys_to_virt() relies on m68k_memoffset and module_fixup(), it must
not be called before paging_init().  Hence postpone the phys_to_virt
handling for the initial ramdisk until after calling paging_init().

While at it, reduce #ifdef clutter by using IS_ENABLED() instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54167/">CVE-2023-54167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54167">CVE-2023-54167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256075">SUSE bug 1256075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54168</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54168" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54168" ref_url="https://www.suse.com/security/cve/CVE-2023-54168" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx4: Prevent shift wrapping in set_user_sq_size()

The ucmd-&gt;log_sq_bb_count variable is controlled by the user so this
shift can wrap.  Fix it by using check_shl_overflow() in the same way
that it was done in commit 515f60004ed9 ("RDMA/hns: Prevent undefined
behavior in hns_roce_set_user_sq_size()").
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-54168/">CVE-2023-54168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54168">CVE-2023-54168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256053">SUSE bug 1256053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256054">SUSE bug 1256054</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54169</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54169" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54169" ref_url="https://www.suse.com/security/cve/CVE-2023-54169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: fix memory leak in mlx5e_ptp_open

When kvzalloc_node or kvzalloc failed in mlx5e_ptp_open, the memory
pointed by "c" or "cparams" is not freed, which can lead to a memory
leak. Fix by freeing the array in the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54169/">CVE-2023-54169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54169">CVE-2023-54169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256050">SUSE bug 1256050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54170</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54170" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54170" ref_url="https://www.suse.com/security/cve/CVE-2023-54170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

keys: Fix linking a duplicate key to a keyring's assoc_array

When making a DNS query inside the kernel using dns_query(), the request
code can in rare cases end up creating a duplicate index key in the
assoc_array of the destination keyring. It is eventually found by
a BUG_ON() check in the assoc_array implementation and results in
a crash.

Example report:
[2158499.700025] kernel BUG at ../lib/assoc_array.c:652!
[2158499.700039] invalid opcode: 0000 [#1] SMP PTI
[2158499.700065] CPU: 3 PID: 31985 Comm: kworker/3:1 Kdump: loaded Not tainted 5.3.18-150300.59.90-default #1 SLE15-SP3
[2158499.700096] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[2158499.700351] Workqueue: cifsiod cifs_resolve_server [cifs]
[2158499.700380] RIP: 0010:assoc_array_insert+0x85f/0xa40
[2158499.700401] Code: ff 74 2b 48 8b 3b 49 8b 45 18 4c 89 e6 48 83 e7 fe e8 95 ec 74 00 3b 45 88 7d db 85 c0 79 d4 0f 0b 0f 0b 0f 0b e8 41 f2 be ff &lt;0f&gt; 0b 0f 0b 81 7d 88 ff ff ff 7f 4c 89 eb 4c 8b ad 58 ff ff ff 0f
[2158499.700448] RSP: 0018:ffffc0bd6187faf0 EFLAGS: 00010282
[2158499.700470] RAX: ffff9f1ea7da2fe8 RBX: ffff9f1ea7da2fc1 RCX: 0000000000000005
[2158499.700492] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000000
[2158499.700515] RBP: ffffc0bd6187fbb0 R08: ffff9f185faf1100 R09: 0000000000000000
[2158499.700538] R10: ffff9f1ea7da2cc0 R11: 000000005ed8cec8 R12: ffffc0bd6187fc28
[2158499.700561] R13: ffff9f15feb8d000 R14: ffff9f1ea7da2fc0 R15: ffff9f168dc0d740
[2158499.700585] FS:  0000000000000000(0000) GS:ffff9f185fac0000(0000) knlGS:0000000000000000
[2158499.700610] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[2158499.700630] CR2: 00007fdd94fca238 CR3: 0000000809d8c006 CR4: 00000000003706e0
[2158499.700702] Call Trace:
[2158499.700741]  ? key_alloc+0x447/0x4b0
[2158499.700768]  ? __key_link_begin+0x43/0xa0
[2158499.700790]  __key_link_begin+0x43/0xa0
[2158499.700814]  request_key_and_link+0x2c7/0x730
[2158499.700847]  ? dns_resolver_read+0x20/0x20 [dns_resolver]
[2158499.700873]  ? key_default_cmp+0x20/0x20
[2158499.700898]  request_key_tag+0x43/0xa0
[2158499.700926]  dns_query+0x114/0x2ca [dns_resolver]
[2158499.701127]  dns_resolve_server_name_to_ip+0x194/0x310 [cifs]
[2158499.701164]  ? scnprintf+0x49/0x90
[2158499.701190]  ? __switch_to_asm+0x40/0x70
[2158499.701211]  ? __switch_to_asm+0x34/0x70
[2158499.701405]  reconn_set_ipaddr_from_hostname+0x81/0x2a0 [cifs]
[2158499.701603]  cifs_resolve_server+0x4b/0xd0 [cifs]
[2158499.701632]  process_one_work+0x1f8/0x3e0
[2158499.701658]  worker_thread+0x2d/0x3f0
[2158499.701682]  ? process_one_work+0x3e0/0x3e0
[2158499.701703]  kthread+0x10d/0x130
[2158499.701723]  ? kthread_park+0xb0/0xb0
[2158499.701746]  ret_from_fork+0x1f/0x40

The situation occurs as follows:
* Some kernel facility invokes dns_query() to resolve a hostname, for
  example, "abcdef". The function registers its global DNS resolver
  cache as current-&gt;cred.thread_keyring and passes the query to
  request_key_net() -&gt; request_key_tag() -&gt; request_key_and_link().
* Function request_key_and_link() creates a keyring_search_context
  object. Its match_data.cmp method gets set via a call to
  type-&gt;match_preparse() (resolves to dns_resolver_match_preparse()) to
  dns_resolver_cmp().
* Function request_key_and_link() continues and invokes
  search_process_keyrings_rcu() which returns that a given key was not
  found. The control is then passed to request_key_and_link() -&gt;
  construct_alloc_key().
* Concurrently to that, a second task similarly makes a DNS query for
  "abcdef." and its result gets inserted into the DNS resolver cache.
* Back on the first task, function construct_alloc_key() first runs
  __key_link_begin() to determine an assoc_array_edit operation to
  insert a new key. Index keys in the array are compared exactly as-is,
  using keyring_compare_object(). The operation 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54170/">CVE-2023-54170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54170">CVE-2023-54170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256045">SUSE bug 1256045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54171</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54171" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54171" ref_url="https://www.suse.com/security/cve/CVE-2023-54171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix memory leak of iter-&gt;temp when reading trace_pipe

kmemleak reports:
  unreferenced object 0xffff88814d14e200 (size 256):
    comm "cat", pid 336, jiffies 4294871818 (age 779.490s)
    hex dump (first 32 bytes):
      04 00 01 03 00 00 00 00 08 00 00 00 00 00 00 00  ................
      0c d8 c8 9b ff ff ff ff 04 5a ca 9b ff ff ff ff  .........Z......
    backtrace:
      [&lt;ffffffff9bdff18f&gt;] __kmalloc+0x4f/0x140
      [&lt;ffffffff9bc9238b&gt;] trace_find_next_entry+0xbb/0x1d0
      [&lt;ffffffff9bc9caef&gt;] trace_print_lat_context+0xaf/0x4e0
      [&lt;ffffffff9bc94490&gt;] print_trace_line+0x3e0/0x950
      [&lt;ffffffff9bc95499&gt;] tracing_read_pipe+0x2d9/0x5a0
      [&lt;ffffffff9bf03a43&gt;] vfs_read+0x143/0x520
      [&lt;ffffffff9bf04c2d&gt;] ksys_read+0xbd/0x160
      [&lt;ffffffff9d0f0edf&gt;] do_syscall_64+0x3f/0x90
      [&lt;ffffffff9d2000aa&gt;] entry_SYSCALL_64_after_hwframe+0x6e/0xd8

when reading file 'trace_pipe', 'iter-&gt;temp' is allocated or relocated
in trace_find_next_entry() but not freed before 'trace_pipe' is closed.

To fix it, free 'iter-&gt;temp' in tracing_release_pipe().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54171/">CVE-2023-54171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54171">CVE-2023-54171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256034">SUSE bug 1256034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54172</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54172" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54172" ref_url="https://www.suse.com/security/cve/CVE-2023-54172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/hyperv: Disable IBT when hypercall page lacks ENDBR instruction

On hardware that supports Indirect Branch Tracking (IBT), Hyper-V VMs
with ConfigVersion 9.3 or later support IBT in the guest. However,
current versions of Hyper-V have a bug in that there's not an ENDBR64
instruction at the beginning of the hypercall page. Since hypercalls are
made with an indirect call to the hypercall page, all hypercall attempts
fail with an exception and Linux panics.

A Hyper-V fix is in progress to add ENDBR64. But guard against the Linux
panic by clearing X86_FEATURE_IBT if the hypercall page doesn't start
with ENDBR. The VM will boot and run without IBT.

If future Linux 32-bit kernels were to support IBT, additional hypercall
page hackery would be needed to make IBT work for such kernels in a
Hyper-V VM.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-04"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54172/">CVE-2023-54172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54172">CVE-2023-54172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256033">SUSE bug 1256033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54173</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54173" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54173" ref_url="https://www.suse.com/security/cve/CVE-2023-54173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Disable preemption in bpf_event_output

We received report [1] of kernel crash, which is caused by
using nesting protection without disabled preemption.

The bpf_event_output can be called by programs executed by
bpf_prog_run_array_cg function that disabled migration but
keeps preemption enabled.

This can cause task to be preempted by another one inside the
nesting protection and lead eventually to two tasks using same
perf_sample_data buffer and cause crashes like:

  BUG: kernel NULL pointer dereference, address: 0000000000000001
  #PF: supervisor instruction fetch in kernel mode
  #PF: error_code(0x0010) - not-present page
  ...
  ? perf_output_sample+0x12a/0x9a0
  ? finish_task_switch.isra.0+0x81/0x280
  ? perf_event_output+0x66/0xa0
  ? bpf_event_output+0x13a/0x190
  ? bpf_event_output_data+0x22/0x40
  ? bpf_prog_dfc84bbde731b257_cil_sock4_connect+0x40a/0xacb
  ? xa_load+0x87/0xe0
  ? __cgroup_bpf_run_filter_sock_addr+0xc1/0x1a0
  ? release_sock+0x3e/0x90
  ? sk_setsockopt+0x1a1/0x12f0
  ? udp_pre_connect+0x36/0x50
  ? inet_dgram_connect+0x93/0xa0
  ? __sys_connect+0xb4/0xe0
  ? udp_setsockopt+0x27/0x40
  ? __pfx_udp_push_pending_frames+0x10/0x10
  ? __sys_setsockopt+0xdf/0x1a0
  ? __x64_sys_connect+0xf/0x20
  ? do_syscall_64+0x3a/0x90
  ? entry_SYSCALL_64_after_hwframe+0x72/0xdc

Fixing this by disabling preemption in bpf_event_output.

[1] https://github.com/cilium/cilium/issues/26756
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54173/">CVE-2023-54173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54173">CVE-2023-54173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255996">SUSE bug 1255996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54174</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54174" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54174" ref_url="https://www.suse.com/security/cve/CVE-2023-54174" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio: Fix NULL pointer dereference caused by uninitialized group-&gt;iommufd

group-&gt;iommufd is not initialized for the iommufd_ctx_put()

[20018.331541] BUG: kernel NULL pointer dereference, address: 0000000000000000
[20018.377508] RIP: 0010:iommufd_ctx_put+0x5/0x10 [iommufd]
...
[20018.476483] Call Trace:
[20018.479214]  &lt;TASK&gt;
[20018.481555]  vfio_group_fops_unl_ioctl+0x506/0x690 [vfio]
[20018.487586]  __x64_sys_ioctl+0x6a/0xb0
[20018.491773]  ? trace_hardirqs_on+0xc5/0xe0
[20018.496347]  do_syscall_64+0x67/0x90
[20018.500340]  entry_SYSCALL_64_after_hwframe+0x4b/0xb5
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54174/">CVE-2023-54174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54174">CVE-2023-54174 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255997">SUSE bug 1255997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54175</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54175" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54175" ref_url="https://www.suse.com/security/cve/CVE-2023-54175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: xiic: xiic_xfer(): Fix runtime PM leak on error path

The xiic_xfer() function gets a runtime PM reference when the function is
entered. This reference is released when the function is exited. There is
currently one error path where the function exits directly, which leads to
a leak of the runtime PM reference.

Make sure that this error path also releases the runtime PM reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54175/">CVE-2023-54175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54175">CVE-2023-54175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255998">SUSE bug 1255998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54176</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54176" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54176" ref_url="https://www.suse.com/security/cve/CVE-2023-54176" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: stricter state check in mptcp_worker

As reported by Christoph, the mptcp protocol can run the
worker when the relevant msk socket is in an unexpected state:

connect()
// incoming reset + fastclose
// the mptcp worker is scheduled
mptcp_disconnect()
// msk is now CLOSED
listen()
mptcp_worker()

Leading to the following splat:

divide error: 0000 [#1] PREEMPT SMP
CPU: 1 PID: 21 Comm: kworker/1:0 Not tainted 6.3.0-rc1-gde5e8fd0123c #11
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014
Workqueue: events mptcp_worker
RIP: 0010:__tcp_select_window+0x22c/0x4b0 net/ipv4/tcp_output.c:3018
RSP: 0018:ffffc900000b3c98 EFLAGS: 00010293
RAX: 000000000000ffd7 RBX: 000000000000ffd7 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff8214ce97 RDI: 0000000000000004
RBP: 000000000000ffd7 R08: 0000000000000004 R09: 0000000000010000
R10: 000000000000ffd7 R11: ffff888005afa148 R12: 000000000000ffd7
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff88803ed00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000405270 CR3: 000000003011e006 CR4: 0000000000370ee0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 tcp_select_window net/ipv4/tcp_output.c:262 [inline]
 __tcp_transmit_skb+0x356/0x1280 net/ipv4/tcp_output.c:1345
 tcp_transmit_skb net/ipv4/tcp_output.c:1417 [inline]
 tcp_send_active_reset+0x13e/0x320 net/ipv4/tcp_output.c:3459
 mptcp_check_fastclose net/mptcp/protocol.c:2530 [inline]
 mptcp_worker+0x6c7/0x800 net/mptcp/protocol.c:2705
 process_one_work+0x3bd/0x950 kernel/workqueue.c:2390
 worker_thread+0x5b/0x610 kernel/workqueue.c:2537
 kthread+0x138/0x170 kernel/kthread.c:376
 ret_from_fork+0x2c/0x50 arch/x86/entry/entry_64.S:308
 &lt;/TASK&gt;

This change addresses the issue explicitly checking for bad states
before running the mptcp worker.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54176/">CVE-2023-54176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54176">CVE-2023-54176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255999">SUSE bug 1255999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54177</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54177" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54177" ref_url="https://www.suse.com/security/cve/CVE-2023-54177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

quota: fix warning in dqgrab()

There's issue as follows when do fault injection:
WARNING: CPU: 1 PID: 14870 at include/linux/quotaops.h:51 dquot_disable+0x13b7/0x18c0
Modules linked in:
CPU: 1 PID: 14870 Comm: fsconfig Not tainted 6.3.0-next-20230505-00006-g5107a9c821af-dirty #541
RIP: 0010:dquot_disable+0x13b7/0x18c0
RSP: 0018:ffffc9000acc79e0 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff88825e41b980
RDX: 0000000000000000 RSI: ffff88825e41b980 RDI: 0000000000000002
RBP: ffff888179f68000 R08: ffffffff82087ca7 R09: 0000000000000000
R10: 0000000000000001 R11: ffffed102f3ed026 R12: ffff888179f68130
R13: ffff888179f68110 R14: dffffc0000000000 R15: ffff888179f68118
FS:  00007f450a073740(0000) GS:ffff88882fc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffe96f2efd8 CR3: 000000025c8ad000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 dquot_load_quota_sb+0xd53/0x1060
 dquot_resume+0x172/0x230
 ext4_reconfigure+0x1dc6/0x27b0
 reconfigure_super+0x515/0xa90
 __x64_sys_fsconfig+0xb19/0xd20
 do_syscall_64+0x39/0xb0
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Above issue may happens as follows:
ProcessA              ProcessB                    ProcessC
sys_fsconfig
  vfs_fsconfig_locked
   reconfigure_super
     ext4_remount
      dquot_suspend -&gt; suspend all type quota

                 sys_fsconfig
                  vfs_fsconfig_locked
                    reconfigure_super
                     ext4_remount
                      dquot_resume
                       ret = dquot_load_quota_sb
                        add_dquot_ref
                                           do_open  -&gt; open file O_RDWR
                                            vfs_open
                                             do_dentry_open
                                              get_write_access
                                               atomic_inc_unless_negative(&amp;inode-&gt;i_writecount)
                                              ext4_file_open
                                               dquot_file_open
                                                dquot_initialize
                                                  __dquot_initialize
                                                   dqget
						    atomic_inc(&amp;dquot-&gt;dq_count);

                          __dquot_initialize
                           __dquot_initialize
                            dqget
                             if (!test_bit(DQ_ACTIVE_B, &amp;dquot-&gt;dq_flags))
                               ext4_acquire_dquot
			        -&gt; Return error DQ_ACTIVE_B flag isn't set
                         dquot_disable
			  invalidate_dquots
			   if (atomic_read(&amp;dquot-&gt;dq_count))
	                    dqgrab
			     WARN_ON_ONCE(!test_bit(DQ_ACTIVE_B, &amp;dquot-&gt;dq_flags))
	                      -&gt; Trigger warning

In the above scenario, 'dquot-&gt;dq_flags' has no DQ_ACTIVE_B is normal when
dqgrab().
To solve above issue just replace the dqgrab() use in invalidate_dquots() with
atomic_inc(&amp;dquot-&gt;dq_count).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54177/">CVE-2023-54177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54177">CVE-2023-54177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255993">SUSE bug 1255993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54178</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54178" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54178" ref_url="https://www.suse.com/security/cve/CVE-2023-54178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of: unittest: fix null pointer dereferencing in of_unittest_find_node_by_name()

when kmalloc() fail to allocate memory in kasprintf(), name
or full_name will be NULL, strcmp() will cause
null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54178/">CVE-2023-54178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54178">CVE-2023-54178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255992">SUSE bug 1255992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54179</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54179" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54179" ref_url="https://www.suse.com/security/cve/CVE-2023-54179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Array index may go out of bound

Klocwork reports array 'vha-&gt;host_str' of size 16 may use index value(s)
16..19.  Use snprintf() instead of sprintf().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54179/">CVE-2023-54179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54179">CVE-2023-54179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255994">SUSE bug 1255994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54180</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54180" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54180" ref_url="https://www.suse.com/security/cve/CVE-2023-54180" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: handle case when repair happens with dev-replace

[BUG]
There is a bug report that a BUG_ON() in btrfs_repair_io_failure()
(originally repair_io_failure() in v6.0 kernel) got triggered when
replacing a unreliable disk:

  BTRFS warning (device sda1): csum failed root 257 ino 2397453 off 39624704 csum 0xb0d18c75 expected csum 0x4dae9c5e mirror 3
  kernel BUG at fs/btrfs/extent_io.c:2380!
  invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
  CPU: 9 PID: 3614331 Comm: kworker/u257:2 Tainted: G           OE      6.0.0-5-amd64 #1  Debian 6.0.10-2
  Hardware name: Micro-Star International Co., Ltd. MS-7C60/TRX40 PRO WIFI (MS-7C60), BIOS 2.70 07/01/2021
  Workqueue: btrfs-endio btrfs_end_bio_work [btrfs]
  RIP: 0010:repair_io_failure+0x24a/0x260 [btrfs]
  Call Trace:
   &lt;TASK&gt;
   clean_io_failure+0x14d/0x180 [btrfs]
   end_bio_extent_readpage+0x412/0x6e0 [btrfs]
   ? __switch_to+0x106/0x420
   process_one_work+0x1c7/0x380
   worker_thread+0x4d/0x380
   ? rescuer_thread+0x3a0/0x3a0
   kthread+0xe9/0x110
   ? kthread_complete_and_exit+0x20/0x20
   ret_from_fork+0x22/0x30

[CAUSE]

Before the BUG_ON(), we got some read errors from the replace target
first, note the mirror number (3, which is beyond RAID1 duplication,
thus it's read from the replace target device).

Then at the BUG_ON() location, we are trying to writeback the repaired
sectors back the failed device.

The check looks like this:

		ret = btrfs_map_block(fs_info, BTRFS_MAP_WRITE, logical,
				      &amp;map_length, &amp;bioc, mirror_num);
		if (ret)
			goto out_counter_dec;
		BUG_ON(mirror_num != bioc-&gt;mirror_num);

But inside btrfs_map_block(), we can modify bioc-&gt;mirror_num especially
for dev-replace:

	if (dev_replace_is_ongoing &amp;&amp; mirror_num == map-&gt;num_stripes + 1 &amp;&amp;
	    !need_full_stripe(op) &amp;&amp; dev_replace-&gt;tgtdev != NULL) {
		ret = get_extra_mirror_from_replace(fs_info, logical, *length,
						    dev_replace-&gt;srcdev-&gt;devid,
						    &amp;mirror_num,
					    &amp;physical_to_patch_in_first_stripe);
		patch_the_first_stripe_for_dev_replace = 1;
	}

Thus if we're repairing the replace target device, we're going to
trigger that BUG_ON().

But in reality, the read failure from the replace target device may be
that, our replace hasn't reached the range we're reading, thus we're
reading garbage, but with replace running, the range would be properly
filled later.

Thus in that case, we don't need to do anything but let the replace
routine to handle it.

[FIX]
Instead of a BUG_ON(), just skip the repair if we're repairing the
device replace target device.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54180/">CVE-2023-54180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54180">CVE-2023-54180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255995">SUSE bug 1255995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54181</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54181" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54181" ref_url="https://www.suse.com/security/cve/CVE-2023-54181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix issue in verifying allow_ptr_leaks

After we converted the capabilities of our networking-bpf program from
cap_sys_admin to cap_net_admin+cap_bpf, our networking-bpf program
failed to start. Because it failed the bpf verifier, and the error log
is "R3 pointer comparison prohibited".

A simple reproducer as follows,

SEC("cls-ingress")
int ingress(struct __sk_buff *skb)
{
	struct iphdr *iph = (void *)(long)skb-&gt;data + sizeof(struct ethhdr);

	if ((long)(iph + 1) &gt; (long)skb-&gt;data_end)
		return TC_ACT_STOLEN;
	return TC_ACT_OK;
}

Per discussion with Yonghong and Alexei [1], comparison of two packet
pointers is not a pointer leak. This patch fixes it.

Our local kernel is 6.1.y and we expect this fix to be backported to
6.1.y, so stable is CCed.

[1]. https://lore.kernel.org/bpf/CAADnVQ+Nmspr7Si+pxWn8zkE7hX-7s93ugwC+94aXSy4uQ9vBg@mail.gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54181/">CVE-2023-54181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54181">CVE-2023-54181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255988">SUSE bug 1255988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54182</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54182" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54182" ref_url="https://www.suse.com/security/cve/CVE-2023-54182" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to check readonly condition correctly

With below case, it can mount multi-device image w/ rw option, however
one of secondary device is set as ro, later update will cause panic, so
let's introduce f2fs_dev_is_readonly(), and check multi-devices rw status
in f2fs_remount() w/ it in order to avoid such inconsistent mount status.

mkfs.f2fs -c /dev/zram1 /dev/zram0 -f
blockdev --setro /dev/zram1
mount -t f2fs dev/zram0 /mnt/f2fs
mount: /mnt/f2fs: WARNING: source write-protected, mounted read-only.
mount -t f2fs -o remount,rw mnt/f2fs
dd if=/dev/zero  of=/mnt/f2fs/file bs=1M count=8192

kernel BUG at fs/f2fs/inline.c:258!
RIP: 0010:f2fs_write_inline_data+0x23e/0x2d0 [f2fs]
Call Trace:
  f2fs_write_single_data_page+0x26b/0x9f0 [f2fs]
  f2fs_write_cache_pages+0x389/0xa60 [f2fs]
  __f2fs_write_data_pages+0x26b/0x2d0 [f2fs]
  f2fs_write_data_pages+0x2e/0x40 [f2fs]
  do_writepages+0xd3/0x1b0
  __writeback_single_inode+0x5b/0x420
  writeback_sb_inodes+0x236/0x5a0
  __writeback_inodes_wb+0x56/0xf0
  wb_writeback+0x2a3/0x490
  wb_do_writeback+0x2b2/0x330
  wb_workfn+0x6a/0x260
  process_one_work+0x270/0x5e0
  worker_thread+0x52/0x3e0
  kthread+0xf4/0x120
  ret_from_fork+0x29/0x50
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54182/">CVE-2023-54182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54182">CVE-2023-54182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255989">SUSE bug 1255989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54183</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54183" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54183" ref_url="https://www.suse.com/security/cve/CVE-2023-54183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link()

If fwnode_graph_get_remote_endpoint() fails, 'fwnode' is known to be NULL,
so fwnode_handle_put() is a no-op.

Release the reference taken from a previous fwnode_graph_get_port_parent()
call instead.

Also handle fwnode_graph_get_port_parent() failures.

In order to fix these issues, add an error handling path to the function
and the needed gotos.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54183/">CVE-2023-54183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54183">CVE-2023-54183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255990">SUSE bug 1255990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54184</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54184" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54184" ref_url="https://www.suse.com/security/cve/CVE-2023-54184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: iscsit: Free cmds before session free

Commands from recovery entries are freed after session has been closed.
That leads to use-after-free at command free or NPE with such call trace:

Time2Retain timer expired for SID: 1, cleaning up iSCSI session.
BUG: kernel NULL pointer dereference, address: 0000000000000140
RIP: 0010:sbitmap_queue_clear+0x3a/0xa0
Call Trace:
 target_release_cmd_kref+0xd1/0x1f0 [target_core_mod]
 transport_generic_free_cmd+0xd1/0x180 [target_core_mod]
 iscsit_free_cmd+0x53/0xd0 [iscsi_target_mod]
 iscsit_free_connection_recovery_entries+0x29d/0x320 [iscsi_target_mod]
 iscsit_close_session+0x13a/0x140 [iscsi_target_mod]
 iscsit_check_post_dataout+0x440/0x440 [iscsi_target_mod]
 call_timer_fn+0x24/0x140

Move cleanup of recovery enrties to before session freeing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54184/">CVE-2023-54184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54184">CVE-2023-54184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255991">SUSE bug 1255991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54185</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54185" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54185" ref_url="https://www.suse.com/security/cve/CVE-2023-54185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: remove BUG_ON()'s in add_new_free_space()

At add_new_free_space() we have these BUG_ON()'s that are there to deal
with any failure to add free space to the in memory free space cache.
Such failures are mostly -ENOMEM that should be very rare. However there's
no need to have these BUG_ON()'s, we can just return any error to the
caller and all callers and their upper call chain are already dealing with
errors.

So just make add_new_free_space() return any errors, while removing the
BUG_ON()'s, and returning the total amount of added free space to an
optional u64 pointer argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54185/">CVE-2023-54185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54185">CVE-2023-54185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255984">SUSE bug 1255984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54186</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54186" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54186" ref_url="https://www.suse.com/security/cve/CVE-2023-54186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: altmodes/displayport: fix pin_assignment_show

This patch fixes negative indexing of buf array in pin_assignment_show
when get_current_pin_assignments returns 0 i.e. no compatible pin
assignments are found.

BUG: KASAN: use-after-free in pin_assignment_show+0x26c/0x33c
...
Call trace:
dump_backtrace+0x110/0x204
dump_stack_lvl+0x84/0xbc
print_report+0x358/0x974
kasan_report+0x9c/0xfc
__do_kernel_fault+0xd4/0x2d4
do_bad_area+0x48/0x168
do_tag_check_fault+0x24/0x38
do_mem_abort+0x6c/0x14c
el1_abort+0x44/0x68
el1h_64_sync_handler+0x64/0xa4
el1h_64_sync+0x78/0x7c
pin_assignment_show+0x26c/0x33c
dev_attr_show+0x50/0xc0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54186/">CVE-2023-54186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54186">CVE-2023-54186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255985">SUSE bug 1255985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54187</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54187" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54187" ref_url="https://www.suse.com/security/cve/CVE-2023-54187" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix potential corruption when moving a directory

F2FS has the same issue in ext4_rename causing crash revealed by
xfstests/generic/707.

See also commit 0813299c586b ("ext4: Fix possible corruption when moving a directory")
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54187/">CVE-2023-54187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54187">CVE-2023-54187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255986">SUSE bug 1255986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54188</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54188" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54188" ref_url="https://www.suse.com/security/cve/CVE-2023-54188" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: apple-admac: Fix 'current_tx' not getting freed

In terminate_all we should queue up all submitted descriptors to be
freed. We do that for the content of the 'issued' and 'submitted' lists,
but the 'current_tx' descriptor falls through the cracks as it's
removed from the 'issued' list once it gets assigned to be the current
descriptor. Explicitly queue up freeing of the 'current_tx' descriptor
to address a memory leak that is otherwise present.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54188/">CVE-2023-54188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54188">CVE-2023-54188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255987">SUSE bug 1255987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54189</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54189" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54189" ref_url="https://www.suse.com/security/cve/CVE-2023-54189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pstore/ram: Add check for kstrdup

Add check for the return value of kstrdup() and return the error
if it fails in order to avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54189/">CVE-2023-54189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54189">CVE-2023-54189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255978">SUSE bug 1255978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54190</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54190" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54190" ref_url="https://www.suse.com/security/cve/CVE-2023-54190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

leds: led-core: Fix refcount leak in of_led_get()

class_find_device_by_of_node() calls class_find_device(), it will take
the reference, use the put_device() to drop the reference when not need
anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54190/">CVE-2023-54190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54190">CVE-2023-54190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255979">SUSE bug 1255979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54191</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54191" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54191" ref_url="https://www.suse.com/security/cve/CVE-2023-54191" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7996: fix memory leak in mt7996_mcu_exit

Always purge mcu skb queues in mt7996_mcu_exit routine even if
mt7996_firmware_state fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54191/">CVE-2023-54191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54191">CVE-2023-54191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255980">SUSE bug 1255980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54192</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54192" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54192" ref_url="https://www.suse.com/security/cve/CVE-2023-54192" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix null pointer panic in tracepoint in __replace_atomic_write_block

We got a kernel panic if old_addr is NULL.

https://bugzilla.kernel.org/show_bug.cgi?id=217266

BUG: kernel NULL pointer dereference, address: 0000000000000000
 Call Trace:
  &lt;TASK&gt;
  f2fs_commit_atomic_write+0x619/0x990 [f2fs a1b985b80f5babd6f3ea778384908880812bfa43]
  __f2fs_ioctl+0xd8e/0x4080 [f2fs a1b985b80f5babd6f3ea778384908880812bfa43]
  ? vfs_write+0x2ae/0x3f0
  ? vfs_write+0x2ae/0x3f0
  __x64_sys_ioctl+0x91/0xd0
  do_syscall_64+0x5c/0x90
  entry_SYSCALL_64_after_hwframe+0x72/0xdc
 RIP: 0033:0x7f69095fe53f
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54192/">CVE-2023-54192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54192">CVE-2023-54192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255981">SUSE bug 1255981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54193</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54193" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54193" ref_url="https://www.suse.com/security/cve/CVE-2023-54193" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: cls_api: remove block_cb from driver_list before freeing

Error handler of tcf_block_bind() frees the whole bo-&gt;cb_list on error.
However, by that time the flow_block_cb instances are already in the driver
list because driver ndo_setup_tc() callback is called before that up the
call chain in tcf_block_offload_cmd(). This leaves dangling pointers to
freed objects in the list and causes use-after-free[0]. Fix it by also
removing flow_block_cb instances from driver_list before deallocating them.

[0]:
[  279.868433] ==================================================================
[  279.869964] BUG: KASAN: slab-use-after-free in flow_block_cb_setup_simple+0x631/0x7c0
[  279.871527] Read of size 8 at addr ffff888147e2bf20 by task tc/2963

[  279.873151] CPU: 6 PID: 2963 Comm: tc Not tainted 6.3.0-rc6+ #4
[  279.874273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[  279.876295] Call Trace:
[  279.876882]  &lt;TASK&gt;
[  279.877413]  dump_stack_lvl+0x33/0x50
[  279.878198]  print_report+0xc2/0x610
[  279.878987]  ? flow_block_cb_setup_simple+0x631/0x7c0
[  279.879994]  kasan_report+0xae/0xe0
[  279.880750]  ? flow_block_cb_setup_simple+0x631/0x7c0
[  279.881744]  ? mlx5e_tc_reoffload_flows_work+0x240/0x240 [mlx5_core]
[  279.883047]  flow_block_cb_setup_simple+0x631/0x7c0
[  279.884027]  tcf_block_offload_cmd.isra.0+0x189/0x2d0
[  279.885037]  ? tcf_block_setup+0x6b0/0x6b0
[  279.885901]  ? mutex_lock+0x7d/0xd0
[  279.886669]  ? __mutex_unlock_slowpath.constprop.0+0x2d0/0x2d0
[  279.887844]  ? ingress_init+0x1c0/0x1c0 [sch_ingress]
[  279.888846]  tcf_block_get_ext+0x61c/0x1200
[  279.889711]  ingress_init+0x112/0x1c0 [sch_ingress]
[  279.890682]  ? clsact_init+0x2b0/0x2b0 [sch_ingress]
[  279.891701]  qdisc_create+0x401/0xea0
[  279.892485]  ? qdisc_tree_reduce_backlog+0x470/0x470
[  279.893473]  tc_modify_qdisc+0x6f7/0x16d0
[  279.894344]  ? tc_get_qdisc+0xac0/0xac0
[  279.895213]  ? mutex_lock+0x7d/0xd0
[  279.896005]  ? __mutex_lock_slowpath+0x10/0x10
[  279.896910]  rtnetlink_rcv_msg+0x5fe/0x9d0
[  279.897770]  ? rtnl_calcit.isra.0+0x2b0/0x2b0
[  279.898672]  ? __sys_sendmsg+0xb5/0x140
[  279.899494]  ? do_syscall_64+0x3d/0x90
[  279.900302]  ? entry_SYSCALL_64_after_hwframe+0x46/0xb0
[  279.901337]  ? kasan_save_stack+0x2e/0x40
[  279.902177]  ? kasan_save_stack+0x1e/0x40
[  279.903058]  ? kasan_set_track+0x21/0x30
[  279.903913]  ? kasan_save_free_info+0x2a/0x40
[  279.904836]  ? ____kasan_slab_free+0x11a/0x1b0
[  279.905741]  ? kmem_cache_free+0x179/0x400
[  279.906599]  netlink_rcv_skb+0x12c/0x360
[  279.907450]  ? rtnl_calcit.isra.0+0x2b0/0x2b0
[  279.908360]  ? netlink_ack+0x1550/0x1550
[  279.909192]  ? rhashtable_walk_peek+0x170/0x170
[  279.910135]  ? kmem_cache_alloc_node+0x1af/0x390
[  279.911086]  ? _copy_from_iter+0x3d6/0xc70
[  279.912031]  netlink_unicast+0x553/0x790
[  279.912864]  ? netlink_attachskb+0x6a0/0x6a0
[  279.913763]  ? netlink_recvmsg+0x416/0xb50
[  279.914627]  netlink_sendmsg+0x7a1/0xcb0
[  279.915473]  ? netlink_unicast+0x790/0x790
[  279.916334]  ? iovec_from_user.part.0+0x4d/0x220
[  279.917293]  ? netlink_unicast+0x790/0x790
[  279.918159]  sock_sendmsg+0xc5/0x190
[  279.918938]  ____sys_sendmsg+0x535/0x6b0
[  279.919813]  ? import_iovec+0x7/0x10
[  279.920601]  ? kernel_sendmsg+0x30/0x30
[  279.921423]  ? __copy_msghdr+0x3c0/0x3c0
[  279.922254]  ? import_iovec+0x7/0x10
[  279.923041]  ___sys_sendmsg+0xeb/0x170
[  279.923854]  ? copy_msghdr_from_user+0x110/0x110
[  279.924797]  ? ___sys_recvmsg+0xd9/0x130
[  279.925630]  ? __perf_event_task_sched_in+0x183/0x470
[  279.926656]  ? ___sys_sendmsg+0x170/0x170
[  279.927529]  ? ctx_sched_in+0x530/0x530
[  279.928369]  ? update_curr+0x283/0x4f0
[  279.929185]  ? perf_event_update_userpage+0x570/0x570
[  279.930201]  ? __fget_light+0x57/0x520
[  279.931023]  ? __switch_to+0x53d/0xe70
[  27
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54193/">CVE-2023-54193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54193">CVE-2023-54193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255973">SUSE bug 1255973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54194</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54194" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54194" ref_url="https://www.suse.com/security/cve/CVE-2023-54194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree

The call stack shown below is a scenario in the Linux 4.19 kernel.
Allocating memory failed where exfat fs use kmalloc_array due to
system memory fragmentation, while the u-disk was inserted without
recognition.
Devices such as u-disk using the exfat file system are pluggable and
may be insert into the system at any time.
However, long-term running systems cannot guarantee the continuity of
physical memory. Therefore, it's necessary to address this issue.

Binder:2632_6: page allocation failure: order:4,
 mode:0x6040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null)
Call trace:
[242178.097582]  dump_backtrace+0x0/0x4
[242178.097589]  dump_stack+0xf4/0x134
[242178.097598]  warn_alloc+0xd8/0x144
[242178.097603]  __alloc_pages_nodemask+0x1364/0x1384
[242178.097608]  kmalloc_order+0x2c/0x510
[242178.097612]  kmalloc_order_trace+0x40/0x16c
[242178.097618]  __kmalloc+0x360/0x408
[242178.097624]  load_alloc_bitmap+0x160/0x284
[242178.097628]  exfat_fill_super+0xa3c/0xe7c
[242178.097635]  mount_bdev+0x2e8/0x3a0
[242178.097638]  exfat_fs_mount+0x40/0x50
[242178.097643]  mount_fs+0x138/0x2e8
[242178.097649]  vfs_kern_mount+0x90/0x270
[242178.097655]  do_mount+0x798/0x173c
[242178.097659]  ksys_mount+0x114/0x1ac
[242178.097665]  __arm64_sys_mount+0x24/0x34
[242178.097671]  el0_svc_common+0xb8/0x1b8
[242178.097676]  el0_svc_handler+0x74/0x90
[242178.097681]  el0_svc+0x8/0x340

By analyzing the exfat code,we found that continuous physical memory
is not required here,so kvmalloc_array is used can solve this problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54194/">CVE-2023-54194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54194">CVE-2023-54194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255974">SUSE bug 1255974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54195</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54195" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54195" ref_url="https://www.suse.com/security/cve/CVE-2023-54195" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix timeout of a call that hasn't yet been granted a channel

afs_make_call() calls rxrpc_kernel_begin_call() to begin a call (which may
get stalled in the background waiting for a connection to become
available); it then calls rxrpc_kernel_set_max_life() to set the timeouts -
but that starts the call timer so the call timer might then expire before
we get a connection assigned - leading to the following oops if the call
stalled:

	BUG: kernel NULL pointer dereference, address: 0000000000000000
	...
	CPU: 1 PID: 5111 Comm: krxrpcio/0 Not tainted 6.3.0-rc7-build3+ #701
	RIP: 0010:rxrpc_alloc_txbuf+0xc0/0x157
	...
	Call Trace:
	 &lt;TASK&gt;
	 rxrpc_send_ACK+0x50/0x13b
	 rxrpc_input_call_event+0x16a/0x67d
	 rxrpc_io_thread+0x1b6/0x45f
	 ? _raw_spin_unlock_irqrestore+0x1f/0x35
	 ? rxrpc_input_packet+0x519/0x519
	 kthread+0xe7/0xef
	 ? kthread_complete_and_exit+0x1b/0x1b
	 ret_from_fork+0x22/0x30

Fix this by noting the timeouts in struct rxrpc_call when the call is
created.  The timer will be started when the first packet is transmitted.

It shouldn't be possible to trigger this directly from userspace through
AF_RXRPC as sendmsg() will return EBUSY if the call is in the
waiting-for-conn state if it dropped out of the wait due to a signal.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54195/">CVE-2023-54195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54195">CVE-2023-54195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255975">SUSE bug 1255975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54196</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54196" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54196" ref_url="https://www.suse.com/security/cve/CVE-2023-54196" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fix NULL pointer dereference in 'ni_write_inode'

Syzbot found the following issue:
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000016
Mem abort info:
  ESR = 0x0000000096000006
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x06: level 2 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000006
  CM = 0, WnR = 0
user pgtable: 4k pages, 48-bit VAs, pgdp=000000010af56000
[0000000000000016] pgd=08000001090da003, p4d=08000001090da003, pud=08000001090ce003, pmd=0000000000000000
Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP
Modules linked in:
CPU: 1 PID: 3036 Comm: syz-executor206 Not tainted 6.0.0-rc6-syzkaller-17739-g16c9f284e746 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : is_rec_inuse fs/ntfs3/ntfs.h:313 [inline]
pc : ni_write_inode+0xac/0x798 fs/ntfs3/frecord.c:3232
lr : ni_write_inode+0xa0/0x798 fs/ntfs3/frecord.c:3226
sp : ffff8000126c3800
x29: ffff8000126c3860 x28: 0000000000000000 x27: ffff0000c8b02000
x26: ffff0000c7502320 x25: ffff0000c7502288 x24: 0000000000000000
x23: ffff80000cbec91c x22: ffff0000c8b03000 x21: ffff0000c8b02000
x20: 0000000000000001 x19: ffff0000c75024d8 x18: 00000000000000c0
x17: ffff80000dd1b198 x16: ffff80000db59158 x15: ffff0000c4b6b500
x14: 00000000000000b8 x13: 0000000000000000 x12: ffff0000c4b6b500
x11: ff80800008be1b60 x10: 0000000000000000 x9 : ffff0000c4b6b500
x8 : 0000000000000000 x7 : ffff800008be1b50 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000008 x1 : 0000000000000001 x0 : 0000000000000000
Call trace:
 is_rec_inuse fs/ntfs3/ntfs.h:313 [inline]
 ni_write_inode+0xac/0x798 fs/ntfs3/frecord.c:3232
 ntfs_evict_inode+0x54/0x84 fs/ntfs3/inode.c:1744
 evict+0xec/0x334 fs/inode.c:665
 iput_final fs/inode.c:1748 [inline]
 iput+0x2c4/0x324 fs/inode.c:1774
 ntfs_new_inode+0x7c/0xe0 fs/ntfs3/fsntfs.c:1660
 ntfs_create_inode+0x20c/0xe78 fs/ntfs3/inode.c:1278
 ntfs_create+0x54/0x74 fs/ntfs3/namei.c:100
 lookup_open fs/namei.c:3413 [inline]
 open_last_lookups fs/namei.c:3481 [inline]
 path_openat+0x804/0x11c4 fs/namei.c:3688
 do_filp_open+0xdc/0x1b8 fs/namei.c:3718
 do_sys_openat2+0xb8/0x22c fs/open.c:1311
 do_sys_open fs/open.c:1327 [inline]
 __do_sys_openat fs/open.c:1343 [inline]
 __se_sys_openat fs/open.c:1338 [inline]
 __arm64_sys_openat+0xb0/0xe0 fs/open.c:1338
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall arch/arm64/kernel/syscall.c:52 [inline]
 el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206
 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:636
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654
 el0t_64_sync+0x18c/0x190
Code: 97dafee4 340001b4 f9401328 2a1f03e0 (79402d14)
---[ end trace 0000000000000000 ]---

Above issue may happens as follows:
ntfs_new_inode
  mi_init
    mi-&gt;mrec = kmalloc(sbi-&gt;record_size, GFP_NOFS); --&gt;failed to allocate memory
      if (!mi-&gt;mrec)
        return -ENOMEM;
iput
  iput_final
    evict
      ntfs_evict_inode
        ni_write_inode
	  is_rec_inuse(ni-&gt;mi.mrec)-&gt; As 'ni-&gt;mi.mrec' is NULL trigger NULL-ptr-deref

To solve above issue if new inode failed make inode bad before call 'iput()' in
'ntfs_new_inode()'.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54196/">CVE-2023-54196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54196">CVE-2023-54196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255976">SUSE bug 1255976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54197</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54197" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54197" ref_url="https://www.suse.com/security/cve/CVE-2023-54197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work"

This reverts commit 1e9ac114c4428fdb7ff4635b45d4f46017e8916f.

This patch introduces a possible null-ptr-def problem. Revert it. And the
fixed bug by this patch have resolved by commit 73f7b171b7c0 ("Bluetooth:
btsdio: fix use after free bug in btsdio_remove due to race condition").
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54197/">CVE-2023-54197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54197">CVE-2023-54197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255969">SUSE bug 1255969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54198</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54198" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54198" ref_url="https://www.suse.com/security/cve/CVE-2023-54198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: fix out-of-bounds access in tty_driver_lookup_tty()

When specifying an invalid console= device like console=tty3270,
tty_driver_lookup_tty() returns the tty struct without checking
whether index is a valid number.

To reproduce:

qemu-system-x86_64 -enable-kvm -nographic -serial mon:stdio \
-kernel ../linux-build-x86/arch/x86/boot/bzImage \
-append "console=ttyS0 console=tty3270"

This crashes with:

[    0.770599] BUG: kernel NULL pointer dereference, address: 00000000000000ef
[    0.771265] #PF: supervisor read access in kernel mode
[    0.771773] #PF: error_code(0x0000) - not-present page
[    0.772609] Oops: 0000 [#1] PREEMPT SMP PTI
[    0.774878] RIP: 0010:tty_open+0x268/0x6f0
[    0.784013]  chrdev_open+0xbd/0x230
[    0.784444]  ? cdev_device_add+0x80/0x80
[    0.784920]  do_dentry_open+0x1e0/0x410
[    0.785389]  path_openat+0xca9/0x1050
[    0.785813]  do_filp_open+0xaa/0x150
[    0.786240]  file_open_name+0x133/0x1b0
[    0.786746]  filp_open+0x27/0x50
[    0.787244]  console_on_rootfs+0x14/0x4d
[    0.787800]  kernel_init_freeable+0x1e4/0x20d
[    0.788383]  ? rest_init+0xc0/0xc0
[    0.788881]  kernel_init+0x11/0x120
[    0.789356]  ret_from_fork+0x22/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54198/">CVE-2023-54198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54198">CVE-2023-54198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255970">SUSE bug 1255970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54199</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54199" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54199" ref_url="https://www.suse.com/security/cve/CVE-2023-54199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup()

Fix the below kernel panic due to null pointer access:
[   18.504431] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000048
[   18.513464] Mem abort info:
[   18.516346]   ESR = 0x0000000096000005
[   18.520204]   EC = 0x25: DABT (current EL), IL = 32 bits
[   18.525706]   SET = 0, FnV = 0
[   18.528878]   EA = 0, S1PTW = 0
[   18.532117]   FSC = 0x05: level 1 translation fault
[   18.537138] Data abort info:
[   18.540110]   ISV = 0, ISS = 0x00000005
[   18.544060]   CM = 0, WnR = 0
[   18.547109] user pgtable: 4k pages, 39-bit VAs, pgdp=0000000112826000
[   18.553738] [0000000000000048] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000
[   18.562690] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
**Snip**
[   18.696758] Call trace:
[   18.699278]  adreno_gpu_cleanup+0x30/0x88
[   18.703396]  a6xx_destroy+0xc0/0x130
[   18.707066]  a6xx_gpu_init+0x308/0x424
[   18.710921]  adreno_bind+0x178/0x288
[   18.714590]  component_bind_all+0xe0/0x214
[   18.718797]  msm_drm_bind+0x1d4/0x614
[   18.722566]  try_to_bring_up_aggregate_device+0x16c/0x1b8
[   18.728105]  __component_add+0xa0/0x158
[   18.732048]  component_add+0x20/0x2c
[   18.735719]  adreno_probe+0x40/0xc0
[   18.739300]  platform_probe+0xb4/0xd4
[   18.743068]  really_probe+0xfc/0x284
[   18.746738]  __driver_probe_device+0xc0/0xec
[   18.751129]  driver_probe_device+0x48/0x110
[   18.755421]  __device_attach_driver+0xa8/0xd0
[   18.759900]  bus_for_each_drv+0x90/0xdc
[   18.763843]  __device_attach+0xfc/0x174
[   18.767786]  device_initial_probe+0x20/0x2c
[   18.772090]  bus_probe_device+0x40/0xa0
[   18.776032]  deferred_probe_work_func+0x94/0xd0
[   18.780686]  process_one_work+0x190/0x3d0
[   18.784805]  worker_thread+0x280/0x3d4
[   18.788659]  kthread+0x104/0x1c0
[   18.791981]  ret_from_fork+0x10/0x20
[   18.795654] Code: f9400408 aa0003f3 aa1f03f4 91142015 (f9402516)
[   18.801913] ---[ end trace 0000000000000000 ]---
[   18.809039] Kernel panic - not syncing: Oops: Fatal exception

Patchwork: https://patchwork.freedesktop.org/patch/515605/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54199/">CVE-2023-54199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54199">CVE-2023-54199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255971">SUSE bug 1255971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54200</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54200" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54200" ref_url="https://www.suse.com/security/cve/CVE-2023-54200" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: always release netdev hooks from notifier

This reverts "netfilter: nf_tables: skip netdev events generated on netns removal".

The problem is that when a veth device is released, the veth release
callback will also queue the peer netns device for removal.

Its possible that the peer netns is also slated for removal.  In this
case, the device memory is already released before the pre_exit hook of
the peer netns runs:

BUG: KASAN: slab-use-after-free in nf_hook_entry_head+0x1b8/0x1d0
Read of size 8 at addr ffff88812c0124f0 by task kworker/u8:1/45
Workqueue: netns cleanup_net
Call Trace:
 nf_hook_entry_head+0x1b8/0x1d0
 __nf_unregister_net_hook+0x76/0x510
 nft_netdev_unregister_hooks+0xa0/0x220
 __nft_release_hook+0x184/0x490
 nf_tables_pre_exit_net+0x12f/0x1b0
 ..

Order is:
1. First netns is released, veth_dellink() queues peer netns device
   for removal
2. peer netns is queued for removal
3. peer netns device is released, unreg event is triggered
4. unreg event is ignored because netns is going down
5. pre_exit hook calls nft_netdev_unregister_hooks but device memory
   might be free'd already.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54200/">CVE-2023-54200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54200">CVE-2023-54200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255972">SUSE bug 1255972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54201</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54201" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54201" ref_url="https://www.suse.com/security/cve/CVE-2023-54201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/efa: Fix wrong resources deallocation order

When trying to destroy QP or CQ, we first decrease the refcount and
potentially free memory regions allocated for the object and then
request the device to destroy the object. If the device fails, the
object isn't fully destroyed so the user/IB core can try to destroy the
object again which will lead to underflow when trying to decrease an
already zeroed refcount.

Deallocate resources in reverse order of allocating them to safely free
them.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54201/">CVE-2023-54201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54201">CVE-2023-54201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255964">SUSE bug 1255964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54203</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54203" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54203" ref_url="https://www.suse.com/security/cve/CVE-2023-54203" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix slab-out-of-bounds in init_smb2_rsp_hdr

When smb1 mount fails, KASAN detect slab-out-of-bounds in
init_smb2_rsp_hdr like the following one.
For smb1 negotiate(56bytes) , init_smb2_rsp_hdr() for smb2 is called.
The issue occurs while handling smb1 negotiate as smb2 server operations.
Add smb server operations for smb1 (get_cmd_val, init_rsp_hdr,
allocate_rsp_buf, check_user_session) to handle smb1 negotiate so that
smb2 server operation does not handle it.

[  411.400423] CIFS: VFS: Use of the less secure dialect vers=1.0 is
not recommended unless required for access to very old servers
[  411.400452] CIFS: Attempting to mount \\192.168.45.139\homes
[  411.479312] ksmbd: init_smb2_rsp_hdr : 492
[  411.479323] ==================================================================
[  411.479327] BUG: KASAN: slab-out-of-bounds in
init_smb2_rsp_hdr+0x1e2/0x1f4 [ksmbd]
[  411.479369] Read of size 16 at addr ffff888488ed0734 by task kworker/14:1/199

[  411.479379] CPU: 14 PID: 199 Comm: kworker/14:1 Tainted: G
 OE      6.1.21 #3
[  411.479386] Hardware name: ASUSTeK COMPUTER INC. Z10PA-D8
Series/Z10PA-D8 Series, BIOS 3801 08/23/2019
[  411.479390] Workqueue: ksmbd-io handle_ksmbd_work [ksmbd]
[  411.479425] Call Trace:
[  411.479428]  &lt;TASK&gt;
[  411.479432]  dump_stack_lvl+0x49/0x63
[  411.479444]  print_report+0x171/0x4a8
[  411.479452]  ? kasan_complete_mode_report_info+0x3c/0x200
[  411.479463]  ? init_smb2_rsp_hdr+0x1e2/0x1f4 [ksmbd]
[  411.479497]  kasan_report+0xb4/0x130
[  411.479503]  ? init_smb2_rsp_hdr+0x1e2/0x1f4 [ksmbd]
[  411.479537]  kasan_check_range+0x149/0x1e0
[  411.479543]  memcpy+0x24/0x70
[  411.479550]  init_smb2_rsp_hdr+0x1e2/0x1f4 [ksmbd]
[  411.479585]  handle_ksmbd_work+0x109/0x760 [ksmbd]
[  411.479616]  ? _raw_spin_unlock_irqrestore+0x50/0x50
[  411.479624]  ? smb3_encrypt_resp+0x340/0x340 [ksmbd]
[  411.479656]  process_one_work+0x49c/0x790
[  411.479667]  worker_thread+0x2b1/0x6e0
[  411.479674]  ? process_one_work+0x790/0x790
[  411.479680]  kthread+0x177/0x1b0
[  411.479686]  ? kthread_complete_and_exit+0x30/0x30
[  411.479692]  ret_from_fork+0x22/0x30
[  411.479702]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54203/">CVE-2023-54203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54203">CVE-2023-54203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255966">SUSE bug 1255966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54204</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54204" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54204" ref_url="https://www.suse.com/security/cve/CVE-2023-54204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: sunplus: fix return value check of mmc_add_host()

mmc_add_host() may return error, if we ignore its return value,
1. the memory allocated in mmc_alloc_host() will be leaked
2. null-ptr-deref will happen when calling mmc_remove_host()
in remove function spmmc_drv_remove() because deleting not
added device.

Fix this by checking the return value of mmc_add_host(). Moreover,
I fixed the error handling path of spmmc_drv_probe() to clean up.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54204/">CVE-2023-54204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54204">CVE-2023-54204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255967">SUSE bug 1255967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54205</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54205" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54205" ref_url="https://www.suse.com/security/cve/CVE-2023-54205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain

of_irq_find_parent() returns a node pointer with refcount incremented,
We should use of_node_put() on it when not needed anymore.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54205/">CVE-2023-54205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54205">CVE-2023-54205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255968">SUSE bug 1255968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54206</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54206" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54206" ref_url="https://www.suse.com/security/cve/CVE-2023-54206" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: flower: fix filter idr initialization

The cited commit moved idr initialization too early in fl_change() which
allows concurrent users to access the filter that is still being
initialized and is in inconsistent state, which, in turn, can cause NULL
pointer dereference [0]. Since there is no obvious way to fix the ordering
without reverting the whole cited commit, alternative approach taken to
first insert NULL pointer into idr in order to allocate the handle but
still cause fl_get() to return NULL and prevent concurrent users from
seeing the filter while providing miss-to-action infrastructure with valid
handle id early in fl_change().

[  152.434728] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN
[  152.436163] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
[  152.437269] CPU: 4 PID: 3877 Comm: tc Not tainted 6.3.0-rc4+ #5
[  152.438110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[  152.439644] RIP: 0010:fl_dump_key+0x8b/0x1d10 [cls_flower]
[  152.440461] Code: 01 f2 02 f2 c7 40 08 04 f2 04 f2 c7 40 0c 04 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 84 24 00 01 00 00 48 89 c8 48 c1 e8 03 &lt;0f&gt; b6 04 10 84 c0 74 08 3c 03 0f 8e 98 19 00 00 8b 13 85 d2 74 57
[  152.442885] RSP: 0018:ffff88817a28f158 EFLAGS: 00010246
[  152.443851] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[  152.444826] RDX: dffffc0000000000 RSI: ffffffff8500ae80 RDI: ffff88810a987900
[  152.445791] RBP: ffff888179d88240 R08: ffff888179d8845c R09: ffff888179d88240
[  152.446780] R10: ffffed102f451e48 R11: 00000000fffffff2 R12: ffff88810a987900
[  152.447741] R13: ffffffff8500ae80 R14: ffff88810a987900 R15: ffff888149b3c738
[  152.448756] FS:  00007f5eb2a34800(0000) GS:ffff88881ec00000(0000) knlGS:0000000000000000
[  152.449888] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  152.450685] CR2: 000000000046ad19 CR3: 000000010b0bd006 CR4: 0000000000370ea0
[  152.451641] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  152.452628] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  152.453588] Call Trace:
[  152.454032]  &lt;TASK&gt;
[  152.454447]  ? netlink_sendmsg+0x7a1/0xcb0
[  152.455109]  ? sock_sendmsg+0xc5/0x190
[  152.455689]  ? ____sys_sendmsg+0x535/0x6b0
[  152.456320]  ? ___sys_sendmsg+0xeb/0x170
[  152.456916]  ? do_syscall_64+0x3d/0x90
[  152.457529]  ? entry_SYSCALL_64_after_hwframe+0x46/0xb0
[  152.458321]  ? ___sys_sendmsg+0xeb/0x170
[  152.458958]  ? __sys_sendmsg+0xb5/0x140
[  152.459564]  ? do_syscall_64+0x3d/0x90
[  152.460122]  ? entry_SYSCALL_64_after_hwframe+0x46/0xb0
[  152.460852]  ? fl_dump_key_options.part.0+0xea0/0xea0 [cls_flower]
[  152.461710]  ? _raw_spin_lock+0x7a/0xd0
[  152.462299]  ? _raw_read_lock_irq+0x30/0x30
[  152.462924]  ? nla_put+0x15e/0x1c0
[  152.463480]  fl_dump+0x228/0x650 [cls_flower]
[  152.464112]  ? fl_tmplt_dump+0x210/0x210 [cls_flower]
[  152.464854]  ? __kmem_cache_alloc_node+0x1a7/0x330
[  152.465592]  ? nla_put+0x15e/0x1c0
[  152.466160]  tcf_fill_node+0x515/0x9a0
[  152.466766]  ? tc_setup_offload_action+0xf0/0xf0
[  152.467463]  ? __alloc_skb+0x13c/0x2a0
[  152.468067]  ? __build_skb_around+0x330/0x330
[  152.468814]  ? fl_get+0x107/0x1a0 [cls_flower]
[  152.469503]  tc_del_tfilter+0x718/0x1330
[  152.470115]  ? is_bpf_text_address+0xa/0x20
[  152.470765]  ? tc_ctl_chain+0xee0/0xee0
[  152.471335]  ? __kernel_text_address+0xe/0x30
[  152.471948]  ? unwind_get_return_address+0x56/0xa0
[  152.472639]  ? __thaw_task+0x150/0x150
[  152.473218]  ? arch_stack_walk+0x98/0xf0
[  152.473839]  ? __stack_depot_save+0x35/0x4c0
[  152.474501]  ? stack_trace_save+0x91/0xc0
[  152.475119]  ? security_capable+0x51/0x90
[  152.475741]  rtnetlink_rcv_msg+0x2c1/0x9d0
[  152.476387]  ? rtnl_calcit.isra.0+0x2b0/0x2b0
[  152.477042]
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54206/">CVE-2023-54206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54206">CVE-2023-54206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255958">SUSE bug 1255958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54207</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54207" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54207" ref_url="https://www.suse.com/security/cve/CVE-2023-54207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: uclogic: Correct devm device reference for hidinput input_dev name

Reference the HID device rather than the input device for the devm
allocation of the input_dev name. Referencing the input_dev would lead to a
use-after-free when the input_dev was unregistered and subsequently fires a
uevent that depends on the name. At the point of firing the uevent, the
name would be freed by devres management.

Use devm_kasprintf to simplify the logic for allocating memory and
formatting the input_dev name string.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54207/">CVE-2023-54207 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-54207">CVE-2023-54207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255961">SUSE bug 1255961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54208</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54208" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54208" ref_url="https://www.suse.com/security/cve/CVE-2023-54208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: ov5675: Fix memleak in ov5675_init_controls()

There is a kmemleak when testing the media/i2c/ov5675.c with bpf mock
device:

AssertionError: unreferenced object 0xffff888107362160 (size 16):
  comm "python3", pid 277, jiffies 4294832798 (age 20.722s)
  hex dump (first 16 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;00000000abe7d67c&gt;] __kmalloc_node+0x44/0x1b0
    [&lt;000000008a725aac&gt;] kvmalloc_node+0x34/0x180
    [&lt;000000009a53cd11&gt;] v4l2_ctrl_handler_init_class+0x11d/0x180
[videodev]
    [&lt;0000000055b46db0&gt;] ov5675_probe+0x38b/0x897 [ov5675]
    [&lt;00000000153d886c&gt;] i2c_device_probe+0x28d/0x680
    [&lt;000000004afb7e8f&gt;] really_probe+0x17c/0x3f0
    [&lt;00000000ff2f18e4&gt;] __driver_probe_device+0xe3/0x170
    [&lt;000000000a001029&gt;] driver_probe_device+0x49/0x120
    [&lt;00000000e39743c7&gt;] __device_attach_driver+0xf7/0x150
    [&lt;00000000d32fd070&gt;] bus_for_each_drv+0x114/0x180
    [&lt;000000009083ac41&gt;] __device_attach+0x1e5/0x2d0
    [&lt;0000000015b4a830&gt;] bus_probe_device+0x126/0x140
    [&lt;000000007813deaf&gt;] device_add+0x810/0x1130
    [&lt;000000007becb867&gt;] i2c_new_client_device+0x386/0x540
    [&lt;000000007f9cf4b4&gt;] of_i2c_register_device+0xf1/0x110
    [&lt;00000000ebfdd032&gt;] of_i2c_notify+0xfc/0x1f0

ov5675_init_controls() won't clean all the allocated resources in fail
path, which may causes the memleaks. Add v4l2_ctrl_handler_free() to
prevent memleak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54208/">CVE-2023-54208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54208">CVE-2023-54208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255962">SUSE bug 1255962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54209</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54209" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54209" ref_url="https://www.suse.com/security/cve/CVE-2023-54209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix blktrace debugfs entries leakage

Commit 99d055b4fd4b ("block: remove per-disk debugfs files in
blk_unregister_queue") moves blk_trace_shutdown() from
blk_release_queue() to blk_unregister_queue(), this is safe if blktrace
is created through sysfs, however, there is a regression in corner
case.

blktrace can still be enabled after del_gendisk() through ioctl if
the disk is opened before del_gendisk(), and if blktrace is not shutdown
through ioctl before closing the disk, debugfs entries will be leaked.

Fix this problem by shutdown blktrace in disk_release(), this is safe
because blk_trace_remove() is reentrant.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54209/">CVE-2023-54209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54209">CVE-2023-54209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255963">SUSE bug 1255963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54210</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54210" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54210" ref_url="https://www.suse.com/security/cve/CVE-2023-54210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_remove_adv_monitor()

KASAN reports that there's a use-after-free in
hci_remove_adv_monitor(). Trawling through the disassembly, you can
see that the complaint is from the access in bt_dev_dbg() under the
HCI_ADV_MONITOR_EXT_MSFT case. The problem case happens because
msft_remove_monitor() can end up freeing the monitor
structure. Specifically:
  hci_remove_adv_monitor() -&gt;
  msft_remove_monitor() -&gt;
  msft_remove_monitor_sync() -&gt;
  msft_le_cancel_monitor_advertisement_cb() -&gt;
  hci_free_adv_monitor()

Let's fix the problem by just stashing the relevant data when it's
still valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54210/">CVE-2023-54210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54210">CVE-2023-54210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255955">SUSE bug 1255955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255956">SUSE bug 1255956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54211</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54211" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54211" ref_url="https://www.suse.com/security/cve/CVE-2023-54211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix warning in trace_buffered_event_disable()

Warning happened in trace_buffered_event_disable() at
  WARN_ON_ONCE(!trace_buffered_event_ref)

  Call Trace:
   ? __warn+0xa5/0x1b0
   ? trace_buffered_event_disable+0x189/0x1b0
   __ftrace_event_enable_disable+0x19e/0x3e0
   free_probe_data+0x3b/0xa0
   unregister_ftrace_function_probe_func+0x6b8/0x800
   event_enable_func+0x2f0/0x3d0
   ftrace_process_regex.isra.0+0x12d/0x1b0
   ftrace_filter_write+0xe6/0x140
   vfs_write+0x1c9/0x6f0
   [...]

The cause of the warning is in __ftrace_event_enable_disable(),
trace_buffered_event_enable() was called once while
trace_buffered_event_disable() was called twice.
Reproduction script show as below, for analysis, see the comments:
 ```
 #!/bin/bash

 cd /sys/kernel/tracing/

 # 1. Register a 'disable_event' command, then:
 #    1) SOFT_DISABLED_BIT was set;
 #    2) trace_buffered_event_enable() was called first time;
 echo 'cmdline_proc_show:disable_event:initcall:initcall_finish' &gt; \
     set_ftrace_filter

 # 2. Enable the event registered, then:
 #    1) SOFT_DISABLED_BIT was cleared;
 #    2) trace_buffered_event_disable() was called first time;
 echo 1 &gt; events/initcall/initcall_finish/enable

 # 3. Try to call into cmdline_proc_show(), then SOFT_DISABLED_BIT was
 #    set again!!!
 cat /proc/cmdline

 # 4. Unregister the 'disable_event' command, then:
 #    1) SOFT_DISABLED_BIT was cleared again;
 #    2) trace_buffered_event_disable() was called second time!!!
 echo '!cmdline_proc_show:disable_event:initcall:initcall_finish' &gt; \
     set_ftrace_filter
 ```

To fix it, IIUC, we can change to call trace_buffered_event_enable() at
fist time soft-mode enabled, and call trace_buffered_event_disable() at
last time soft-mode disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54211/">CVE-2023-54211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54211">CVE-2023-54211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255843">SUSE bug 1255843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54214</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54214" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54214" ref_url="https://www.suse.com/security/cve/CVE-2023-54214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix potential user-after-free

This fixes all instances of which requires to allocate a buffer calling
alloc_skb which may release the chan lock and reacquire later which
makes it possible that the chan is disconnected in the meantime.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54214/">CVE-2023-54214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54214">CVE-2023-54214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255954">SUSE bug 1255954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54215</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54215" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54215" ref_url="https://www.suse.com/security/cve/CVE-2023-54215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-vdpa: Fix cpumask memory leak in virtio_vdpa_find_vqs()

Free the cpumask allocated by create_affinity_masks() before returning
from the function.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54215/">CVE-2023-54215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54215">CVE-2023-54215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255957">SUSE bug 1255957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54216</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54216" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54216" ref_url="https://www.suse.com/security/cve/CVE-2023-54216" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: TC, Fix using eswitch mapping in nic mode

Cited patch is using the eswitch object mapping pool while
in nic mode where it isn't initialized. This results in the
trace below [0].

Fix that by using either nic or eswitch object mapping pool
depending if eswitch is enabled or not.

[0]:
[  826.446057] ==================================================================
[  826.446729] BUG: KASAN: slab-use-after-free in mlx5_add_flow_rules+0x30/0x490 [mlx5_core]
[  826.447515] Read of size 8 at addr ffff888194485830 by task tc/6233

[  826.448243] CPU: 16 PID: 6233 Comm: tc Tainted: G        W          6.3.0-rc6+ #1
[  826.448890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[  826.449785] Call Trace:
[  826.450052]  &lt;TASK&gt;
[  826.450302]  dump_stack_lvl+0x33/0x50
[  826.450650]  print_report+0xc2/0x610
[  826.450998]  ? __virt_addr_valid+0xb1/0x130
[  826.451385]  ? mlx5_add_flow_rules+0x30/0x490 [mlx5_core]
[  826.451935]  kasan_report+0xae/0xe0
[  826.452276]  ? mlx5_add_flow_rules+0x30/0x490 [mlx5_core]
[  826.452829]  mlx5_add_flow_rules+0x30/0x490 [mlx5_core]
[  826.453368]  ? __kmalloc_node+0x5a/0x120
[  826.453733]  esw_add_restore_rule+0x20f/0x270 [mlx5_core]
[  826.454288]  ? mlx5_eswitch_add_send_to_vport_meta_rule+0x260/0x260 [mlx5_core]
[  826.455011]  ? mutex_unlock+0x80/0xd0
[  826.455361]  ? __mutex_unlock_slowpath.constprop.0+0x210/0x210
[  826.455862]  ? mapping_add+0x2cb/0x440 [mlx5_core]
[  826.456425]  mlx5e_tc_action_miss_mapping_get+0x139/0x180 [mlx5_core]
[  826.457058]  ? mlx5e_tc_update_skb_nic+0xb0/0xb0 [mlx5_core]
[  826.457636]  ? __kasan_kmalloc+0x77/0x90
[  826.458000]  ? __kmalloc+0x57/0x120
[  826.458336]  mlx5_tc_ct_flow_offload+0x325/0xe40 [mlx5_core]
[  826.458916]  ? ct_kernel_enter.constprop.0+0x48/0xa0
[  826.459360]  ? mlx5_tc_ct_parse_action+0xf0/0xf0 [mlx5_core]
[  826.459933]  ? mlx5e_mod_hdr_attach+0x491/0x520 [mlx5_core]
[  826.460507]  ? mlx5e_mod_hdr_get+0x12/0x20 [mlx5_core]
[  826.461046]  ? mlx5e_tc_attach_mod_hdr+0x154/0x170 [mlx5_core]
[  826.461635]  mlx5e_configure_flower+0x969/0x2110 [mlx5_core]
[  826.462217]  ? _raw_spin_lock_bh+0x85/0xe0
[  826.462597]  ? __mlx5e_add_fdb_flow+0x750/0x750 [mlx5_core]
[  826.463163]  ? kasan_save_stack+0x2e/0x40
[  826.463534]  ? down_read+0x115/0x1b0
[  826.463878]  ? down_write_killable+0x110/0x110
[  826.464288]  ? tc_setup_action.part.0+0x9f/0x3b0
[  826.464701]  ? mlx5e_is_uplink_rep+0x4c/0x90 [mlx5_core]
[  826.465253]  ? mlx5e_tc_reoffload_flows_work+0x130/0x130 [mlx5_core]
[  826.465878]  tc_setup_cb_add+0x112/0x250
[  826.466247]  fl_hw_replace_filter+0x230/0x310 [cls_flower]
[  826.466724]  ? fl_hw_destroy_filter+0x1a0/0x1a0 [cls_flower]
[  826.467212]  fl_change+0x14e1/0x2030 [cls_flower]
[  826.467636]  ? sock_def_readable+0x89/0x120
[  826.468019]  ? fl_tmplt_create+0x2d0/0x2d0 [cls_flower]
[  826.468509]  ? kasan_unpoison+0x23/0x50
[  826.468873]  ? get_random_u16+0x180/0x180
[  826.469244]  ? __radix_tree_lookup+0x2b/0x130
[  826.469640]  ? fl_get+0x7b/0x140 [cls_flower]
[  826.470042]  ? fl_mask_put+0x200/0x200 [cls_flower]
[  826.470478]  ? __mutex_unlock_slowpath.constprop.0+0x210/0x210
[  826.470973]  ? fl_tmplt_create+0x2d0/0x2d0 [cls_flower]
[  826.471427]  tc_new_tfilter+0x644/0x1050
[  826.471795]  ? tc_get_tfilter+0x860/0x860
[  826.472170]  ? __thaw_task+0x130/0x130
[  826.472525]  ? arch_stack_walk+0x98/0xf0
[  826.472892]  ? cap_capable+0x9f/0xd0
[  826.473235]  ? security_capable+0x47/0x60
[  826.473608]  rtnetlink_rcv_msg+0x1d5/0x550
[  826.473985]  ? rtnl_calcit.isra.0+0x1f0/0x1f0
[  826.474383]  ? __stack_depot_save+0x35/0x4c0
[  826.474779]  ? kasan_save_stack+0x2e/0x40
[  826.475149]  ? kasan_save_stack+0x1e/0x40
[  826.475518]  ? __kasan_record_aux_stack+0x9f/0xb0
[  826.475939]  ? task_work_add+0x77/0x1c0
[  826.476305]  netlink_rcv_skb+0xe0/0x210
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54216/">CVE-2023-54216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54216">CVE-2023-54216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255948">SUSE bug 1255948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54217</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54217" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54217" ref_url="https://www.suse.com/security/cve/CVE-2023-54217" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "drm/msm: Add missing check and destroy for alloc_ordered_workqueue"

This reverts commit 643b7d0869cc7f1f7a5ac7ca6bd25d88f54e31d0.

A recent patch that tried to fix up the msm_drm_init() paths with
respect to the workqueue but only ended up making things worse:

First, the newly added calls to msm_drm_uninit() on early errors would
trigger NULL-pointer dereferences, for example, as the kms pointer would
not have been initialised. (Note that these paths were also modified by
a second broken error handling patch which in effect cancelled out this
part when merged.)

Second, the newly added allocation sanity check would still leak the
previously allocated drm device.

Instead of trying to salvage what was badly broken (and clearly not
tested), let's revert the bad commit so that clean and backportable
fixes can be added in its place.

Patchwork: https://patchwork.freedesktop.org/patch/525107/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54217/">CVE-2023-54217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54217">CVE-2023-54217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256226">SUSE bug 1256226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54218</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54218" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54218" ref_url="https://www.suse.com/security/cve/CVE-2023-54218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: Fix load-tearing on sk-&gt;sk_stamp in sock_recv_cmsgs().

KCSAN found a data race in sock_recv_cmsgs() where the read access
to sk-&gt;sk_stamp needs READ_ONCE().

BUG: KCSAN: data-race in packet_recvmsg / packet_recvmsg

write (marked) to 0xffff88803c81f258 of 8 bytes by task 19171 on cpu 0:
 sock_write_timestamp include/net/sock.h:2670 [inline]
 sock_recv_cmsgs include/net/sock.h:2722 [inline]
 packet_recvmsg+0xb97/0xd00 net/packet/af_packet.c:3489
 sock_recvmsg_nosec net/socket.c:1019 [inline]
 sock_recvmsg+0x11a/0x130 net/socket.c:1040
 sock_read_iter+0x176/0x220 net/socket.c:1118
 call_read_iter include/linux/fs.h:1845 [inline]
 new_sync_read fs/read_write.c:389 [inline]
 vfs_read+0x5e0/0x630 fs/read_write.c:470
 ksys_read+0x163/0x1a0 fs/read_write.c:613
 __do_sys_read fs/read_write.c:623 [inline]
 __se_sys_read fs/read_write.c:621 [inline]
 __x64_sys_read+0x41/0x50 fs/read_write.c:621
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x72/0xdc

read to 0xffff88803c81f258 of 8 bytes by task 19183 on cpu 1:
 sock_recv_cmsgs include/net/sock.h:2721 [inline]
 packet_recvmsg+0xb64/0xd00 net/packet/af_packet.c:3489
 sock_recvmsg_nosec net/socket.c:1019 [inline]
 sock_recvmsg+0x11a/0x130 net/socket.c:1040
 sock_read_iter+0x176/0x220 net/socket.c:1118
 call_read_iter include/linux/fs.h:1845 [inline]
 new_sync_read fs/read_write.c:389 [inline]
 vfs_read+0x5e0/0x630 fs/read_write.c:470
 ksys_read+0x163/0x1a0 fs/read_write.c:613
 __do_sys_read fs/read_write.c:623 [inline]
 __se_sys_read fs/read_write.c:621 [inline]
 __x64_sys_read+0x41/0x50 fs/read_write.c:621
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x72/0xdc

value changed: 0xffffffffc4653600 -&gt; 0x0000000000000000

Reported by Kernel Concurrency Sanitizer on:
CPU: 1 PID: 19183 Comm: syz-executor.5 Not tainted 6.3.0-rc7-02330-gca6270c12e20 #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54218/">CVE-2023-54218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54218">CVE-2023-54218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256229">SUSE bug 1256229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54219</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54219" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54219" ref_url="https://www.suse.com/security/cve/CVE-2023-54219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "IB/isert: Fix incorrect release of isert connection"

Commit: 699826f4e30a ("IB/isert: Fix incorrect release of isert connection") is
causing problems on OPA when DEVICE_REMOVAL is happening.

 ------------[ cut here ]------------
 WARNING: CPU: 52 PID: 2117247 at drivers/infiniband/core/cq.c:359
ib_cq_pool_cleanup+0xac/0xb0 [ib_core]
 Modules linked in: nfsd nfs_acl target_core_user uio tcm_fc libfc
scsi_transport_fc tcm_loop target_core_pscsi target_core_iblock target_core_file
rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs
rfkill rpcrdma rdma_ucm ib_srpt sunrpc ib_isert iscsi_target_mod target_core_mod
opa_vnic ib_iser libiscsi ib_umad scsi_transport_iscsi rdma_cm ib_ipoib iw_cm
ib_cm hfi1(-) rdmavt ib_uverbs intel_rapl_msr intel_rapl_common sb_edac ib_core
x86_pkg_temp_thermal intel_powerclamp coretemp i2c_i801 mxm_wmi rapl iTCO_wdt
ipmi_si iTCO_vendor_support mei_me ipmi_devintf mei intel_cstate ioatdma
intel_uncore i2c_smbus joydev pcspkr lpc_ich ipmi_msghandler acpi_power_meter
acpi_pad xfs libcrc32c sr_mod sd_mod cdrom t10_pi sg crct10dif_pclmul
crc32_pclmul crc32c_intel drm_kms_helper drm_shmem_helper ahci libahci
ghash_clmulni_intel igb drm libata dca i2c_algo_bit wmi fuse
 CPU: 52 PID: 2117247 Comm: modprobe Not tainted 6.5.0-rc1+ #1
 Hardware name: Intel Corporation S2600CWR/S2600CW, BIOS
SE5C610.86B.01.01.0014.121820151719 12/18/2015
 RIP: 0010:ib_cq_pool_cleanup+0xac/0xb0 [ib_core]
 Code: ff 48 8b 43 40 48 8d 7b 40 48 83 e8 40 4c 39 e7 75 b3 49 83
c4 10 4d 39 fc 75 94 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc &lt;0f&gt; 0b eb a1
90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f
 RSP: 0018:ffffc10bea13fc80 EFLAGS: 00010206
 RAX: 000000000000010c RBX: ffff9bf5c7e66c00 RCX: 000000008020001d
 RDX: 000000008020001e RSI: fffff175221f9900 RDI: ffff9bf5c7e67640
 RBP: ffff9bf5c7e67600 R08: ffff9bf5c7e64400 R09: 000000008020001d
 R10: 0000000040000000 R11: 0000000000000000 R12: ffff9bee4b1e8a18
 R13: dead000000000122 R14: dead000000000100 R15: ffff9bee4b1e8a38
 FS:  00007ff1e6d38740(0000) GS:ffff9bfd9fb00000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00005652044ecc68 CR3: 0000000889b5c005 CR4: 00000000001706e0
 Call Trace:
  &lt;TASK&gt;
  ? __warn+0x80/0x130
  ? ib_cq_pool_cleanup+0xac/0xb0 [ib_core]
  ? report_bug+0x195/0x1a0
  ? handle_bug+0x3c/0x70
  ? exc_invalid_op+0x14/0x70
  ? asm_exc_invalid_op+0x16/0x20
  ? ib_cq_pool_cleanup+0xac/0xb0 [ib_core]
  disable_device+0x9d/0x160 [ib_core]
  __ib_unregister_device+0x42/0xb0 [ib_core]
  ib_unregister_device+0x22/0x30 [ib_core]
  rvt_unregister_device+0x20/0x90 [rdmavt]
  hfi1_unregister_ib_device+0x16/0xf0 [hfi1]
  remove_one+0x55/0x1a0 [hfi1]
  pci_device_remove+0x36/0xa0
  device_release_driver_internal+0x193/0x200
  driver_detach+0x44/0x90
  bus_remove_driver+0x69/0xf0
  pci_unregister_driver+0x2a/0xb0
  hfi1_mod_cleanup+0xc/0x3c [hfi1]
  __do_sys_delete_module.constprop.0+0x17a/0x2f0
  ? exit_to_user_mode_prepare+0xc4/0xd0
  ? syscall_trace_enter.constprop.0+0x126/0x1a0
  do_syscall_64+0x5c/0x90
  ? syscall_exit_to_user_mode+0x12/0x30
  ? do_syscall_64+0x69/0x90
  ? syscall_exit_work+0x103/0x130
  ? syscall_exit_to_user_mode+0x12/0x30
  ? do_syscall_64+0x69/0x90
  ? exc_page_fault+0x65/0x150
  entry_SYSCALL_64_after_hwframe+0x6e/0xd8
 RIP: 0033:0x7ff1e643f5ab
 Code: 73 01 c3 48 8b 0d 75 a8 1b 00 f7 d8 64 89 01 48 83 c8 ff c3
66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 b0 00 00 00 0f 05 &lt;48&gt; 3d 01 f0
ff ff 73 01 c3 48 8b 0d 45 a8 1b 00 f7 d8 64 89 01 48
 RSP: 002b:00007ffec9103cc8 EFLAGS: 00000206 ORIG_RAX: 00000000000000b0
 RAX: ffffffffffffffda RBX: 00005615267fdc50 RCX: 00007ff1e643f5ab
 RDX: 0000000000000000 RSI: 0000000000000800 RDI: 00005615267fdcb8
 RBP: 00005615267fdc50 R08: 0000000000000000 R09: 0000000000000000
 R10: 00007ff1e659eac0 R11: 0000000000000206 R12: 00005615267fdcb8
 R13: 00000000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54219/">CVE-2023-54219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54219">CVE-2023-54219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256231">SUSE bug 1256231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54220</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54220" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54220" ref_url="https://www.suse.com/security/cve/CVE-2023-54220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: 8250: Fix oops for port-&gt;pm on uart_change_pm()

Unloading a hardware specific 8250 driver can produce error "Unable to
handle kernel paging request at virtual address" about ten seconds after
unloading the driver. This happens on uart_hangup() calling
uart_change_pm().

Turns out commit 04e82793f068 ("serial: 8250: Reinit port-&gt;pm on port
specific driver unbind") was only a partial fix. If the hardware specific
driver has initialized port-&gt;pm function, we need to clear port-&gt;pm too.
Just reinitializing port-&gt;ops does not do this. Otherwise serial8250_pm()
will call port-&gt;pm() instead of serial8250_do_pm().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54220/">CVE-2023-54220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54220">CVE-2023-54220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255949">SUSE bug 1255949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54221</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54221" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54221" ref_url="https://www.suse.com/security/cve/CVE-2023-54221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: imx93: fix memory leak and missing unwind goto in imx93_clocks_probe

In function probe(), it returns directly without unregistered hws
when error occurs.

Fix this by adding 'goto unregister_hws;' on line 295 and
line 310.

Use devm_kzalloc() instead of kzalloc() to automatically
free the memory using devm_kfree() when error occurs.

Replace of_iomap() with devm_of_iomap() to automatically
handle the unused ioremap region and delete 'iounmap(anatop_base);'
in unregister_hws.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-04"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54221/">CVE-2023-54221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54221">CVE-2023-54221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255842">SUSE bug 1255842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54222</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54222" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54222" ref_url="https://www.suse.com/security/cve/CVE-2023-54222" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hte: tegra-194: Fix off by one in tegra_hte_map_to_line_id()

The "map_sz" is the number of elements in the "m" array so the &gt;
comparison needs to be changed to &gt;= to prevent an out of bounds
read.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54222/">CVE-2023-54222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54222">CVE-2023-54222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256232">SUSE bug 1256232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54223</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54223" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54223" ref_url="https://www.suse.com/security/cve/CVE-2023-54223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: xsk: Fix invalid buffer access for legacy rq

The below crash can be encountered when using xdpsock in rx mode for
legacy rq: the buffer gets released in the XDP_REDIRECT path, and then
once again in the driver. This fix sets the flag to avoid releasing on
the driver side.

XSK handling of buffers for legacy rq was relying on the caller to set
the skip release flag. But the referenced fix started using fragment
counts for pages instead of the skip flag.

Crash log:
 general protection fault, probably for non-canonical address 0xffff8881217e3a: 0000 [#1] SMP
 CPU: 0 PID: 14 Comm: ksoftirqd/0 Not tainted 6.5.0-rc1+ #31
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
 RIP: 0010:bpf_prog_03b13f331978c78c+0xf/0x28
 Code:  ...
 RSP: 0018:ffff88810082fc98 EFLAGS: 00010246
 RAX: 0000000000000000 RBX: ffff888138404901 RCX: c0ffffc900027cbc
 RDX: ffffffffa000b514 RSI: 00ffff8881217e32 RDI: ffff888138404901
 RBP: ffff88810082fc98 R08: 0000000000091100 R09: 0000000000000006
 R10: 0000000000000800 R11: 0000000000000800 R12: ffffc9000027a000
 R13: ffff8881217e2dc0 R14: ffff8881217e2910 R15: ffff8881217e2f00
 FS:  0000000000000000(0000) GS:ffff88852c800000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000564cb2e2cde0 CR3: 000000010e603004 CR4: 0000000000370eb0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;TASK&gt;
  ? die_addr+0x32/0x80
  ? exc_general_protection+0x192/0x390
  ? asm_exc_general_protection+0x22/0x30
  ? 0xffffffffa000b514
  ? bpf_prog_03b13f331978c78c+0xf/0x28
  mlx5e_xdp_handle+0x48/0x670 [mlx5_core]
  ? dev_gro_receive+0x3b5/0x6e0
  mlx5e_xsk_skb_from_cqe_linear+0x6e/0x90 [mlx5_core]
  mlx5e_handle_rx_cqe+0x55/0x100 [mlx5_core]
  mlx5e_poll_rx_cq+0x87/0x6e0 [mlx5_core]
  mlx5e_napi_poll+0x45e/0x6b0 [mlx5_core]
  __napi_poll+0x25/0x1a0
  net_rx_action+0x28a/0x300
  __do_softirq+0xcd/0x279
  ? sort_range+0x20/0x20
  run_ksoftirqd+0x1a/0x20
  smpboot_thread_fn+0xa2/0x130
  kthread+0xc9/0xf0
  ? kthread_complete_and_exit+0x20/0x20
  ret_from_fork+0x1f/0x30
  &lt;/TASK&gt;
 Modules linked in: mlx5_ib mlx5_core rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm ib_uverbs ib_core xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat br_netfilter overlay zram zsmalloc fuse [last unloaded: mlx5_core]
 ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54223/">CVE-2023-54223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54223">CVE-2023-54223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256233">SUSE bug 1256233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256253">SUSE bug 1256253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54224</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54224" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54224" ref_url="https://www.suse.com/security/cve/CVE-2023-54224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix lockdep splat and potential deadlock after failure running delayed items

When running delayed items we are holding a delayed node's mutex and then
we will attempt to modify a subvolume btree to insert/update/delete the
delayed items. However if have an error during the insertions for example,
btrfs_insert_delayed_items() may return with a path that has locked extent
buffers (a leaf at the very least), and then we attempt to release the
delayed node at __btrfs_run_delayed_items(), which requires taking the
delayed node's mutex, causing an ABBA type of deadlock. This was reported
by syzbot and the lockdep splat is the following:

  WARNING: possible circular locking dependency detected
  6.5.0-rc7-syzkaller-00024-g93f5de5f648d #0 Not tainted
  ------------------------------------------------------
  syz-executor.2/13257 is trying to acquire lock:
  ffff88801835c0c0 (&amp;delayed_node-&gt;mutex){+.+.}-{3:3}, at: __btrfs_release_delayed_node+0x9a/0xaa0 fs/btrfs/delayed-inode.c:256

  but task is already holding lock:
  ffff88802a5ab8e8 (btrfs-tree-00){++++}-{3:3}, at: __btrfs_tree_lock+0x3c/0x2a0 fs/btrfs/locking.c:198

  which lock already depends on the new lock.

  the existing dependency chain (in reverse order) is:

  -&gt; #1 (btrfs-tree-00){++++}-{3:3}:
         __lock_release kernel/locking/lockdep.c:5475 [inline]
         lock_release+0x36f/0x9d0 kernel/locking/lockdep.c:5781
         up_write+0x79/0x580 kernel/locking/rwsem.c:1625
         btrfs_tree_unlock_rw fs/btrfs/locking.h:189 [inline]
         btrfs_unlock_up_safe+0x179/0x3b0 fs/btrfs/locking.c:239
         search_leaf fs/btrfs/ctree.c:1986 [inline]
         btrfs_search_slot+0x2511/0x2f80 fs/btrfs/ctree.c:2230
         btrfs_insert_empty_items+0x9c/0x180 fs/btrfs/ctree.c:4376
         btrfs_insert_delayed_item fs/btrfs/delayed-inode.c:746 [inline]
         btrfs_insert_delayed_items fs/btrfs/delayed-inode.c:824 [inline]
         __btrfs_commit_inode_delayed_items+0xd24/0x2410 fs/btrfs/delayed-inode.c:1111
         __btrfs_run_delayed_items+0x1db/0x430 fs/btrfs/delayed-inode.c:1153
         flush_space+0x269/0xe70 fs/btrfs/space-info.c:723
         btrfs_async_reclaim_metadata_space+0x106/0x350 fs/btrfs/space-info.c:1078
         process_one_work+0x92c/0x12c0 kernel/workqueue.c:2600
         worker_thread+0xa63/0x1210 kernel/workqueue.c:2751
         kthread+0x2b8/0x350 kernel/kthread.c:389
         ret_from_fork+0x2e/0x60 arch/x86/kernel/process.c:145
         ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304

  -&gt; #0 (&amp;delayed_node-&gt;mutex){+.+.}-{3:3}:
         check_prev_add kernel/locking/lockdep.c:3142 [inline]
         check_prevs_add kernel/locking/lockdep.c:3261 [inline]
         validate_chain kernel/locking/lockdep.c:3876 [inline]
         __lock_acquire+0x39ff/0x7f70 kernel/locking/lockdep.c:5144
         lock_acquire+0x1e3/0x520 kernel/locking/lockdep.c:5761
         __mutex_lock_common+0x1d8/0x2530 kernel/locking/mutex.c:603
         __mutex_lock kernel/locking/mutex.c:747 [inline]
         mutex_lock_nested+0x1b/0x20 kernel/locking/mutex.c:799
         __btrfs_release_delayed_node+0x9a/0xaa0 fs/btrfs/delayed-inode.c:256
         btrfs_release_delayed_node fs/btrfs/delayed-inode.c:281 [inline]
         __btrfs_run_delayed_items+0x2b5/0x430 fs/btrfs/delayed-inode.c:1156
         btrfs_commit_transaction+0x859/0x2ff0 fs/btrfs/transaction.c:2276
         btrfs_sync_file+0xf56/0x1330 fs/btrfs/file.c:1988
         vfs_fsync_range fs/sync.c:188 [inline]
         vfs_fsync fs/sync.c:202 [inline]
         do_fsync fs/sync.c:212 [inline]
         __do_sys_fsync fs/sync.c:220 [inline]
         __se_sys_fsync fs/sync.c:218 [inline]
         __x64_sys_fsync+0x196/0x1e0 fs/sync.c:218
         do_syscall_x64 arch/x86/entry/common.c:50 [inline]
         do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
         entry_SYSCALL_64_after_hwframe+0x63/0xcd

  other info that
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54224/">CVE-2023-54224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54224">CVE-2023-54224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255951">SUSE bug 1255951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54225</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54225" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54225" ref_url="https://www.suse.com/security/cve/CVE-2023-54225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ipa: only reset hashed tables when supported

Last year, the code that manages GSI channel transactions switched
from using spinlock-protected linked lists to using indexes into the
ring buffer used for a channel.  Recently, Google reported seeing
transaction reference count underflows occasionally during shutdown.

Doug Anderson found a way to reproduce the issue reliably, and
bisected the issue to the commit that eliminated the linked lists
and the lock.  The root cause was ultimately determined to be
related to unused transactions being committed as part of the modem
shutdown cleanup activity.  Unused transactions are not normally
expected (except in error cases).

The modem uses some ranges of IPA-resident memory, and whenever it
shuts down we zero those ranges.  In ipa_filter_reset_table() a
transaction is allocated to zero modem filter table entries.  If
hashing is not supported, hashed table memory should not be zeroed.
But currently nothing prevents that, and the result is an unused
transaction.  Something similar occurs when we zero routing table
entries for the modem.

By preventing any attempt to clear hashed tables when hashing is not
supported, the reference count underflow is avoided in this case.

Note that there likely remains an issue with properly freeing unused
transactions (if they occur due to errors).  This patch addresses
only the underflows that Google originally reported.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54225/">CVE-2023-54225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54225">CVE-2023-54225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256234">SUSE bug 1256234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54226</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54226" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54226" ref_url="https://www.suse.com/security/cve/CVE-2023-54226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Fix data races around sk-&gt;sk_shutdown.

KCSAN found a data race around sk-&gt;sk_shutdown where unix_release_sock()
and unix_shutdown() update it under unix_state_lock(), OTOH unix_poll()
and unix_dgram_poll() read it locklessly.

We need to annotate the writes and reads with WRITE_ONCE() and READ_ONCE().

BUG: KCSAN: data-race in unix_poll / unix_release_sock

write to 0xffff88800d0f8aec of 1 bytes by task 264 on cpu 0:
 unix_release_sock+0x75c/0x910 net/unix/af_unix.c:631
 unix_release+0x59/0x80 net/unix/af_unix.c:1042
 __sock_release+0x7d/0x170 net/socket.c:653
 sock_close+0x19/0x30 net/socket.c:1397
 __fput+0x179/0x5e0 fs/file_table.c:321
 ____fput+0x15/0x20 fs/file_table.c:349
 task_work_run+0x116/0x1a0 kernel/task_work.c:179
 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
 exit_to_user_mode_loop kernel/entry/common.c:171 [inline]
 exit_to_user_mode_prepare+0x174/0x180 kernel/entry/common.c:204
 __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline]
 syscall_exit_to_user_mode+0x1a/0x30 kernel/entry/common.c:297
 do_syscall_64+0x4b/0x90 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x72/0xdc

read to 0xffff88800d0f8aec of 1 bytes by task 222 on cpu 1:
 unix_poll+0xa3/0x2a0 net/unix/af_unix.c:3170
 sock_poll+0xcf/0x2b0 net/socket.c:1385
 vfs_poll include/linux/poll.h:88 [inline]
 ep_item_poll.isra.0+0x78/0xc0 fs/eventpoll.c:855
 ep_send_events fs/eventpoll.c:1694 [inline]
 ep_poll fs/eventpoll.c:1823 [inline]
 do_epoll_wait+0x6c4/0xea0 fs/eventpoll.c:2258
 __do_sys_epoll_wait fs/eventpoll.c:2270 [inline]
 __se_sys_epoll_wait fs/eventpoll.c:2265 [inline]
 __x64_sys_epoll_wait+0xcc/0x190 fs/eventpoll.c:2265
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x72/0xdc

value changed: 0x00 -&gt; 0x03

Reported by Kernel Concurrency Sanitizer on:
CPU: 1 PID: 222 Comm: dbus-broker Not tainted 6.3.0-rc7-02330-gca6270c12e20 #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-04"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54226/">CVE-2023-54226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54226">CVE-2023-54226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255841">SUSE bug 1255841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54227</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54227" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54227" ref_url="https://www.suse.com/security/cve/CVE-2023-54227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-mq: fix tags leak when shrink nr_hw_queues

Although we don't need to realloc set-&gt;tags[] when shrink nr_hw_queues,
we need to free them. Or these tags will be leaked.

How to reproduce:
1. mount -t configfs configfs /mnt
2. modprobe null_blk nr_devices=0 submit_queues=8
3. mkdir /mnt/nullb/nullb0
4. echo 1 &gt; /mnt/nullb/nullb0/power
5. echo 4 &gt; /mnt/nullb/nullb0/submit_queues
6. rmdir /mnt/nullb/nullb0

In step 4, will alloc 9 tags (8 submit queues and 1 poll queue), then
in step 5, new_nr_hw_queues = 5 (4 submit queues and 1 poll queue).
At last in step 6, only these 5 tags are freed, the other 4 tags leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54227/">CVE-2023-54227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54227">CVE-2023-54227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255952">SUSE bug 1255952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54228</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54228" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54228" ref_url="https://www.suse.com/security/cve/CVE-2023-54228" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: raa215300: Fix resource leak in case of error

The clk_register_clkdev() allocates memory by calling vclkdev_alloc() and
this memory is not freed in the error path. Similarly, resources allocated
by clk_register_fixed_rate() are not freed in the error path.

Fix these issues by using devm_clk_hw_register_fixed_rate() and
devm_clk_hw_register_clkdev().

After this, the static variable clk is not needed. Replace it with  
local variable hw in probe() and drop calling clk_unregister_fixed_rate()
from raa215300_rtc_unregister_device().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54228/">CVE-2023-54228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54228">CVE-2023-54228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256236">SUSE bug 1256236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54230</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54230" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54230" ref_url="https://www.suse.com/security/cve/CVE-2023-54230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

amba: bus: fix refcount leak

commit 5de1540b7bc4 ("drivers/amba: create devices from device tree")
increases the refcount of of_node, but not releases it in
amba_device_release, so there is refcount leak. By using of_node_put
to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54230/">CVE-2023-54230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54230">CVE-2023-54230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255925">SUSE bug 1255925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54231</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54231" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54231" ref_url="https://www.suse.com/security/cve/CVE-2023-54231" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: libwx: fix memory leak in wx_setup_rx_resources

When wx_alloc_page_pool() failed in wx_setup_rx_resources(), it doesn't
release DMA buffer. Add dma_free_coherent() in the error path to release
the DMA buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54231/">CVE-2023-54231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54231">CVE-2023-54231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255926">SUSE bug 1255926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54233</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54233" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54233" ref_url="https://www.suse.com/security/cve/CVE-2023-54233" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: avoid a NULL dereference with unsupported widgets

If an IPC4 topology contains an unsupported widget, its .module_info
field won't be set, then sof_ipc4_route_setup() will cause a kernel
Oops trying to dereference it. Add a check for such cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-03"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54233/">CVE-2023-54233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54233">CVE-2023-54233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255840">SUSE bug 1255840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54234</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54234" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54234" ref_url="https://www.suse.com/security/cve/CVE-2023-54234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpi3mr: Fix missing mrioc-&gt;evtack_cmds initialization

Commit c1af985d27da ("scsi: mpi3mr: Add Event acknowledgment logic")
introduced an array mrioc-&gt;evtack_cmds but initialization of the array
elements was missed. They are just zero cleared. The function
mpi3mr_complete_evt_ack() refers host_tag field of the elements. Due to the
zero value of the host_tag field, the function calls clear_bit() for
mrico-&gt;evtack_cmds_bitmap with wrong bit index. This results in memory
access to invalid address and "BUG: KASAN: use-after-free". This BUG was
observed at eHBA-9600 firmware update to version 8.3.1.0. To fix it, add
the missing initialization of mrioc-&gt;evtack_cmds.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54234/">CVE-2023-54234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54234">CVE-2023-54234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255920">SUSE bug 1255920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54235</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54235" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54235" ref_url="https://www.suse.com/security/cve/CVE-2023-54235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI/DOE: Fix destroy_work_on_stack() race

The following debug object splat was observed in testing:

  ODEBUG: free active (active state 0) object: 0000000097d23782 object type: work_struct hint: doe_statemachine_work+0x0/0x510
  WARNING: CPU: 1 PID: 71 at lib/debugobjects.c:514 debug_print_object+0x7d/0xb0
  ...
  Workqueue: pci 0000:36:00.0 DOE [1 doe_statemachine_work
  RIP: 0010:debug_print_object+0x7d/0xb0
  ...
  Call Trace:
   ? debug_print_object+0x7d/0xb0
   ? __pfx_doe_statemachine_work+0x10/0x10
   debug_object_free.part.0+0x11b/0x150
   doe_statemachine_work+0x45e/0x510
   process_one_work+0x1d4/0x3c0

This occurs because destroy_work_on_stack() was called after signaling
the completion in the calling thread.  This creates a race between
destroy_work_on_stack() and the task-&gt;work struct going out of scope in
pci_doe().

Signal the work complete after destroying the work struct.  This is safe
because signal_task_complete() is the final thing the work item does and
the workqueue code is careful not to access the work struct after.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54235/">CVE-2023-54235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54235">CVE-2023-54235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255921">SUSE bug 1255921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54236</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54236" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54236" ref_url="https://www.suse.com/security/cve/CVE-2023-54236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/net_failover: fix txq exceeding warning

The failover txq is inited as 16 queues.
when a packet is transmitted from the failover device firstly,
the failover device will select the queue which is returned from
the primary device if the primary device is UP and running.
If the primary device txq is bigger than the default 16,
it can lead to the following warning:
eth0 selects TX queue 18, but real number of TX queues is 16

The warning backtrace is:
[   32.146376] CPU: 18 PID: 9134 Comm: chronyd Tainted: G            E      6.2.8-1.el7.centos.x86_64 #1
[   32.147175] Hardware name: Red Hat KVM, BIOS 1.10.2-3.el7_4.1 04/01/2014
[   32.147730] Call Trace:
[   32.147971]  &lt;TASK&gt;
[   32.148183]  dump_stack_lvl+0x48/0x70
[   32.148514]  dump_stack+0x10/0x20
[   32.148820]  netdev_core_pick_tx+0xb1/0xe0
[   32.149180]  __dev_queue_xmit+0x529/0xcf0
[   32.149533]  ? __check_object_size.part.0+0x21c/0x2c0
[   32.149967]  ip_finish_output2+0x278/0x560
[   32.150327]  __ip_finish_output+0x1fe/0x2f0
[   32.150690]  ip_finish_output+0x2a/0xd0
[   32.151032]  ip_output+0x7a/0x110
[   32.151337]  ? __pfx_ip_finish_output+0x10/0x10
[   32.151733]  ip_local_out+0x5e/0x70
[   32.152054]  ip_send_skb+0x19/0x50
[   32.152366]  udp_send_skb.isra.0+0x163/0x3a0
[   32.152736]  udp_sendmsg+0xba8/0xec0
[   32.153060]  ? __folio_memcg_unlock+0x25/0x60
[   32.153445]  ? __pfx_ip_generic_getfrag+0x10/0x10
[   32.153854]  ? sock_has_perm+0x85/0xa0
[   32.154190]  inet_sendmsg+0x6d/0x80
[   32.154508]  ? inet_sendmsg+0x6d/0x80
[   32.154838]  sock_sendmsg+0x62/0x70
[   32.155152]  ____sys_sendmsg+0x134/0x290
[   32.155499]  ___sys_sendmsg+0x81/0xc0
[   32.155828]  ? _get_random_bytes.part.0+0x79/0x1a0
[   32.156240]  ? ip4_datagram_release_cb+0x5f/0x1e0
[   32.156649]  ? get_random_u16+0x69/0xf0
[   32.156989]  ? __fget_light+0xcf/0x110
[   32.157326]  __sys_sendmmsg+0xc4/0x210
[   32.157657]  ? __sys_connect+0xb7/0xe0
[   32.157995]  ? __audit_syscall_entry+0xce/0x140
[   32.158388]  ? syscall_trace_enter.isra.0+0x12c/0x1a0
[   32.158820]  __x64_sys_sendmmsg+0x24/0x30
[   32.159171]  do_syscall_64+0x38/0x90
[   32.159493]  entry_SYSCALL_64_after_hwframe+0x72/0xdc

Fix that by reducing txq number as the non-existent primary-dev does.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54236/">CVE-2023-54236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54236">CVE-2023-54236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255922">SUSE bug 1255922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54237</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54237" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54237" ref_url="https://www.suse.com/security/cve/CVE-2023-54237" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix potential panic dues to unprotected smc_llc_srv_add_link()

There is a certain chance to trigger the following panic:

PID: 5900   TASK: ffff88c1c8af4100  CPU: 1   COMMAND: "kworker/1:48"
 #0 [ffff9456c1cc79a0] machine_kexec at ffffffff870665b7
 #1 [ffff9456c1cc79f0] __crash_kexec at ffffffff871b4c7a
 #2 [ffff9456c1cc7ab0] crash_kexec at ffffffff871b5b60
 #3 [ffff9456c1cc7ac0] oops_end at ffffffff87026ce7
 #4 [ffff9456c1cc7ae0] page_fault_oops at ffffffff87075715
 #5 [ffff9456c1cc7b58] exc_page_fault at ffffffff87ad0654
 #6 [ffff9456c1cc7b80] asm_exc_page_fault at ffffffff87c00b62
    [exception RIP: ib_alloc_mr+19]
    RIP: ffffffffc0c9cce3  RSP: ffff9456c1cc7c38  RFLAGS: 00010202
    RAX: 0000000000000000  RBX: 0000000000000002  RCX: 0000000000000004
    RDX: 0000000000000010  RSI: 0000000000000000  RDI: 0000000000000000
    RBP: ffff88c1ea281d00   R8: 000000020a34ffff   R9: ffff88c1350bbb20
    R10: 0000000000000000  R11: 0000000000000001  R12: 0000000000000000
    R13: 0000000000000010  R14: ffff88c1ab040a50  R15: ffff88c1ea281d00
    ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
 #7 [ffff9456c1cc7c60] smc_ib_get_memory_region at ffffffffc0aff6df [smc]
 #8 [ffff9456c1cc7c88] smcr_buf_map_link at ffffffffc0b0278c [smc]
 #9 [ffff9456c1cc7ce0] __smc_buf_create at ffffffffc0b03586 [smc]

The reason here is that when the server tries to create a second link,
smc_llc_srv_add_link() has no protection and may add a new link to
link group. This breaks the security environment protected by
llc_conf_mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54237/">CVE-2023-54237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54237">CVE-2023-54237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255923">SUSE bug 1255923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54238</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54238" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54238" ref_url="https://www.suse.com/security/cve/CVE-2023-54238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlx5: fix skb leak while fifo resync and push

During ptp resync operation SKBs were poped from the fifo but were never
freed neither by napi_consume nor by dev_kfree_skb_any. Add call to
napi_consume_skb to properly free SKBs.

Another leak was happening because mlx5e_skb_fifo_has_room() had an error
in the check. Comparing free running counters works well unless C promotes
the types to something wider than the counter. In this case counters are
u16 but the result of the substraction is promouted to int and it causes
wrong result (negative value) of the check when producer have already
overlapped but consumer haven't yet. Explicit cast to u16 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54238/">CVE-2023-54238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54238">CVE-2023-54238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255916">SUSE bug 1255916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54239</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54239" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54239" ref_url="https://www.suse.com/security/cve/CVE-2023-54239" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Check for uptr overflow

syzkaller found that setting up a map with a user VA that wraps past zero
can trigger WARN_ONs, particularly from pin_user_pages weirdly returning 0
due to invalid arguments.

Prevent creating a pages with a uptr and size that would math overflow.

  WARNING: CPU: 0 PID: 518 at drivers/iommu/iommufd/pages.c:793 pfn_reader_user_pin+0x2e6/0x390
  Modules linked in:
  CPU: 0 PID: 518 Comm: repro Not tainted 6.3.0-rc2-eeac8ede1755+ #1
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
  RIP: 0010:pfn_reader_user_pin+0x2e6/0x390
  Code: b1 11 e9 25 fe ff ff e8 28 e4 0f ff 31 ff 48 89 de e8 2e e6 0f ff 48 85 db 74 0a e8 14 e4 0f ff e9 4d ff ff ff e8 0a e4 0f ff &lt;0f&gt; 0b bb f2 ff ff ff e9 3c ff ff ff e8 f9 e3 0f ff ba 01 00 00 00
  RSP: 0018:ffffc90000f9fa30 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff821e2b72
  RDX: 0000000000000000 RSI: ffff888014184680 RDI: 0000000000000002
  RBP: ffffc90000f9fa78 R08: 00000000000000ff R09: 0000000079de6f4e
  R10: ffffc90000f9f790 R11: ffff888014185418 R12: ffffc90000f9fc60
  R13: 0000000000000002 R14: ffff888007879800 R15: 0000000000000000
  FS:  00007f4227555740(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000020000043 CR3: 000000000e748005 CR4: 0000000000770ef0
  PKRU: 55555554
  Call Trace:
   &lt;TASK&gt;
   pfn_reader_next+0x14a/0x7b0
   ? interval_tree_double_span_iter_update+0x11a/0x140
   pfn_reader_first+0x140/0x1b0
   iopt_pages_rw_slow+0x71/0x280
   ? __this_cpu_preempt_check+0x20/0x30
   iopt_pages_rw_access+0x2b2/0x5b0
   iommufd_access_rw+0x19f/0x2f0
   iommufd_test+0xd11/0x16f0
   ? write_comp_data+0x2f/0x90
   iommufd_fops_ioctl+0x206/0x330
   __x64_sys_ioctl+0x10e/0x160
   ? __pfx_iommufd_fops_ioctl+0x10/0x10
   do_syscall_64+0x3b/0x90
   entry_SYSCALL_64_after_hwframe+0x72/0xdc
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54239/">CVE-2023-54239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54239">CVE-2023-54239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255917">SUSE bug 1255917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54240</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54240" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54240" ref_url="https://www.suse.com/security/cve/CVE-2023-54240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: mtk_eth_soc: fix possible NULL pointer dereference in mtk_hwlro_get_fdir_all()

rule_locs is allocated in ethtool_get_rxnfc and the size is determined by
rule_cnt from user space. So rule_cnt needs to be check before using
rule_locs to avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54240/">CVE-2023-54240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54240">CVE-2023-54240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255918">SUSE bug 1255918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54241</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54241" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54241" ref_url="https://www.suse.com/security/cve/CVE-2023-54241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

MIPS: KVM: Fix NULL pointer dereference

After commit 45c7e8af4a5e3f0bea4ac209 ("MIPS: Remove KVM_TE support") we
get a NULL pointer dereference when creating a KVM guest:

[  146.243409] Starting KVM with MIPS VZ extensions
[  149.849151] CPU 3 Unable to handle kernel paging request at virtual address 0000000000000300, epc == ffffffffc06356ec, ra == ffffffffc063568c
[  149.849177] Oops[#1]:
[  149.849182] CPU: 3 PID: 2265 Comm: qemu-system-mip Not tainted 6.4.0-rc3+ #1671
[  149.849188] Hardware name: THTF CX TL630 Series/THTF-LS3A4000-7A1000-ML4A, BIOS KL4.1F.TF.D.166.201225.R 12/25/2020
[  149.849192] $ 0   : 0000000000000000 000000007400cce0 0000000000400004 ffffffff8119c740
[  149.849209] $ 4   : 000000007400cce1 000000007400cce1 0000000000000000 0000000000000000
[  149.849221] $ 8   : 000000240058bb36 ffffffff81421ac0 0000000000000000 0000000000400dc0
[  149.849233] $12   : 9800000102a07cc8 ffffffff80e40e38 0000000000000001 0000000000400dc0
[  149.849245] $16   : 0000000000000000 9800000106cd0000 9800000106cd0000 9800000100cce000
[  149.849257] $20   : ffffffffc0632b28 ffffffffc05b31b0 9800000100ccca00 0000000000400000
[  149.849269] $24   : 9800000106cd09ce ffffffff802f69d0
[  149.849281] $28   : 9800000102a04000 9800000102a07cd0 98000001106a8000 ffffffffc063568c
[  149.849293] Hi    : 00000335b2111e66
[  149.849295] Lo    : 6668d90061ae0ae9
[  149.849298] epc   : ffffffffc06356ec kvm_vz_vcpu_setup+0xc4/0x328 [kvm]
[  149.849324] ra    : ffffffffc063568c kvm_vz_vcpu_setup+0x64/0x328 [kvm]
[  149.849336] Status: 7400cce3 KX SX UX KERNEL EXL IE
[  149.849351] Cause : 1000000c (ExcCode 03)
[  149.849354] BadVA : 0000000000000300
[  149.849357] PrId  : 0014c004 (ICT Loongson-3)
[  149.849360] Modules linked in: kvm nfnetlink_queue nfnetlink_log nfnetlink fuse sha256_generic libsha256 cfg80211 rfkill binfmt_misc vfat fat snd_hda_codec_hdmi input_leds led_class snd_hda_intel snd_intel_dspcfg snd_hda_codec snd_hda_core snd_pcm snd_timer snd serio_raw xhci_pci radeon drm_suballoc_helper drm_display_helper xhci_hcd ip_tables x_tables
[  149.849432] Process qemu-system-mip (pid: 2265, threadinfo=00000000ae2982d2, task=0000000038e09ad4, tls=000000ffeba16030)
[  149.849439] Stack : 9800000000000003 9800000100ccca00 9800000100ccc000 ffffffffc062cef4
[  149.849453]         9800000102a07d18 c89b63a7ab338e00 0000000000000000 ffffffff811a0000
[  149.849465]         0000000000000000 9800000106cd0000 ffffffff80e59938 98000001106a8920
[  149.849476]         ffffffff80e57f30 ffffffffc062854c ffffffff811a0000 9800000102bf4240
[  149.849488]         ffffffffc05b0000 ffffffff80e3a798 000000ff78000000 000000ff78000010
[  149.849500]         0000000000000255 98000001021f7de0 98000001023f0078 ffffffff81434000
[  149.849511]         0000000000000000 0000000000000000 9800000102ae0000 980000025e92ae28
[  149.849523]         0000000000000000 c89b63a7ab338e00 0000000000000001 ffffffff8119dce0
[  149.849535]         000000ff78000010 ffffffff804f3d3c 9800000102a07eb0 0000000000000255
[  149.849546]         0000000000000000 ffffffff8049460c 000000ff78000010 0000000000000255
[  149.849558]         ...
[  149.849565] Call Trace:
[  149.849567] [&lt;ffffffffc06356ec&gt;] kvm_vz_vcpu_setup+0xc4/0x328 [kvm]
[  149.849586] [&lt;ffffffffc062cef4&gt;] kvm_arch_vcpu_create+0x184/0x228 [kvm]
[  149.849605] [&lt;ffffffffc062854c&gt;] kvm_vm_ioctl+0x64c/0xf28 [kvm]
[  149.849623] [&lt;ffffffff805209c0&gt;] sys_ioctl+0xc8/0x118
[  149.849631] [&lt;ffffffff80219eb0&gt;] syscall_common+0x34/0x58

The root cause is the deletion of kvm_mips_commpage_init() leaves vcpu
-&gt;arch.cop0 NULL. So fix it by making cop0 from a pointer to an embedded
object.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54241/">CVE-2023-54241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54241">CVE-2023-54241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255838">SUSE bug 1255838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54243</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54243" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54243" ref_url="https://www.suse.com/security/cve/CVE-2023-54243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: ebtables: fix table blob use-after-free

We are not allowed to return an error at this point.
Looking at the code it looks like ret is always 0 at this
point, but its not.

t = find_table_lock(net, repl-&gt;name, &amp;ret, &amp;ebt_mutex);

... this can return a valid table, with ret != 0.

This bug causes update of table-&gt;private with the new
blob, but then frees the blob right away in the caller.

Syzbot report:

BUG: KASAN: vmalloc-out-of-bounds in __ebt_unregister_table+0xc00/0xcd0 net/bridge/netfilter/ebtables.c:1168
Read of size 4 at addr ffffc90005425000 by task kworker/u4:4/74
Workqueue: netns cleanup_net
Call Trace:
 kasan_report+0xbf/0x1f0 mm/kasan/report.c:517
 __ebt_unregister_table+0xc00/0xcd0 net/bridge/netfilter/ebtables.c:1168
 ebt_unregister_table+0x35/0x40 net/bridge/netfilter/ebtables.c:1372
 ops_exit_list+0xb0/0x170 net/core/net_namespace.c:169
 cleanup_net+0x4ee/0xb10 net/core/net_namespace.c:613
...

ip(6)tables appears to be ok (ret should be 0 at this point) but make
this more obvious.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54243/">CVE-2023-54243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54243">CVE-2023-54243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255908">SUSE bug 1255908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54247</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54247" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54247" ref_url="https://www.suse.com/security/cve/CVE-2023-54247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Silence a warning in btf_type_id_size()

syzbot reported a warning in [1] with the following stacktrace:
  WARNING: CPU: 0 PID: 5005 at kernel/bpf/btf.c:1988 btf_type_id_size+0x2d9/0x9d0 kernel/bpf/btf.c:1988
  ...
  RIP: 0010:btf_type_id_size+0x2d9/0x9d0 kernel/bpf/btf.c:1988
  ...
  Call Trace:
   &lt;TASK&gt;
   map_check_btf kernel/bpf/syscall.c:1024 [inline]
   map_create+0x1157/0x1860 kernel/bpf/syscall.c:1198
   __sys_bpf+0x127f/0x5420 kernel/bpf/syscall.c:5040
   __do_sys_bpf kernel/bpf/syscall.c:5162 [inline]
   __se_sys_bpf kernel/bpf/syscall.c:5160 [inline]
   __x64_sys_bpf+0x79/0xc0 kernel/bpf/syscall.c:5160
   do_syscall_x64 arch/x86/entry/common.c:50 [inline]
   do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
   entry_SYSCALL_64_after_hwframe+0x63/0xcd

With the following btf
  [1] DECL_TAG 'a' type_id=4 component_idx=-1
  [2] PTR '(anon)' type_id=0
  [3] TYPE_TAG 'a' type_id=2
  [4] VAR 'a' type_id=3, linkage=static
and when the bpf_attr.btf_key_type_id = 1 (DECL_TAG),
the following WARN_ON_ONCE in btf_type_id_size() is triggered:
  if (WARN_ON_ONCE(!btf_type_is_modifier(size_type) &amp;&amp;
                   !btf_type_is_var(size_type)))
          return NULL;

Note that 'return NULL' is the correct behavior as we don't want
a DECL_TAG type to be used as a btf_{key,value}_type_id even
for the case like 'DECL_TAG -&gt; STRUCT'. So there
is no correctness issue here, we just want to silence warning.

To silence the warning, I added DECL_TAG as one of kinds in
btf_type_nosize() which will cause btf_type_id_size() returning
NULL earlier without the warning.

  [1] https://lore.kernel.org/bpf/000000000000e0df8d05fc75ba86@google.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54247/">CVE-2023-54247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54247">CVE-2023-54247 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255892">SUSE bug 1255892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54248</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54248" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54248" ref_url="https://www.suse.com/security/cve/CVE-2023-54248" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Add check for kmemdup

Since the kmemdup may return NULL pointer,
it should be better to add check for the return value
in order to avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54248/">CVE-2023-54248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54248">CVE-2023-54248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255893">SUSE bug 1255893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54249</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54249" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54249" ref_url="https://www.suse.com/security/cve/CVE-2023-54249" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: mhi: ep: Only send -ENOTCONN status if client driver is available

For the STOP and RESET commands, only send the channel disconnect status
-ENOTCONN if client driver is available. Otherwise, it will result in
null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54249/">CVE-2023-54249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54249">CVE-2023-54249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255894">SUSE bug 1255894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54250</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54250" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54250" ref_url="https://www.suse.com/security/cve/CVE-2023-54250" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: avoid out of bounds access in decode_preauth_ctxt()

Confirm that the accessed pneg_ctxt-&gt;HashAlgorithms address sits within
the SMB request boundary; deassemble_neg_contexts() only checks that the
eight byte smb2_neg_context header + (client controlled) DataLength are
within the packet boundary, which is insufficient.

Checking for sizeof(struct smb2_preauth_neg_context) is overkill given
that the type currently assumes SMB311_SALT_SIZE bytes of trailing Salt.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54250/">CVE-2023-54250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54250">CVE-2023-54250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255896">SUSE bug 1255896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54251</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54251" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54251" ref_url="https://www.suse.com/security/cve/CVE-2023-54251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX.

syzkaller found zero division error [0] in div_s64_rem() called from
get_cycle_time_elapsed(), where sched-&gt;cycle_time is the divisor.

We have tests in parse_taprio_schedule() so that cycle_time will never
be 0, and actually cycle_time is not 0 in get_cycle_time_elapsed().

The problem is that the types of divisor are different; cycle_time is
s64, but the argument of div_s64_rem() is s32.

syzkaller fed this input and 0x100000000 is cast to s32 to be 0.

  @TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME={0xc, 0x8, 0x100000000}

We use s64 for cycle_time to cast it to ktime_t, so let's keep it and
set max for cycle_time.

While at it, we prevent overflow in setup_txtime() and add another
test in parse_taprio_schedule() to check if cycle_time overflows.

Also, we add a new tdc test case for this issue.

[0]:
divide error: 0000 [#1] PREEMPT SMP KASAN NOPTI
CPU: 1 PID: 103 Comm: kworker/1:3 Not tainted 6.5.0-rc1-00330-g60cc1f7d0605 #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Workqueue: ipv6_addrconf addrconf_dad_work
RIP: 0010:div_s64_rem include/linux/math64.h:42 [inline]
RIP: 0010:get_cycle_time_elapsed net/sched/sch_taprio.c:223 [inline]
RIP: 0010:find_entry_to_transmit+0x252/0x7e0 net/sched/sch_taprio.c:344
Code: 3c 02 00 0f 85 5e 05 00 00 48 8b 4c 24 08 4d 8b bd 40 01 00 00 48 8b 7c 24 48 48 89 c8 4c 29 f8 48 63 f7 48 99 48 89 74 24 70 &lt;48&gt; f7 fe 48 29 d1 48 8d 04 0f 49 89 cc 48 89 44 24 20 49 8d 85 10
RSP: 0018:ffffc90000acf260 EFLAGS: 00010206
RAX: 177450e0347560cf RBX: 0000000000000000 RCX: 177450e0347560cf
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000100000000
RBP: 0000000000000056 R08: 0000000000000000 R09: ffffed10020a0934
R10: ffff8880105049a7 R11: ffff88806cf3a520 R12: ffff888010504800
R13: ffff88800c00d800 R14: ffff8880105049a0 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0edf84f0e8 CR3: 000000000d73c002 CR4: 0000000000770ee0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 get_packet_txtime net/sched/sch_taprio.c:508 [inline]
 taprio_enqueue_one+0x900/0xff0 net/sched/sch_taprio.c:577
 taprio_enqueue+0x378/0xae0 net/sched/sch_taprio.c:658
 dev_qdisc_enqueue+0x46/0x170 net/core/dev.c:3732
 __dev_xmit_skb net/core/dev.c:3821 [inline]
 __dev_queue_xmit+0x1b2f/0x3000 net/core/dev.c:4169
 dev_queue_xmit include/linux/netdevice.h:3088 [inline]
 neigh_resolve_output net/core/neighbour.c:1552 [inline]
 neigh_resolve_output+0x4a7/0x780 net/core/neighbour.c:1532
 neigh_output include/net/neighbour.h:544 [inline]
 ip6_finish_output2+0x924/0x17d0 net/ipv6/ip6_output.c:135
 __ip6_finish_output+0x620/0xaa0 net/ipv6/ip6_output.c:196
 ip6_finish_output net/ipv6/ip6_output.c:207 [inline]
 NF_HOOK_COND include/linux/netfilter.h:292 [inline]
 ip6_output+0x206/0x410 net/ipv6/ip6_output.c:228
 dst_output include/net/dst.h:458 [inline]
 NF_HOOK.constprop.0+0xea/0x260 include/linux/netfilter.h:303
 ndisc_send_skb+0x872/0xe80 net/ipv6/ndisc.c:508
 ndisc_send_ns+0xb5/0x130 net/ipv6/ndisc.c:666
 addrconf_dad_work+0xc14/0x13f0 net/ipv6/addrconf.c:4175
 process_one_work+0x92c/0x13a0 kernel/workqueue.c:2597
 worker_thread+0x60f/0x1240 kernel/workqueue.c:2748
 kthread+0x2fe/0x3f0 kernel/kthread.c:389
 ret_from_fork+0x2c/0x50 arch/x86/entry/entry_64.S:308
 &lt;/TASK&gt;
Modules linked in:
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54251/">CVE-2023-54251 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54251">CVE-2023-54251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255888">SUSE bug 1255888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54252</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54252" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54252" ref_url="https://www.suse.com/security/cve/CVE-2023-54252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: think-lmi: Fix memory leaks when parsing ThinkStation WMI strings

My previous commit introduced a memory leak where the item allocated
from tlmi_setting was not freed.
This commit also renames it to avoid confusion with the similarly name
variable in the same function.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54252/">CVE-2023-54252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54252">CVE-2023-54252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255889">SUSE bug 1255889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54253</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54253" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54253" ref_url="https://www.suse.com/security/cve/CVE-2023-54253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: set page extent mapped after read_folio in relocate_one_page

One of the CI runs triggered the following panic

  assertion failed: PagePrivate(page) &amp;&amp; page-&gt;private, in fs/btrfs/subpage.c:229
  ------------[ cut here ]------------
  kernel BUG at fs/btrfs/subpage.c:229!
  Internal error: Oops - BUG: 00000000f2000800 [#1] SMP
  CPU: 0 PID: 923660 Comm: btrfs Not tainted 6.5.0-rc3+ #1
  pstate: 61400005 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
  pc : btrfs_subpage_assert+0xbc/0xf0
  lr : btrfs_subpage_assert+0xbc/0xf0
  sp : ffff800093213720
  x29: ffff800093213720 x28: ffff8000932138b4 x27: 000000000c280000
  x26: 00000001b5d00000 x25: 000000000c281000 x24: 000000000c281fff
  x23: 0000000000001000 x22: 0000000000000000 x21: ffffff42b95bf880
  x20: ffff42b9528e0000 x19: 0000000000001000 x18: ffffffffffffffff
  x17: 667274622f736620 x16: 6e69202c65746176 x15: 0000000000000028
  x14: 0000000000000003 x13: 00000000002672d7 x12: 0000000000000000
  x11: ffffcd3f0ccd9204 x10: ffffcd3f0554ae50 x9 : ffffcd3f0379528c
  x8 : ffff800093213428 x7 : 0000000000000000 x6 : ffffcd3f091771e8
  x5 : ffff42b97f333948 x4 : 0000000000000000 x3 : 0000000000000000
  x2 : 0000000000000000 x1 : ffff42b9556cde80 x0 : 000000000000004f
  Call trace:
   btrfs_subpage_assert+0xbc/0xf0
   btrfs_subpage_set_dirty+0x38/0xa0
   btrfs_page_set_dirty+0x58/0x88
   relocate_one_page+0x204/0x5f0
   relocate_file_extent_cluster+0x11c/0x180
   relocate_data_extent+0xd0/0xf8
   relocate_block_group+0x3d0/0x4e8
   btrfs_relocate_block_group+0x2d8/0x490
   btrfs_relocate_chunk+0x54/0x1a8
   btrfs_balance+0x7f4/0x1150
   btrfs_ioctl+0x10f0/0x20b8
   __arm64_sys_ioctl+0x120/0x11d8
   invoke_syscall.constprop.0+0x80/0xd8
   do_el0_svc+0x6c/0x158
   el0_svc+0x50/0x1b0
   el0t_64_sync_handler+0x120/0x130
   el0t_64_sync+0x194/0x198
  Code: 91098021 b0007fa0 91346000 97e9c6d2 (d4210000)

This is the same problem outlined in 17b17fcd6d44 ("btrfs:
set_page_extent_mapped after read_folio in btrfs_cont_expand") , and the
fix is the same.  I originally looked for the same pattern elsewhere in
our code, but mistakenly skipped over this code because I saw the page
cache readahead before we set_page_extent_mapped, not realizing that
this was only in the !page case, that we can still end up with a
!uptodate page and then do the btrfs_read_folio further down.

The fix here is the same as the above mentioned patch, move the
set_page_extent_mapped call to after the btrfs_read_folio() block to
make sure that we have the subpage blocksize stuff setup properly before
using the page.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54253/">CVE-2023-54253 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54253">CVE-2023-54253 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255891">SUSE bug 1255891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54254</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54254" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54254" ref_url="https://www.suse.com/security/cve/CVE-2023-54254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/ttm: Don't leak a resource on eviction error

On eviction errors other than -EMULTIHOP we were leaking a resource.
Fix.

v2:
- Avoid yet another goto (Andi Shyti)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54254/">CVE-2023-54254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54254">CVE-2023-54254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255890">SUSE bug 1255890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54255</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54255" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54255" ref_url="https://www.suse.com/security/cve/CVE-2023-54255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sh: dma: Fix DMA channel offset calculation

Various SoCs of the SH3, SH4 and SH4A family, which use this driver,
feature a differing number of DMA channels, which can be distributed
between up to two DMAC modules. The existing implementation fails to
correctly accommodate for all those variations, resulting in wrong
channel offset calculations and leading to kernel panics.

Rewrite dma_base_addr() in order to properly calculate channel offsets
in a DMAC module. Fix dmaor_read_reg() and dmaor_write_reg(), so that
the correct DMAC module base is selected for the DMAOR register.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54255/">CVE-2023-54255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54255">CVE-2023-54255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255884">SUSE bug 1255884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54257</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54257" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54257" ref_url="https://www.suse.com/security/cve/CVE-2023-54257" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: macb: fix a memory corruption in extended buffer descriptor mode

For quite some time we were chasing a bug which looked like a sudden
permanent failure of networking and mmc on some of our devices.
The bug was very sensitive to any software changes and even more to
any kernel debug options.

Finally we got a setup where the problem was reproducible with
CONFIG_DMA_API_DEBUG=y and it revealed the issue with the rx dma:

[   16.992082] ------------[ cut here ]------------
[   16.996779] DMA-API: macb ff0b0000.ethernet: device driver tries to free DMA memory it has not allocated [device address=0x0000000875e3e244] [size=1536 bytes]
[   17.011049] WARNING: CPU: 0 PID: 85 at kernel/dma/debug.c:1011 check_unmap+0x6a0/0x900
[   17.018977] Modules linked in: xxxxx
[   17.038823] CPU: 0 PID: 85 Comm: irq/55-8000f000 Not tainted 5.4.0 #28
[   17.045345] Hardware name: xxxxx
[   17.049528] pstate: 60000005 (nZCv daif -PAN -UAO)
[   17.054322] pc : check_unmap+0x6a0/0x900
[   17.058243] lr : check_unmap+0x6a0/0x900
[   17.062163] sp : ffffffc010003c40
[   17.065470] x29: ffffffc010003c40 x28: 000000004000c03c
[   17.070783] x27: ffffffc010da7048 x26: ffffff8878e38800
[   17.076095] x25: ffffff8879d22810 x24: ffffffc010003cc8
[   17.081407] x23: 0000000000000000 x22: ffffffc010a08750
[   17.086719] x21: ffffff8878e3c7c0 x20: ffffffc010acb000
[   17.092032] x19: 0000000875e3e244 x18: 0000000000000010
[   17.097343] x17: 0000000000000000 x16: 0000000000000000
[   17.102647] x15: ffffff8879e4a988 x14: 0720072007200720
[   17.107959] x13: 0720072007200720 x12: 0720072007200720
[   17.113261] x11: 0720072007200720 x10: 0720072007200720
[   17.118565] x9 : 0720072007200720 x8 : 000000000000022d
[   17.123869] x7 : 0000000000000015 x6 : 0000000000000098
[   17.129173] x5 : 0000000000000000 x4 : 0000000000000000
[   17.134475] x3 : 00000000ffffffff x2 : ffffffc010a1d370
[   17.139778] x1 : b420c9d75d27bb00 x0 : 0000000000000000
[   17.145082] Call trace:
[   17.147524]  check_unmap+0x6a0/0x900
[   17.151091]  debug_dma_unmap_page+0x88/0x90
[   17.155266]  gem_rx+0x114/0x2f0
[   17.158396]  macb_poll+0x58/0x100
[   17.161705]  net_rx_action+0x118/0x400
[   17.165445]  __do_softirq+0x138/0x36c
[   17.169100]  irq_exit+0x98/0xc0
[   17.172234]  __handle_domain_irq+0x64/0xc0
[   17.176320]  gic_handle_irq+0x5c/0xc0
[   17.179974]  el1_irq+0xb8/0x140
[   17.183109]  xiic_process+0x5c/0xe30
[   17.186677]  irq_thread_fn+0x28/0x90
[   17.190244]  irq_thread+0x208/0x2a0
[   17.193724]  kthread+0x130/0x140
[   17.196945]  ret_from_fork+0x10/0x20
[   17.200510] ---[ end trace 7240980785f81d6f ]---

[  237.021490] ------------[ cut here ]------------
[  237.026129] DMA-API: exceeded 7 overlapping mappings of cacheline 0x0000000021d79e7b
[  237.033886] WARNING: CPU: 0 PID: 0 at kernel/dma/debug.c:499 add_dma_entry+0x214/0x240
[  237.041802] Modules linked in: xxxxx
[  237.061637] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G        W         5.4.0 #28
[  237.068941] Hardware name: xxxxx
[  237.073116] pstate: 80000085 (Nzcv daIf -PAN -UAO)
[  237.077900] pc : add_dma_entry+0x214/0x240
[  237.081986] lr : add_dma_entry+0x214/0x240
[  237.086072] sp : ffffffc010003c30
[  237.089379] x29: ffffffc010003c30 x28: ffffff8878a0be00
[  237.094683] x27: 0000000000000180 x26: ffffff8878e387c0
[  237.099987] x25: 0000000000000002 x24: 0000000000000000
[  237.105290] x23: 000000000000003b x22: ffffffc010a0fa00
[  237.110594] x21: 0000000021d79e7b x20: ffffffc010abe600
[  237.115897] x19: 00000000ffffffef x18: 0000000000000010
[  237.121201] x17: 0000000000000000 x16: 0000000000000000
[  237.126504] x15: ffffffc010a0fdc8 x14: 0720072007200720
[  237.131807] x13: 0720072007200720 x12: 0720072007200720
[  237.137111] x11: 0720072007200720 x10: 0720072007200720
[  237.142415] x9 : 0720072007200720 x8 : 0000000000000259
[  237.147718] x7 : 0000000000000001 x6 : 0000000000000000
[  237.15302
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54257/">CVE-2023-54257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54257">CVE-2023-54257 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255885">SUSE bug 1255885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54258</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54258" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54258" ref_url="https://www.suse.com/security/cve/CVE-2023-54258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix potential oops in cifs_oplock_break

With deferred close we can have closes that race with lease breaks,
and so with the current checks for whether to send the lease response,
oplock_response(), this can mean that an unmount (kill_sb) can occur
just before we were checking if the tcon-&gt;ses is valid.  See below:

[Fri Aug  4 04:12:50 2023] RIP: 0010:cifs_oplock_break+0x1f7/0x5b0 [cifs]
[Fri Aug  4 04:12:50 2023] Code: 7d a8 48 8b 7d c0 c0 e9 02 48 89 45 b8 41 89 cf e8 3e f5 ff ff 4c 89 f7 41 83 e7 01 e8 82 b3 03 f2 49 8b 45 50 48 85 c0 74 5e &lt;48&gt; 83 78 60 00 74 57 45 84 ff 75 52 48 8b 43 98 48 83 eb 68 48 39
[Fri Aug  4 04:12:50 2023] RSP: 0018:ffffb30607ddbdf8 EFLAGS: 00010206
[Fri Aug  4 04:12:50 2023] RAX: 632d223d32612022 RBX: ffff97136944b1e0 RCX: 0000000080100009
[Fri Aug  4 04:12:50 2023] RDX: 0000000000000001 RSI: 0000000080100009 RDI: ffff97136944b188
[Fri Aug  4 04:12:50 2023] RBP: ffffb30607ddbe58 R08: 0000000000000001 R09: ffffffffc08e0900
[Fri Aug  4 04:12:50 2023] R10: 0000000000000001 R11: 000000000000000f R12: ffff97136944b138
[Fri Aug  4 04:12:50 2023] R13: ffff97149147c000 R14: ffff97136944b188 R15: 0000000000000000
[Fri Aug  4 04:12:50 2023] FS:  0000000000000000(0000) GS:ffff9714f7c00000(0000) knlGS:0000000000000000
[Fri Aug  4 04:12:50 2023] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[Fri Aug  4 04:12:50 2023] CR2: 00007fd8de9c7590 CR3: 000000011228e000 CR4: 0000000000350ef0
[Fri Aug  4 04:12:50 2023] Call Trace:
[Fri Aug  4 04:12:50 2023]  &lt;TASK&gt;
[Fri Aug  4 04:12:50 2023]  process_one_work+0x225/0x3d0
[Fri Aug  4 04:12:50 2023]  worker_thread+0x4d/0x3e0
[Fri Aug  4 04:12:50 2023]  ? process_one_work+0x3d0/0x3d0
[Fri Aug  4 04:12:50 2023]  kthread+0x12a/0x150
[Fri Aug  4 04:12:50 2023]  ? set_kthread_struct+0x50/0x50
[Fri Aug  4 04:12:50 2023]  ret_from_fork+0x22/0x30
[Fri Aug  4 04:12:50 2023]  &lt;/TASK&gt;

To fix this change the ordering of the checks before sending the oplock_response
to first check if the openFileList is empty.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54258/">CVE-2023-54258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54258">CVE-2023-54258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255886">SUSE bug 1255886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54259</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54259" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54259" ref_url="https://www.suse.com/security/cve/CVE-2023-54259" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soundwire: bus: Fix unbalanced pm_runtime_put() causing usage count underflow

This reverts commit
443a98e649b4 ("soundwire: bus: use pm_runtime_resume_and_get()")

Change calls to pm_runtime_resume_and_get() back to pm_runtime_get_sync().
This fixes a usage count underrun caused by doing a pm_runtime_put() even
though pm_runtime_resume_and_get() returned an error.

The three affected functions ignore -EACCES error from trying to get
pm_runtime, and carry on, including a put at the end of the function.
But pm_runtime_resume_and_get() does not increment the usage count if it
returns an error. So in the -EACCES case you must not call
pm_runtime_put().

The documentation for pm_runtime_get_sync() says:
 "Consider using pm_runtime_resume_and_get() ...  as this is likely to
 result in cleaner code."

In this case I don't think it results in cleaner code because the
pm_runtime_put() at the end of the function would have to be conditional on
the return value from pm_runtime_resume_and_get() at the top of the
function.

pm_runtime_get_sync() doesn't have this problem because it always
increments the count, so always needs a put. The code can just flow through
and do the pm_runtime_put() unconditionally.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54259/">CVE-2023-54259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54259">CVE-2023-54259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255887">SUSE bug 1255887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54260</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54260" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54260" ref_url="https://www.suse.com/security/cve/CVE-2023-54260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix lost destroy smbd connection when MR allocate failed

If the MR allocate failed, the smb direct connection info is NULL,
then smbd_destroy() will directly return, then the connection info
will be leaked.

Let's set the smb direct connection info to the server before call
smbd_destroy().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54260/">CVE-2023-54260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54260">CVE-2023-54260 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255878">SUSE bug 1255878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54261</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54261" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54261" ref_url="https://www.suse.com/security/cve/CVE-2023-54261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Add missing gfx11 MQD manager callbacks

mqd_stride function was introduced in commit 2f77b9a242a2
("drm/amdkfd: Update MQD management on multi XCC setup")
but not assigned for gfx11. Fixes a NULL dereference in debugfs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54261/">CVE-2023-54261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54261">CVE-2023-54261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255879">SUSE bug 1255879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54262</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54262" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54262" ref_url="https://www.suse.com/security/cve/CVE-2023-54262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Don't clone flow post action attributes second time

The code already clones post action attributes in
mlx5e_clone_flow_attr_for_post_act(). Creating another copy in
mlx5e_tc_post_act_add() is a erroneous leftover from original
implementation. Instead, assign handle-&gt;attribute to post_attr provided by
the caller. Note that cloning the attribute second time is not just
wasteful but also causes issues like second copy not being properly updated
in neigh update code which leads to following use-after-free:

Feb 21 09:02:00 c-237-177-40-045 kernel: BUG: KASAN: use-after-free in mlx5_cmd_set_fte+0x200d/0x24c0 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_report+0xbb/0x1a0
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_save_stack+0x1e/0x40
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_set_track+0x21/0x30
Feb 21 09:02:00 c-237-177-40-045 kernel:  __kasan_kmalloc+0x7a/0x90
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_save_stack+0x1e/0x40
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_set_track+0x21/0x30
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_save_free_info+0x2a/0x40
Feb 21 09:02:00 c-237-177-40-045 kernel:  ____kasan_slab_free+0x11a/0x1b0
Feb 21 09:02:00 c-237-177-40-045 kernel: page dumped because: kasan: bad access detected
Feb 21 09:02:00 c-237-177-40-045 kernel: mlx5_core 0000:08:00.0: mlx5_cmd_out_err:803:(pid 8833): SET_FLOW_TABLE_ENTRY(0x936) op_mod(0x0) failed, status bad resource state(0x9), syndrome (0xf2ff71), err(-22)
Feb 21 09:02:00 c-237-177-40-045 kernel: mlx5_core 0000:08:00.0 enp8s0f0: Failed to add post action rule
Feb 21 09:02:00 c-237-177-40-045 kernel: mlx5_core 0000:08:00.0: mlx5e_tc_encap_flows_add:190:(pid 8833): Failed to update flow post acts, -22
Feb 21 09:02:00 c-237-177-40-045 kernel: Call Trace:
Feb 21 09:02:00 c-237-177-40-045 kernel:  &lt;TASK&gt;
Feb 21 09:02:00 c-237-177-40-045 kernel:  dump_stack_lvl+0x57/0x7d
Feb 21 09:02:00 c-237-177-40-045 kernel:  print_report+0x170/0x471
Feb 21 09:02:00 c-237-177-40-045 kernel:  ? mlx5_cmd_set_fte+0x200d/0x24c0 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_report+0xbb/0x1a0
Feb 21 09:02:00 c-237-177-40-045 kernel:  ? mlx5_cmd_set_fte+0x200d/0x24c0 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  mlx5_cmd_set_fte+0x200d/0x24c0 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  ? __module_address.part.0+0x62/0x200
Feb 21 09:02:00 c-237-177-40-045 kernel:  ? mlx5_cmd_stub_create_flow_table+0xd0/0xd0 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  ? __raw_spin_lock_init+0x3b/0x110
Feb 21 09:02:00 c-237-177-40-045 kernel:  mlx5_cmd_create_fte+0x80/0xb0 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  add_rule_fg+0xe80/0x19c0 [mlx5_core]
--
Feb 21 09:02:00 c-237-177-40-045 kernel: Allocated by task 13476:
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_save_stack+0x1e/0x40
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_set_track+0x21/0x30
Feb 21 09:02:00 c-237-177-40-045 kernel:  __kasan_kmalloc+0x7a/0x90
Feb 21 09:02:00 c-237-177-40-045 kernel:  mlx5_packet_reformat_alloc+0x7b/0x230 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  mlx5e_tc_tun_create_header_ipv4+0x977/0xf10 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  mlx5e_attach_encap+0x15b4/0x1e10 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  post_process_attr+0x305/0xa30 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  mlx5e_tc_add_fdb_flow+0x4c0/0xcf0 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  __mlx5e_add_fdb_flow+0x7cf/0xe90 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  mlx5e_configure_flower+0xcaa/0x4b90 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  mlx5e_rep_setup_tc_cls_flower+0x99/0x1b0 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  mlx5e_rep_setup_tc_cb+0x133/0x1e0 [mlx5_core]
--
Feb 21 09:02:00 c-237-177-40-045 kernel: Freed by task 8833:
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_save_s
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54262/">CVE-2023-54262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54262">CVE-2023-54262 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255881">SUSE bug 1255881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255882">SUSE bug 1255882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54263</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54263" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54263" ref_url="https://www.suse.com/security/cve/CVE-2023-54263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau/kms/nv50-: init hpd_irq_lock for PIOR DP

Fixes OOPS on boards with ANX9805 DP encoders.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54263/">CVE-2023-54263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54263">CVE-2023-54263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255883">SUSE bug 1255883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54264</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54264" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54264" ref_url="https://www.suse.com/security/cve/CVE-2023-54264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/sysv: Null check to prevent null-ptr-deref bug

sb_getblk(inode-&gt;i_sb, parent) return a null ptr and taking lock on
that leads to the null-ptr-deref bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54264/">CVE-2023-54264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54264">CVE-2023-54264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255872">SUSE bug 1255872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54265</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54265" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54265" ref_url="https://www.suse.com/security/cve/CVE-2023-54265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: Fix an uninit variable access bug in __ip6_make_skb()

Syzbot reported a bug as following:

=====================================================
BUG: KMSAN: uninit-value in arch_atomic64_inc arch/x86/include/asm/atomic64_64.h:88 [inline]
BUG: KMSAN: uninit-value in arch_atomic_long_inc include/linux/atomic/atomic-long.h:161 [inline]
BUG: KMSAN: uninit-value in atomic_long_inc include/linux/atomic/atomic-instrumented.h:1429 [inline]
BUG: KMSAN: uninit-value in __ip6_make_skb+0x2f37/0x30f0 net/ipv6/ip6_output.c:1956
 arch_atomic64_inc arch/x86/include/asm/atomic64_64.h:88 [inline]
 arch_atomic_long_inc include/linux/atomic/atomic-long.h:161 [inline]
 atomic_long_inc include/linux/atomic/atomic-instrumented.h:1429 [inline]
 __ip6_make_skb+0x2f37/0x30f0 net/ipv6/ip6_output.c:1956
 ip6_finish_skb include/net/ipv6.h:1122 [inline]
 ip6_push_pending_frames+0x10e/0x550 net/ipv6/ip6_output.c:1987
 rawv6_push_pending_frames+0xb12/0xb90 net/ipv6/raw.c:579
 rawv6_sendmsg+0x297e/0x2e60 net/ipv6/raw.c:922
 inet_sendmsg+0x101/0x180 net/ipv4/af_inet.c:827
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg net/socket.c:734 [inline]
 ____sys_sendmsg+0xa8e/0xe70 net/socket.c:2476
 ___sys_sendmsg+0x2a1/0x3f0 net/socket.c:2530
 __sys_sendmsg net/socket.c:2559 [inline]
 __do_sys_sendmsg net/socket.c:2568 [inline]
 __se_sys_sendmsg net/socket.c:2566 [inline]
 __x64_sys_sendmsg+0x367/0x540 net/socket.c:2566
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Uninit was created at:
 slab_post_alloc_hook mm/slab.h:766 [inline]
 slab_alloc_node mm/slub.c:3452 [inline]
 __kmem_cache_alloc_node+0x71f/0xce0 mm/slub.c:3491
 __do_kmalloc_node mm/slab_common.c:967 [inline]
 __kmalloc_node_track_caller+0x114/0x3b0 mm/slab_common.c:988
 kmalloc_reserve net/core/skbuff.c:492 [inline]
 __alloc_skb+0x3af/0x8f0 net/core/skbuff.c:565
 alloc_skb include/linux/skbuff.h:1270 [inline]
 __ip6_append_data+0x51c1/0x6bb0 net/ipv6/ip6_output.c:1684
 ip6_append_data+0x411/0x580 net/ipv6/ip6_output.c:1854
 rawv6_sendmsg+0x2882/0x2e60 net/ipv6/raw.c:915
 inet_sendmsg+0x101/0x180 net/ipv4/af_inet.c:827
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg net/socket.c:734 [inline]
 ____sys_sendmsg+0xa8e/0xe70 net/socket.c:2476
 ___sys_sendmsg+0x2a1/0x3f0 net/socket.c:2530
 __sys_sendmsg net/socket.c:2559 [inline]
 __do_sys_sendmsg net/socket.c:2568 [inline]
 __se_sys_sendmsg net/socket.c:2566 [inline]
 __x64_sys_sendmsg+0x367/0x540 net/socket.c:2566
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

It is because icmp6hdr does not in skb linear region under the scenario
of SOCK_RAW socket. Access icmp6_hdr(skb)-&gt;icmp6_type directly will
trigger the uninit variable access bug.

Use a local variable icmp6_type to carry the correct value in different
scenarios.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54265/">CVE-2023-54265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54265">CVE-2023-54265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255874">SUSE bug 1255874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54266</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54266" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54266" ref_url="https://www.suse.com/security/cve/CVE-2023-54266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer()

'read' is freed when it is known to be NULL, but not when a read error
occurs.

Revert the logic to avoid a small leak, should a m920x_read() call fail.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54266/">CVE-2023-54266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54266">CVE-2023-54266 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255875">SUSE bug 1255875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54267</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54267" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54267" ref_url="https://www.suse.com/security/cve/CVE-2023-54267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT

lppaca_shared_proc() takes a pointer to the lppaca which is typically
accessed through get_lppaca().  With DEBUG_PREEMPT enabled, this leads
to checking if preemption is enabled, for example:

  BUG: using smp_processor_id() in preemptible [00000000] code: grep/10693
  caller is lparcfg_data+0x408/0x19a0
  CPU: 4 PID: 10693 Comm: grep Not tainted 6.5.0-rc3 #2
  Call Trace:
    dump_stack_lvl+0x154/0x200 (unreliable)
    check_preemption_disabled+0x214/0x220
    lparcfg_data+0x408/0x19a0
    ...

This isn't actually a problem however, as it does not matter which
lppaca is accessed, the shared proc state will be the same.
vcpudispatch_stats_procfs_init() already works around this by disabling
preemption, but the lparcfg code does not, erroring any time
/proc/powerpc/lparcfg is accessed with DEBUG_PREEMPT enabled.

Instead of disabling preemption on the caller side, rework
lppaca_shared_proc() to not take a pointer and instead directly access
the lppaca, bypassing any potential preemption checks.

[mpe: Rework to avoid needing a definition in paca.h and lppaca.h]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54267/">CVE-2023-54267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54267">CVE-2023-54267 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255899">SUSE bug 1255899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54268</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54268" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54268" ref_url="https://www.suse.com/security/cve/CVE-2023-54268" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

debugobjects: Don't wake up kswapd from fill_pool()

syzbot is reporting a lockdep warning in fill_pool() because the allocation
from debugobjects is using GFP_ATOMIC, which is (__GFP_HIGH | __GFP_KSWAPD_RECLAIM)
and therefore tries to wake up kswapd, which acquires kswapd_wait::lock.

Since fill_pool() might be called with arbitrary locks held, fill_pool()
should not assume that acquiring kswapd_wait::lock is safe.

Use __GFP_HIGH instead and remove __GFP_NORETRY as it is pointless for
!__GFP_DIRECT_RECLAIM allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54268/">CVE-2023-54268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54268">CVE-2023-54268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255900">SUSE bug 1255900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54269</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54269" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54269" ref_url="https://www.suse.com/security/cve/CVE-2023-54269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: double free xprt_ctxt while still in use

When an RPC request is deferred, the rq_xprt_ctxt pointer is moved out
of the svc_rqst into the svc_deferred_req.
When the deferred request is revisited, the pointer is copied into
the new svc_rqst - and also remains in the svc_deferred_req.

In the (rare?) case that the request is deferred a second time, the old
svc_deferred_req is reused - it still has all the correct content.
However in that case the rq_xprt_ctxt pointer is NOT cleared so that
when xpo_release_xprt is called, the ctxt is freed (UDP) or possible
added to a free list (RDMA).
When the deferred request is revisited for a second time, it will
reference this ctxt which may be invalid, and the free the object a
second time which is likely to oops.

So change svc_defer() to *always* clear rq_xprt_ctxt, and assert that
the value is now stored in the svc_deferred_req.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54269/">CVE-2023-54269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54269">CVE-2023-54269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255876">SUSE bug 1255876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54270</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54270" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54270" ref_url="https://www.suse.com/security/cve/CVE-2023-54270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: usb: siano: Fix use after free bugs caused by do_submit_urb

There are UAF bugs caused by do_submit_urb(). One of the KASan reports
is shown below:

[   36.403605] BUG: KASAN: use-after-free in worker_thread+0x4a2/0x890
[   36.406105] Read of size 8 at addr ffff8880059600e8 by task kworker/0:2/49
[   36.408316]
[   36.408867] CPU: 0 PID: 49 Comm: kworker/0:2 Not tainted 6.2.0-rc3-15798-g5a41237ad1d4-dir8
[   36.411696] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g15584
[   36.416157] Workqueue:  0x0 (events)
[   36.417654] Call Trace:
[   36.418546]  &lt;TASK&gt;
[   36.419320]  dump_stack_lvl+0x96/0xd0
[   36.420522]  print_address_description+0x75/0x350
[   36.421992]  print_report+0x11b/0x250
[   36.423174]  ? _raw_spin_lock_irqsave+0x87/0xd0
[   36.424806]  ? __virt_addr_valid+0xcf/0x170
[   36.426069]  ? worker_thread+0x4a2/0x890
[   36.427355]  kasan_report+0x131/0x160
[   36.428556]  ? worker_thread+0x4a2/0x890
[   36.430053]  worker_thread+0x4a2/0x890
[   36.431297]  ? worker_clr_flags+0x90/0x90
[   36.432479]  kthread+0x166/0x190
[   36.433493]  ? kthread_blkcg+0x50/0x50
[   36.434669]  ret_from_fork+0x22/0x30
[   36.435923]  &lt;/TASK&gt;
[   36.436684]
[   36.437215] Allocated by task 24:
[   36.438289]  kasan_set_track+0x50/0x80
[   36.439436]  __kasan_kmalloc+0x89/0xa0
[   36.440566]  smsusb_probe+0x374/0xc90
[   36.441920]  usb_probe_interface+0x2d1/0x4c0
[   36.443253]  really_probe+0x1d5/0x580
[   36.444539]  __driver_probe_device+0xe3/0x130
[   36.446085]  driver_probe_device+0x49/0x220
[   36.447423]  __device_attach_driver+0x19e/0x1b0
[   36.448931]  bus_for_each_drv+0xcb/0x110
[   36.450217]  __device_attach+0x132/0x1f0
[   36.451470]  bus_probe_device+0x59/0xf0
[   36.452563]  device_add+0x4ec/0x7b0
[   36.453830]  usb_set_configuration+0xc63/0xe10
[   36.455230]  usb_generic_driver_probe+0x3b/0x80
[   36.456166] printk: console [ttyGS0] disabled
[   36.456569]  usb_probe_device+0x90/0x110
[   36.459523]  really_probe+0x1d5/0x580
[   36.461027]  __driver_probe_device+0xe3/0x130
[   36.462465]  driver_probe_device+0x49/0x220
[   36.463847]  __device_attach_driver+0x19e/0x1b0
[   36.465229]  bus_for_each_drv+0xcb/0x110
[   36.466466]  __device_attach+0x132/0x1f0
[   36.467799]  bus_probe_device+0x59/0xf0
[   36.469010]  device_add+0x4ec/0x7b0
[   36.470125]  usb_new_device+0x863/0xa00
[   36.471374]  hub_event+0x18c7/0x2220
[   36.472746]  process_one_work+0x34c/0x5b0
[   36.474041]  worker_thread+0x4b7/0x890
[   36.475216]  kthread+0x166/0x190
[   36.476267]  ret_from_fork+0x22/0x30
[   36.477447]
[   36.478160] Freed by task 24:
[   36.479239]  kasan_set_track+0x50/0x80
[   36.480512]  kasan_save_free_info+0x2b/0x40
[   36.481808]  ____kasan_slab_free+0x122/0x1a0
[   36.483173]  __kmem_cache_free+0xc4/0x200
[   36.484563]  smsusb_term_device+0xcd/0xf0
[   36.485896]  smsusb_probe+0xc85/0xc90
[   36.486976]  usb_probe_interface+0x2d1/0x4c0
[   36.488303]  really_probe+0x1d5/0x580
[   36.489498]  __driver_probe_device+0xe3/0x130
[   36.491140]  driver_probe_device+0x49/0x220
[   36.492475]  __device_attach_driver+0x19e/0x1b0
[   36.493988]  bus_for_each_drv+0xcb/0x110
[   36.495171]  __device_attach+0x132/0x1f0
[   36.496617]  bus_probe_device+0x59/0xf0
[   36.497875]  device_add+0x4ec/0x7b0
[   36.498972]  usb_set_configuration+0xc63/0xe10
[   36.500264]  usb_generic_driver_probe+0x3b/0x80
[   36.501740]  usb_probe_device+0x90/0x110
[   36.503084]  really_probe+0x1d5/0x580
[   36.504241]  __driver_probe_device+0xe3/0x130
[   36.505548]  driver_probe_device+0x49/0x220
[   36.506766]  __device_attach_driver+0x19e/0x1b0
[   36.508368]  bus_for_each_drv+0xcb/0x110
[   36.509646]  __device_attach+0x132/0x1f0
[   36.510911]  bus_probe_device+0x59/0xf0
[   36.512103]  device_add+0x4ec/0x7b0
[   36.513215]  usb_new_device+0x863/0xa00
[   36.514736]  hub_event+0x18c7/0x2220
[   36.516130]  process_one_work+
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54270/">CVE-2023-54270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54270">CVE-2023-54270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255901">SUSE bug 1255901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54271</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54271" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54271" ref_url="https://www.suse.com/security/cve/CVE-2023-54271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init

blk-iocost sometimes causes the following crash:

  BUG: kernel NULL pointer dereference, address: 00000000000000e0
  ...
  RIP: 0010:_raw_spin_lock+0x17/0x30
  Code: be 01 02 00 00 e8 79 38 39 ff 31 d2 89 d0 5d c3 0f 1f 00 0f 1f 44 00 00 55 48 89 e5 65 ff 05 48 d0 34 7e b9 01 00 00 00 31 c0 &lt;f0&gt; 0f b1 0f 75 02 5d c3 89 c6 e8 ea 04 00 00 5d c3 0f 1f 84 00 00
  RSP: 0018:ffffc900023b3d40 EFLAGS: 00010046
  RAX: 0000000000000000 RBX: 00000000000000e0 RCX: 0000000000000001
  RDX: ffffc900023b3d20 RSI: ffffc900023b3cf0 RDI: 00000000000000e0
  RBP: ffffc900023b3d40 R08: ffffc900023b3c10 R09: 0000000000000003
  R10: 0000000000000064 R11: 000000000000000a R12: ffff888102337000
  R13: fffffffffffffff2 R14: ffff88810af408c8 R15: ffff8881070c3600
  FS:  00007faaaf364fc0(0000) GS:ffff88842fdc0000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00000000000000e0 CR3: 00000001097b1000 CR4: 0000000000350ea0
  Call Trace:
   &lt;TASK&gt;
   ioc_weight_write+0x13d/0x410
   cgroup_file_write+0x7a/0x130
   kernfs_fop_write_iter+0xf5/0x170
   vfs_write+0x298/0x370
   ksys_write+0x5f/0xb0
   __x64_sys_write+0x1b/0x20
   do_syscall_64+0x3d/0x80
   entry_SYSCALL_64_after_hwframe+0x46/0xb0

This happens because iocg-&gt;ioc is NULL. The field is initialized by
ioc_pd_init() and never cleared. The NULL deref is caused by
blkcg_activate_policy() installing blkg_policy_data before initializing it.

blkcg_activate_policy() was doing the following:

1. Allocate pd's for all existing blkg's and install them in blkg-&gt;pd[].
2. Initialize all pd's.
3. Online all pd's.

blkcg_activate_policy() only grabs the queue_lock and may release and
re-acquire the lock as allocation may need to sleep. ioc_weight_write()
grabs blkcg-&gt;lock and iterates all its blkg's. The two can race and if
ioc_weight_write() runs during #1 or between #1 and #2, it can encounter a
pd which is not initialized yet, leading to crash.

The crash can be reproduced with the following script:

  #!/bin/bash

  echo +io &gt; /sys/fs/cgroup/cgroup.subtree_control
  systemd-run --unit touch-sda --scope dd if=/dev/sda of=/dev/null bs=1M count=1 iflag=direct
  echo 100 &gt; /sys/fs/cgroup/system.slice/io.weight
  bash -c "echo '8:0 enable=1' &gt; /sys/fs/cgroup/io.cost.qos" &amp;
  sleep .2
  echo 100 &gt; /sys/fs/cgroup/system.slice/io.weight

with the following patch applied:

&gt; diff --git a/block/blk-cgroup.c b/block/blk-cgroup.c
&gt; index fc49be622e05..38d671d5e10c 100644
&gt; --- a/block/blk-cgroup.c
&gt; +++ b/block/blk-cgroup.c
&gt; @@ -1553,6 +1553,12 @@ int blkcg_activate_policy(struct gendisk *disk, const struct blkcg_policy *pol)
&gt; 		pd-&gt;online = false;
&gt; 	}
&gt;
&gt; +       if (system_state == SYSTEM_RUNNING) {
&gt; +               spin_unlock_irq(&amp;q-&gt;queue_lock);
&gt; +               ssleep(1);
&gt; +               spin_lock_irq(&amp;q-&gt;queue_lock);
&gt; +       }
&gt; +
&gt; 	/* all allocated, init in the same order */
&gt; 	if (pol-&gt;pd_init_fn)
&gt; 		list_for_each_entry_reverse(blkg, &amp;q-&gt;blkg_list, q_node)

I don't see a reason why all pd's should be allocated, initialized and
onlined together. The only ordering requirement is that parent blkgs to be
initialized and onlined before children, which is guaranteed from the
walking order. Let's fix the bug by allocating, initializing and onlining pd
for each blkg and holding blkcg-&gt;lock over initialization and onlining. This
ensures that an installed blkg is always fully initialized and onlined
removing the the race window.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54271/">CVE-2023-54271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54271">CVE-2023-54271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255902">SUSE bug 1255902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54272</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54272" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54272" ref_url="https://www.suse.com/security/cve/CVE-2023-54272" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fix a possible null-pointer dereference in ni_clear()

In a previous commit c1006bd13146, ni-&gt;mi.mrec in ni_write_inode()
could be NULL, and thus a NULL check is added for this variable.

However, in the same call stack, ni-&gt;mi.mrec can be also dereferenced
in ni_clear():

ntfs_evict_inode(inode)
  ni_write_inode(inode, ...)
    ni = ntfs_i(inode);
    is_rec_inuse(ni-&gt;mi.mrec) -&gt; Add a NULL check by previous commit
  ni_clear(ntfs_i(inode))
    is_rec_inuse(ni-&gt;mi.mrec) -&gt; No check

Thus, a possible null-pointer dereference may exist in ni_clear().
To fix it, a NULL check is added in this function.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54272/">CVE-2023-54272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54272">CVE-2023-54272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255817">SUSE bug 1255817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54273</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54273" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54273" ref_url="https://www.suse.com/security/cve/CVE-2023-54273" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: Fix leak of dev tracker

At the stage of direction checks, the netdev reference tracker is
already initialized, but released with wrong *_put() call.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54273/">CVE-2023-54273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54273">CVE-2023-54273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255904">SUSE bug 1255904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54274</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54274" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54274" ref_url="https://www.suse.com/security/cve/CVE-2023-54274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/srpt: Add a check for valid 'mad_agent' pointer

When unregistering MAD agent, srpt module has a non-null check
for 'mad_agent' pointer before invoking ib_unregister_mad_agent().
This check can pass if 'mad_agent' variable holds an error value.
The 'mad_agent' can have an error value for a short window when
srpt_add_one() and srpt_remove_one() is executed simultaneously.

In srpt module, added a valid pointer check for 'sport-&gt;mad_agent'
before unregistering MAD agent.

This issue can hit when RoCE driver unregisters ib_device

Stack Trace:
------------
BUG: kernel NULL pointer dereference, address: 000000000000004d
PGD 145003067 P4D 145003067 PUD 2324fe067 PMD 0
Oops: 0002 [#1] PREEMPT SMP NOPTI
CPU: 10 PID: 4459 Comm: kworker/u80:0 Kdump: loaded Tainted: P
Hardware name: Dell Inc. PowerEdge R640/06NR82, BIOS 2.5.4 01/13/2020
Workqueue: bnxt_re bnxt_re_task [bnxt_re]
RIP: 0010:_raw_spin_lock_irqsave+0x19/0x40
Call Trace:
  ib_unregister_mad_agent+0x46/0x2f0 [ib_core]
  IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
  ? __schedule+0x20b/0x560
  srpt_unregister_mad_agent+0x93/0xd0 [ib_srpt]
  srpt_remove_one+0x20/0x150 [ib_srpt]
  remove_client_context+0x88/0xd0 [ib_core]
  bond0: (slave p2p1): link status definitely up, 100000 Mbps full duplex
  disable_device+0x8a/0x160 [ib_core]
  bond0: active interface up!
  ? kernfs_name_hash+0x12/0x80
 (NULL device *): Bonding Info Received: rdev: 000000006c0b8247
  __ib_unregister_device+0x42/0xb0 [ib_core]
 (NULL device *):         Master: mode: 4 num_slaves:2
  ib_unregister_device+0x22/0x30 [ib_core]
 (NULL device *):         Slave: id: 105069936 name:p2p1 link:0 state:0
  bnxt_re_stopqps_and_ib_uninit+0x83/0x90 [bnxt_re]
  bnxt_re_alloc_lag+0x12e/0x4e0 [bnxt_re]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54274/">CVE-2023-54274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54274">CVE-2023-54274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255905">SUSE bug 1255905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54275</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54275" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54275" ref_url="https://www.suse.com/security/cve/CVE-2023-54275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup

crypto_alloc_shash() allocates resources, which should be released by
crypto_free_shash(). When ath11k_peer_find() fails, there has memory
leak. Add missing crypto_free_shash() to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54275/">CVE-2023-54275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54275">CVE-2023-54275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255906">SUSE bug 1255906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54276</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54276" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54276" ref_url="https://www.suse.com/security/cve/CVE-2023-54276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: move init of percpu reply_cache_stats counters back to nfsd_init_net

Commit f5f9d4a314da ("nfsd: move reply cache initialization into nfsd
startup") moved the initialization of the reply cache into nfsd startup,
but didn't account for the stats counters, which can be accessed before
nfsd is ever started. The result can be a NULL pointer dereference when
someone accesses /proc/fs/nfsd/reply_cache_stats while nfsd is still
shut down.

This is a regression and a user-triggerable oops in the right situation:

- non-x86_64 arch
- /proc/fs/nfsd is mounted in the namespace
- nfsd is not started in the namespace
- unprivileged user calls "cat /proc/fs/nfsd/reply_cache_stats"

Although this is easy to trigger on some arches (like aarch64), on
x86_64, calling this_cpu_ptr(NULL) evidently returns a pointer to the
fixed_percpu_data. That struct looks just enough like a newly
initialized percpu var to allow nfsd_reply_cache_stats_show to access
it without Oopsing.

Move the initialization of the per-net+per-cpu reply-cache counters
back into nfsd_init_net, while leaving the rest of the reply cache
allocations to be done at nfsd startup time.

Kudos to Eirik who did most of the legwork to track this down.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-11"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54276/">CVE-2023-54276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54276">CVE-2023-54276 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255907">SUSE bug 1255907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54277</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54277" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54277" ref_url="https://www.suse.com/security/cve/CVE-2023-54277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: udlfb: Fix endpoint check

The syzbot fuzzer detected a problem in the udlfb driver, caused by an
endpoint not having the expected type:

usb 1-1: Read EDID byte 0 failed: -71
usb 1-1: Unable to get valid EDID from device/display
------------[ cut here ]------------
usb 1-1: BOGUS urb xfer, pipe 3 != type 1
WARNING: CPU: 0 PID: 9 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880
drivers/usb/core/urb.c:504
Modules linked in:
CPU: 0 PID: 9 Comm: kworker/0:1 Not tainted
6.4.0-rc1-syzkaller-00016-ga4422ff22142 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google
04/28/2023
Workqueue: usb_hub_wq hub_event
RIP: 0010:usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504
...
Call Trace:
 &lt;TASK&gt;
 dlfb_submit_urb+0x92/0x180 drivers/video/fbdev/udlfb.c:1980
 dlfb_set_video_mode+0x21f0/0x2950 drivers/video/fbdev/udlfb.c:315
 dlfb_ops_set_par+0x2a7/0x8d0 drivers/video/fbdev/udlfb.c:1111
 dlfb_usb_probe+0x149a/0x2710 drivers/video/fbdev/udlfb.c:1743

The current approach for this issue failed to catch the problem
because it only checks for the existence of a bulk-OUT endpoint; it
doesn't check whether this endpoint is the one that the driver will
actually use.

We can fix the problem by instead checking that the endpoint used by
the driver does exist and is bulk-OUT.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54277/">CVE-2023-54277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54277">CVE-2023-54277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255910">SUSE bug 1255910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54278</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54278" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54278" ref_url="https://www.suse.com/security/cve/CVE-2023-54278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/vmem: split pages when debug pagealloc is enabled

Since commit bb1520d581a3 ("s390/mm: start kernel with DAT enabled")
the kernel crashes early during boot when debug pagealloc is enabled:

mem auto-init: stack:off, heap alloc:off, heap free:off
addressing exception: 0005 ilc:2 [#1] SMP DEBUG_PAGEALLOC
Modules linked in:
CPU: 0 PID: 0 Comm: swapper Not tainted 6.5.0-rc3-09759-gc5666c912155 #630
[..]
Krnl Code: 00000000001325f6: ec5600248064 cgrj %r5,%r6,8,000000000013263e
           00000000001325fc: eb880002000c srlg %r8,%r8,2
          #0000000000132602: b2210051     ipte %r5,%r1,%r0,0
          &gt;0000000000132606: b90400d1     lgr %r13,%r1
           000000000013260a: 41605008     la %r6,8(%r5)
           000000000013260e: a7db1000     aghi %r13,4096
           0000000000132612: b221006d     ipte %r6,%r13,%r0,0
           0000000000132616: e3d0d0000171 lay %r13,4096(%r13)

Call Trace:
 __kernel_map_pages+0x14e/0x320
 __free_pages_ok+0x23a/0x5a8)
 free_low_memory_core_early+0x214/0x2c8
 memblock_free_all+0x28/0x58
 mem_init+0xb6/0x228
 mm_core_init+0xb6/0x3b0
 start_kernel+0x1d2/0x5a8
 startup_continue+0x36/0x40
Kernel panic - not syncing: Fatal exception: panic_on_oops

This is caused by using large mappings on machines with EDAT1/EDAT2. Add
the code to split the mappings into 4k pages if debug pagealloc is enabled
by CONFIG_DEBUG_PAGEALLOC_ENABLE_DEFAULT or the debug_pagealloc kernel
command line option.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54278/">CVE-2023-54278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54278">CVE-2023-54278 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255911">SUSE bug 1255911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54279</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54279" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54279" ref_url="https://www.suse.com/security/cve/CVE-2023-54279" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

MIPS: fw: Allow firmware to pass a empty env

fw_getenv will use env entry to determine style of env,
however it is legal for firmware to just pass a empty list.

Check if first entry exist before running strchr to avoid
null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54279/">CVE-2023-54279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54279">CVE-2023-54279 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255818">SUSE bug 1255818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54280</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54280" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54280" ref_url="https://www.suse.com/security/cve/CVE-2023-54280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix potential race when tree connecting ipc

Protect access of TCP_Server_Info::hostname when building the ipc tree
name as it might get freed in cifsd thread and thus causing an
use-after-free bug in __tree_connect_dfs_target().  Also, while at it,
update status of IPC tcon on success and then avoid any extra tree
connects.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54280/">CVE-2023-54280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54280">CVE-2023-54280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255819">SUSE bug 1255819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54281</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54281" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54281" ref_url="https://www.suse.com/security/cve/CVE-2023-54281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: release path before inode lookup during the ino lookup ioctl

During the ino lookup ioctl we can end up calling btrfs_iget() to get an
inode reference while we are holding on a root's btree. If btrfs_iget()
needs to lookup the inode from the root's btree, because it's not
currently loaded in memory, then it will need to lock another or the
same path in the same root btree. This may result in a deadlock and
trigger the following lockdep splat:

  WARNING: possible circular locking dependency detected
  6.5.0-rc7-syzkaller-00004-gf7757129e3de #0 Not tainted
  ------------------------------------------------------
  syz-executor277/5012 is trying to acquire lock:
  ffff88802df41710 (btrfs-tree-01){++++}-{3:3}, at: __btrfs_tree_read_lock+0x2f/0x220 fs/btrfs/locking.c:136

  but task is already holding lock:
  ffff88802df418e8 (btrfs-tree-00){++++}-{3:3}, at: __btrfs_tree_read_lock+0x2f/0x220 fs/btrfs/locking.c:136

  which lock already depends on the new lock.

  the existing dependency chain (in reverse order) is:

  -&gt; #1 (btrfs-tree-00){++++}-{3:3}:
         down_read_nested+0x49/0x2f0 kernel/locking/rwsem.c:1645
         __btrfs_tree_read_lock+0x2f/0x220 fs/btrfs/locking.c:136
         btrfs_search_slot+0x13a4/0x2f80 fs/btrfs/ctree.c:2302
         btrfs_init_root_free_objectid+0x148/0x320 fs/btrfs/disk-io.c:4955
         btrfs_init_fs_root fs/btrfs/disk-io.c:1128 [inline]
         btrfs_get_root_ref+0x5ae/0xae0 fs/btrfs/disk-io.c:1338
         btrfs_get_fs_root fs/btrfs/disk-io.c:1390 [inline]
         open_ctree+0x29c8/0x3030 fs/btrfs/disk-io.c:3494
         btrfs_fill_super+0x1c7/0x2f0 fs/btrfs/super.c:1154
         btrfs_mount_root+0x7e0/0x910 fs/btrfs/super.c:1519
         legacy_get_tree+0xef/0x190 fs/fs_context.c:611
         vfs_get_tree+0x8c/0x270 fs/super.c:1519
         fc_mount fs/namespace.c:1112 [inline]
         vfs_kern_mount+0xbc/0x150 fs/namespace.c:1142
         btrfs_mount+0x39f/0xb50 fs/btrfs/super.c:1579
         legacy_get_tree+0xef/0x190 fs/fs_context.c:611
         vfs_get_tree+0x8c/0x270 fs/super.c:1519
         do_new_mount+0x28f/0xae0 fs/namespace.c:3335
         do_mount fs/namespace.c:3675 [inline]
         __do_sys_mount fs/namespace.c:3884 [inline]
         __se_sys_mount+0x2d9/0x3c0 fs/namespace.c:3861
         do_syscall_x64 arch/x86/entry/common.c:50 [inline]
         do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
         entry_SYSCALL_64_after_hwframe+0x63/0xcd

  -&gt; #0 (btrfs-tree-01){++++}-{3:3}:
         check_prev_add kernel/locking/lockdep.c:3142 [inline]
         check_prevs_add kernel/locking/lockdep.c:3261 [inline]
         validate_chain kernel/locking/lockdep.c:3876 [inline]
         __lock_acquire+0x39ff/0x7f70 kernel/locking/lockdep.c:5144
         lock_acquire+0x1e3/0x520 kernel/locking/lockdep.c:5761
         down_read_nested+0x49/0x2f0 kernel/locking/rwsem.c:1645
         __btrfs_tree_read_lock+0x2f/0x220 fs/btrfs/locking.c:136
         btrfs_tree_read_lock fs/btrfs/locking.c:142 [inline]
         btrfs_read_lock_root_node+0x292/0x3c0 fs/btrfs/locking.c:281
         btrfs_search_slot_get_root fs/btrfs/ctree.c:1832 [inline]
         btrfs_search_slot+0x4ff/0x2f80 fs/btrfs/ctree.c:2154
         btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:412
         btrfs_read_locked_inode fs/btrfs/inode.c:3892 [inline]
         btrfs_iget_path+0x2d9/0x1520 fs/btrfs/inode.c:5716
         btrfs_search_path_in_tree_user fs/btrfs/ioctl.c:1961 [inline]
         btrfs_ioctl_ino_lookup_user+0x77a/0xf50 fs/btrfs/ioctl.c:2105
         btrfs_ioctl+0xb0b/0xd40 fs/btrfs/ioctl.c:4683
         vfs_ioctl fs/ioctl.c:51 [inline]
         __do_sys_ioctl fs/ioctl.c:870 [inline]
         __se_sys_ioctl+0xf8/0x170 fs/ioctl.c:856
         do_syscall_x64 arch/x86/entry/common.c:50 [inline]
         do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
         entry_SYSCALL_64_after_hwframe+0x63/0xcd

  other info 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54281/">CVE-2023-54281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54281">CVE-2023-54281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255820">SUSE bug 1255820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54282</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54282" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54282" ref_url="https://www.suse.com/security/cve/CVE-2023-54282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: tuners: qt1010: replace BUG_ON with a regular error

BUG_ON is unnecessary here, and in addition it confuses smatch.
Replacing this with an error return help resolve this smatch
warning:

drivers/media/tuners/qt1010.c:350 qt1010_init() error: buffer overflow 'i2c_data' 34 &lt;= 34
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54282/">CVE-2023-54282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54282">CVE-2023-54282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255810">SUSE bug 1255810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54283</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54283" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54283" ref_url="https://www.suse.com/security/cve/CVE-2023-54283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Address KCSAN report on bpf_lru_list

KCSAN reported a data-race when accessing node-&gt;ref.
Although node-&gt;ref does not have to be accurate,
take this chance to use a more common READ_ONCE() and WRITE_ONCE()
pattern instead of data_race().

There is an existing bpf_lru_node_is_ref() and bpf_lru_node_set_ref().
This patch also adds bpf_lru_node_clear_ref() to do the
WRITE_ONCE(node-&gt;ref, 0) also.

==================================================================
BUG: KCSAN: data-race in __bpf_lru_list_rotate / __htab_lru_percpu_map_update_elem

write to 0xffff888137038deb of 1 bytes by task 11240 on cpu 1:
__bpf_lru_node_move kernel/bpf/bpf_lru_list.c:113 [inline]
__bpf_lru_list_rotate_active kernel/bpf/bpf_lru_list.c:149 [inline]
__bpf_lru_list_rotate+0x1bf/0x750 kernel/bpf/bpf_lru_list.c:240
bpf_lru_list_pop_free_to_local kernel/bpf/bpf_lru_list.c:329 [inline]
bpf_common_lru_pop_free kernel/bpf/bpf_lru_list.c:447 [inline]
bpf_lru_pop_free+0x638/0xe20 kernel/bpf/bpf_lru_list.c:499
prealloc_lru_pop kernel/bpf/hashtab.c:290 [inline]
__htab_lru_percpu_map_update_elem+0xe7/0x820 kernel/bpf/hashtab.c:1316
bpf_percpu_hash_update+0x5e/0x90 kernel/bpf/hashtab.c:2313
bpf_map_update_value+0x2a9/0x370 kernel/bpf/syscall.c:200
generic_map_update_batch+0x3ae/0x4f0 kernel/bpf/syscall.c:1687
bpf_map_do_batch+0x2d9/0x3d0 kernel/bpf/syscall.c:4534
__sys_bpf+0x338/0x810
__do_sys_bpf kernel/bpf/syscall.c:5096 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5094 [inline]
__x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5094
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

read to 0xffff888137038deb of 1 bytes by task 11241 on cpu 0:
bpf_lru_node_set_ref kernel/bpf/bpf_lru_list.h:70 [inline]
__htab_lru_percpu_map_update_elem+0x2f1/0x820 kernel/bpf/hashtab.c:1332
bpf_percpu_hash_update+0x5e/0x90 kernel/bpf/hashtab.c:2313
bpf_map_update_value+0x2a9/0x370 kernel/bpf/syscall.c:200
generic_map_update_batch+0x3ae/0x4f0 kernel/bpf/syscall.c:1687
bpf_map_do_batch+0x2d9/0x3d0 kernel/bpf/syscall.c:4534
__sys_bpf+0x338/0x810
__do_sys_bpf kernel/bpf/syscall.c:5096 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5094 [inline]
__x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5094
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

value changed: 0x01 -&gt; 0x00

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 PID: 11241 Comm: syz-executor.3 Not tainted 6.3.0-rc7-syzkaller-00136-g6a66fdd29ea1 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
==================================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54283/">CVE-2023-54283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54283">CVE-2023-54283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255809">SUSE bug 1255809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54284</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54284" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54284" ref_url="https://www.suse.com/security/cve/CVE-2023-54284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: av7110: prevent underflow in write_ts_to_decoder()

The buf[4] value comes from the user via ts_play().  It is a value in
the u8 range.  The final length we pass to av7110_ipack_instant_repack()
is "len - (buf[4] + 1) - 4" so add a check to ensure that the length is
not negative.  It's not clear that passing a negative len value does
anything bad necessarily, but it's not best practice.

With the new bounds checking the "if (!len)" condition is no longer
possible or required so remove that.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54284/">CVE-2023-54284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54284">CVE-2023-54284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255808">SUSE bug 1255808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54285</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54285" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54285" ref_url="https://www.suse.com/security/cve/CVE-2023-54285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iomap: Fix possible overflow condition in iomap_write_delalloc_scan

folio_next_index() returns an unsigned long value which left shifted
by PAGE_SHIFT could possibly cause an overflow on 32-bit system. Instead
use folio_pos(folio) + folio_size(folio), which does this correctly.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54285/">CVE-2023-54285 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-54285">CVE-2023-54285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255807">SUSE bug 1255807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54286</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54286" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54286" ref_url="https://www.suse.com/security/cve/CVE-2023-54286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace

A received TKIP key may be up to 32 bytes because it may contain
MIC rx/tx keys too. These are not used by iwl and copying these
over overflows the iwl_keyinfo.key field.

Add a check to not copy more data to iwl_keyinfo.key then will fit.

This fixes backtraces like this one:

 memcpy: detected field-spanning write (size 32) of single field "sta_cmd.key.key" at drivers/net/wireless/intel/iwlwifi/dvm/sta.c:1103 (size 16)
 WARNING: CPU: 1 PID: 946 at drivers/net/wireless/intel/iwlwifi/dvm/sta.c:1103 iwlagn_send_sta_key+0x375/0x390 [iwldvm]
 &lt;snip&gt;
 Hardware name: Dell Inc. Latitude E6430/0H3MT5, BIOS A21 05/08/2017
 RIP: 0010:iwlagn_send_sta_key+0x375/0x390 [iwldvm]
 &lt;snip&gt;
 Call Trace:
  &lt;TASK&gt;
  iwl_set_dynamic_key+0x1f0/0x220 [iwldvm]
  iwlagn_mac_set_key+0x1e4/0x280 [iwldvm]
  drv_set_key+0xa4/0x1b0 [mac80211]
  ieee80211_key_enable_hw_accel+0xa8/0x2d0 [mac80211]
  ieee80211_key_replace+0x22d/0x8e0 [mac80211]
 &lt;snip&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54286/">CVE-2023-54286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54286">CVE-2023-54286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255803">SUSE bug 1255803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54287</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54287" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54287" ref_url="https://www.suse.com/security/cve/CVE-2023-54287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: serial: imx: disable Ageing Timer interrupt request irq

There maybe pending USR interrupt before requesting irq, however
uart_add_one_port has not executed, so there will be kernel panic:
[    0.795668] Unable to handle kernel NULL pointer dereference at virtual addre
ss 0000000000000080
[    0.802701] Mem abort info:
[    0.805367]   ESR = 0x0000000096000004
[    0.808950]   EC = 0x25: DABT (current EL), IL = 32 bits
[    0.814033]   SET = 0, FnV = 0
[    0.816950]   EA = 0, S1PTW = 0
[    0.819950]   FSC = 0x04: level 0 translation fault
[    0.824617] Data abort info:
[    0.827367]   ISV = 0, ISS = 0x00000004
[    0.831033]   CM = 0, WnR = 0
[    0.833866] [0000000000000080] user address but active_mm is swapper
[    0.839951] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    0.845953] Modules linked in:
[    0.848869] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.1.1+g56321e101aca #1
[    0.855617] Hardware name: Freescale i.MX8MP EVK (DT)
[    0.860452] pstate: 000000c5 (nzcv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.867117] pc : __imx_uart_rxint.constprop.0+0x11c/0x2c0
[    0.872283] lr : imx_uart_int+0xf8/0x1ec

The issue only happends in the inmate linux when Jailhouse hypervisor
enabled. The test procedure is:
while true; do
	jailhouse enable imx8mp.cell
	jailhouse cell linux xxxx
	sleep 10
	jailhouse cell destroy 1
	jailhouse disable
	sleep 5
done

And during the upper test, press keys to the 2nd linux console.
When `jailhouse cell destroy 1`, the 2nd linux has no chance to put
the uart to a quiese state, so USR1/2 may has pending interrupts. Then
when `jailhosue cell linux xx` to start 2nd linux again, the issue
trigger.

In order to disable irqs before requesting them, both UCR1 and UCR2 irqs
should be disabled, so here fix that, disable the Ageing Timer interrupt
in UCR2 as UCR1 does.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54287/">CVE-2023-54287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54287">CVE-2023-54287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255804">SUSE bug 1255804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54288</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54288" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54288" ref_url="https://www.suse.com/security/cve/CVE-2023-54288" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fortify the spinlock against deadlock by interrupt

In the function ieee80211_tx_dequeue() there is a particular locking
sequence:

begin:
	spin_lock(&amp;local-&gt;queue_stop_reason_lock);
	q_stopped = local-&gt;queue_stop_reasons[q];
	spin_unlock(&amp;local-&gt;queue_stop_reason_lock);

However small the chance (increased by ftracetest), an asynchronous
interrupt can occur in between of spin_lock() and spin_unlock(),
and the interrupt routine will attempt to lock the same
&amp;local-&gt;queue_stop_reason_lock again.

This will cause a costly reset of the CPU and the wifi device or an
altogether hang in the single CPU and single core scenario.

The only remaining spin_lock(&amp;local-&gt;queue_stop_reason_lock) that
did not disable interrupts was patched, which should prevent any
deadlocks on the same CPU/core and the same wifi device.

This is the probable trace of the deadlock:

kernel: ================================
kernel: WARNING: inconsistent lock state
kernel: 6.3.0-rc6-mt-20230401-00001-gf86822a1170f #4 Tainted: G        W
kernel: --------------------------------
kernel: inconsistent {IN-SOFTIRQ-W} -&gt; {SOFTIRQ-ON-W} usage.
kernel: kworker/5:0/25656 [HC0[0]:SC0[0]:HE1:SE1] takes:
kernel: ffff9d6190779478 (&amp;local-&gt;queue_stop_reason_lock){+.?.}-{2:2}, at: return_to_handler+0x0/0x40
kernel: {IN-SOFTIRQ-W} state was registered at:
kernel:   lock_acquire+0xc7/0x2d0
kernel:   _raw_spin_lock+0x36/0x50
kernel:   ieee80211_tx_dequeue+0xb4/0x1330 [mac80211]
kernel:   iwl_mvm_mac_itxq_xmit+0xae/0x210 [iwlmvm]
kernel:   iwl_mvm_mac_wake_tx_queue+0x2d/0xd0 [iwlmvm]
kernel:   ieee80211_queue_skb+0x450/0x730 [mac80211]
kernel:   __ieee80211_xmit_fast.constprop.66+0x834/0xa50 [mac80211]
kernel:   __ieee80211_subif_start_xmit+0x217/0x530 [mac80211]
kernel:   ieee80211_subif_start_xmit+0x60/0x580 [mac80211]
kernel:   dev_hard_start_xmit+0xb5/0x260
kernel:   __dev_queue_xmit+0xdbe/0x1200
kernel:   neigh_resolve_output+0x166/0x260
kernel:   ip_finish_output2+0x216/0xb80
kernel:   __ip_finish_output+0x2a4/0x4d0
kernel:   ip_finish_output+0x2d/0xd0
kernel:   ip_output+0x82/0x2b0
kernel:   ip_local_out+0xec/0x110
kernel:   igmpv3_sendpack+0x5c/0x90
kernel:   igmp_ifc_timer_expire+0x26e/0x4e0
kernel:   call_timer_fn+0xa5/0x230
kernel:   run_timer_softirq+0x27f/0x550
kernel:   __do_softirq+0xb4/0x3a4
kernel:   irq_exit_rcu+0x9b/0xc0
kernel:   sysvec_apic_timer_interrupt+0x80/0xa0
kernel:   asm_sysvec_apic_timer_interrupt+0x1f/0x30
kernel:   _raw_spin_unlock_irqrestore+0x3f/0x70
kernel:   free_to_partial_list+0x3d6/0x590
kernel:   __slab_free+0x1b7/0x310
kernel:   kmem_cache_free+0x52d/0x550
kernel:   putname+0x5d/0x70
kernel:   do_sys_openat2+0x1d7/0x310
kernel:   do_sys_open+0x51/0x80
kernel:   __x64_sys_openat+0x24/0x30
kernel:   do_syscall_64+0x5c/0x90
kernel:   entry_SYSCALL_64_after_hwframe+0x72/0xdc
kernel: irq event stamp: 5120729
kernel: hardirqs last  enabled at (5120729): [&lt;ffffffff9d149936&gt;] trace_graph_return+0xd6/0x120
kernel: hardirqs last disabled at (5120728): [&lt;ffffffff9d149950&gt;] trace_graph_return+0xf0/0x120
kernel: softirqs last  enabled at (5069900): [&lt;ffffffff9cf65b60&gt;] return_to_handler+0x0/0x40
kernel: softirqs last disabled at (5067555): [&lt;ffffffff9cf65b60&gt;] return_to_handler+0x0/0x40
kernel:
        other info that might help us debug this:
kernel:  Possible unsafe locking scenario:
kernel:        CPU0
kernel:        ----
kernel:   lock(&amp;local-&gt;queue_stop_reason_lock);
kernel:   &lt;Interrupt&gt;
kernel:     lock(&amp;local-&gt;queue_stop_reason_lock);
kernel:
         *** DEADLOCK ***
kernel: 8 locks held by kworker/5:0/25656:
kernel:  #0: ffff9d618009d138 ((wq_completion)events_freezable){+.+.}-{0:0}, at: process_one_work+0x1ca/0x530
kernel:  #1: ffffb1ef4637fe68 ((work_completion)(&amp;local-&gt;restart_work)){+.+.}-{0:0}, at: process_one_work+0x1ce/0x530
kernel:  #2: ffffffff9f166548 (rtnl_mutex){+.+.}-{3:3}, at: return_to_handler+0x0/0x40
kernel:  #3: ffff9d619
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54288/">CVE-2023-54288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54288">CVE-2023-54288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255805">SUSE bug 1255805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54289</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54289" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54289" ref_url="https://www.suse.com/security/cve/CVE-2023-54289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Fix NULL dereference in error handling

Smatch reported:

drivers/scsi/qedf/qedf_main.c:3056 qedf_alloc_global_queues()
warn: missing unwind goto?

At this point in the function, nothing has been allocated so we can return
directly. In particular the "qedf-&gt;global_queues" have not been allocated
so calling qedf_free_global_queues() will lead to a NULL dereference when
we check if (!gl[i]) and "gl" is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54289/">CVE-2023-54289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54289">CVE-2023-54289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255806">SUSE bug 1255806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54291</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54291" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54291" ref_url="https://www.suse.com/security/cve/CVE-2023-54291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vduse: fix NULL pointer dereference

vduse_vdpa_set_vq_affinity callback can be called
with NULL value as cpu_mask when deleting the vduse
device.

This patch resets virtqueue's IRQ affinity mask value
to set all CPUs instead of dereferencing NULL cpu_mask.

[ 4760.952149] BUG: kernel NULL pointer dereference, address: 0000000000000000
[ 4760.959110] #PF: supervisor read access in kernel mode
[ 4760.964247] #PF: error_code(0x0000) - not-present page
[ 4760.969385] PGD 0 P4D 0
[ 4760.971927] Oops: 0000 [#1] PREEMPT SMP PTI
[ 4760.976112] CPU: 13 PID: 2346 Comm: vdpa Not tainted 6.4.0-rc6+ #4
[ 4760.982291] Hardware name: Dell Inc. PowerEdge R640/0W23H8, BIOS 2.8.1 06/26/2020
[ 4760.989769] RIP: 0010:memcpy_orig+0xc5/0x130
[ 4760.994049] Code: 16 f8 4c 89 07 4c 89 4f 08 4c 89 54 17 f0 4c 89 5c 17 f8 c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 83 fa 08 72 1b &lt;4c&gt; 8b 06 4c 8b 4c 16 f8 4c 89 07 4c 89 4c 17 f8 c3 cc cc cc cc 66
[ 4761.012793] RSP: 0018:ffffb1d565abb830 EFLAGS: 00010246
[ 4761.018020] RAX: ffff9f4bf6b27898 RBX: ffff9f4be23969c0 RCX: ffff9f4bcadf6400
[ 4761.025152] RDX: 0000000000000008 RSI: 0000000000000000 RDI: ffff9f4bf6b27898
[ 4761.032286] RBP: 0000000000000000 R08: 0000000000000008 R09: 0000000000000000
[ 4761.039416] R10: 0000000000000000 R11: 0000000000000600 R12: 0000000000000000
[ 4761.046549] R13: 0000000000000000 R14: 0000000000000080 R15: ffffb1d565abbb10
[ 4761.053680] FS:  00007f64c2ec2740(0000) GS:ffff9f635f980000(0000) knlGS:0000000000000000
[ 4761.061765] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 4761.067513] CR2: 0000000000000000 CR3: 0000001875270006 CR4: 00000000007706e0
[ 4761.074645] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 4761.081775] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 4761.088909] PKRU: 55555554
[ 4761.091620] Call Trace:
[ 4761.094074]  &lt;TASK&gt;
[ 4761.096180]  ? __die+0x1f/0x70
[ 4761.099238]  ? page_fault_oops+0x171/0x4f0
[ 4761.103340]  ? exc_page_fault+0x7b/0x180
[ 4761.107265]  ? asm_exc_page_fault+0x22/0x30
[ 4761.111460]  ? memcpy_orig+0xc5/0x130
[ 4761.115126]  vduse_vdpa_set_vq_affinity+0x3e/0x50 [vduse]
[ 4761.120533]  virtnet_clean_affinity.part.0+0x3d/0x90 [virtio_net]
[ 4761.126635]  remove_vq_common+0x1a4/0x250 [virtio_net]
[ 4761.131781]  virtnet_remove+0x5d/0x70 [virtio_net]
[ 4761.136580]  virtio_dev_remove+0x3a/0x90
[ 4761.140509]  device_release_driver_internal+0x19b/0x200
[ 4761.145742]  bus_remove_device+0xc2/0x130
[ 4761.149755]  device_del+0x158/0x3e0
[ 4761.153245]  ? kernfs_find_ns+0x35/0xc0
[ 4761.157086]  device_unregister+0x13/0x60
[ 4761.161010]  unregister_virtio_device+0x11/0x20
[ 4761.165543]  device_release_driver_internal+0x19b/0x200
[ 4761.170770]  bus_remove_device+0xc2/0x130
[ 4761.174782]  device_del+0x158/0x3e0
[ 4761.178276]  ? __pfx_vdpa_name_match+0x10/0x10 [vdpa]
[ 4761.183336]  device_unregister+0x13/0x60
[ 4761.187260]  vdpa_nl_cmd_dev_del_set_doit+0x63/0xe0 [vdpa]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54291/">CVE-2023-54291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54291">CVE-2023-54291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255798">SUSE bug 1255798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54292</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54292" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54292" ref_url="https://www.suse.com/security/cve/CVE-2023-54292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix data race on CQP request done

KCSAN detects a data race on cqp_request-&gt;request_done memory location
which is accessed locklessly in irdma_handle_cqp_op while being
updated in irdma_cqp_ce_handler.

Annotate lockless intent with READ_ONCE/WRITE_ONCE to avoid any
compiler optimizations like load fusing and/or KCSAN warning.

[222808.417128] BUG: KCSAN: data-race in irdma_cqp_ce_handler [irdma] / irdma_wait_event [irdma]

[222808.417532] write to 0xffff8e44107019dc of 1 bytes by task 29658 on cpu 5:
[222808.417610]  irdma_cqp_ce_handler+0x21e/0x270 [irdma]
[222808.417725]  cqp_compl_worker+0x1b/0x20 [irdma]
[222808.417827]  process_one_work+0x4d1/0xa40
[222808.417835]  worker_thread+0x319/0x700
[222808.417842]  kthread+0x180/0x1b0
[222808.417852]  ret_from_fork+0x22/0x30

[222808.417918] read to 0xffff8e44107019dc of 1 bytes by task 29688 on cpu 1:
[222808.417995]  irdma_wait_event+0x1e2/0x2c0 [irdma]
[222808.418099]  irdma_handle_cqp_op+0xae/0x170 [irdma]
[222808.418202]  irdma_cqp_cq_destroy_cmd+0x70/0x90 [irdma]
[222808.418308]  irdma_puda_dele_rsrc+0x46d/0x4d0 [irdma]
[222808.418411]  irdma_rt_deinit_hw+0x179/0x1d0 [irdma]
[222808.418514]  irdma_ib_dealloc_device+0x11/0x40 [irdma]
[222808.418618]  ib_dealloc_device+0x2a/0x120 [ib_core]
[222808.418823]  __ib_unregister_device+0xde/0x100 [ib_core]
[222808.418981]  ib_unregister_device+0x22/0x40 [ib_core]
[222808.419142]  irdma_ib_unregister_device+0x70/0x90 [irdma]
[222808.419248]  i40iw_close+0x6f/0xc0 [irdma]
[222808.419352]  i40e_client_device_unregister+0x14a/0x180 [i40e]
[222808.419450]  i40iw_remove+0x21/0x30 [irdma]
[222808.419554]  auxiliary_bus_remove+0x31/0x50
[222808.419563]  device_remove+0x69/0xb0
[222808.419572]  device_release_driver_internal+0x293/0x360
[222808.419582]  driver_detach+0x7c/0xf0
[222808.419592]  bus_remove_driver+0x8c/0x150
[222808.419600]  driver_unregister+0x45/0x70
[222808.419610]  auxiliary_driver_unregister+0x16/0x30
[222808.419618]  irdma_exit_module+0x18/0x1e [irdma]
[222808.419733]  __do_sys_delete_module.constprop.0+0x1e2/0x310
[222808.419745]  __x64_sys_delete_module+0x1b/0x30
[222808.419755]  do_syscall_64+0x39/0x90
[222808.419763]  entry_SYSCALL_64_after_hwframe+0x63/0xcd

[222808.419829] value changed: 0x01 -&gt; 0x03
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54292/">CVE-2023-54292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54292">CVE-2023-54292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255800">SUSE bug 1255800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54293</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54293" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54293" ref_url="https://www.suse.com/security/cve/CVE-2023-54293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bcache: fixup btree_cache_wait list damage

We get a kernel crash about "list_add corruption. next-&gt;prev should be
prev (ffff9c801bc01210), but was ffff9c77b688237c.
(next=ffffae586d8afe68)."

crash&gt; struct list_head 0xffff9c801bc01210
struct list_head {
  next = 0xffffae586d8afe68,
  prev = 0xffffae586d8afe68
}
crash&gt; struct list_head 0xffff9c77b688237c
struct list_head {
  next = 0x0,
  prev = 0x0
}
crash&gt; struct list_head 0xffffae586d8afe68
struct list_head struct: invalid kernel virtual address: ffffae586d8afe68  type: "gdb_readmem_callback"
Cannot access memory at address 0xffffae586d8afe68

[230469.019492] Call Trace:
[230469.032041]  prepare_to_wait+0x8a/0xb0
[230469.044363]  ? bch_btree_keys_free+0x6c/0xc0 [escache]
[230469.056533]  mca_cannibalize_lock+0x72/0x90 [escache]
[230469.068788]  mca_alloc+0x2ae/0x450 [escache]
[230469.080790]  bch_btree_node_get+0x136/0x2d0 [escache]
[230469.092681]  bch_btree_check_thread+0x1e1/0x260 [escache]
[230469.104382]  ? finish_wait+0x80/0x80
[230469.115884]  ? bch_btree_check_recurse+0x1a0/0x1a0 [escache]
[230469.127259]  kthread+0x112/0x130
[230469.138448]  ? kthread_flush_work_fn+0x10/0x10
[230469.149477]  ret_from_fork+0x35/0x40

bch_btree_check_thread() and bch_dirty_init_thread() may call
mca_cannibalize() to cannibalize other cached btree nodes. Only one thread
can do it at a time, so the op of other threads will be added to the
btree_cache_wait list.

We must call finish_wait() to remove op from btree_cache_wait before free
it's memory address. Otherwise, the list will be damaged. Also should call
bch_cannibalize_unlock() to release the btree_cache_alloc_lock and wake_up
other waiters.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54293/">CVE-2023-54293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54293">CVE-2023-54293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255801">SUSE bug 1255801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54294</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54294" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54294" ref_url="https://www.suse.com/security/cve/CVE-2023-54294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix memleak of md thread

In raid10_run(), if setup_conf() succeed and raid10_run() failed before
setting 'mddev-&gt;thread', then in the error path 'conf-&gt;thread' is not
freed.

Fix the problem by setting 'mddev-&gt;thread' right after setup_conf().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54294/">CVE-2023-54294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54294">CVE-2023-54294 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255802">SUSE bug 1255802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54295</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54295" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54295" ref_url="https://www.suse.com/security/cve/CVE-2023-54295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: spi-nor: Fix shift-out-of-bounds in spi_nor_set_erase_type

spi_nor_set_erase_type() was used either to set or to mask out an erase
type. When we used it to mask out an erase type a shift-out-of-bounds
was hit:
UBSAN: shift-out-of-bounds in drivers/mtd/spi-nor/core.c:2237:24
shift exponent 4294967295 is too large for 32-bit type 'int'

The setting of the size_{shift, mask} and of the opcode are unnecessary
when the erase size is zero, as throughout the code just the erase size
is considered to determine whether an erase type is supported or not.
Setting the opcode to 0xFF was wrong too as nobody guarantees that 0xFF
is an unused opcode. Thus when masking out an erase type, just set the
erase size to zero. This will fix the shift-out-of-bounds.

[ta: refine changes, new commit message, fix compilation error]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54295/">CVE-2023-54295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54295">CVE-2023-54295 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255797">SUSE bug 1255797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54296</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54296" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54296" ref_url="https://www.suse.com/security/cve/CVE-2023-54296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration

Fix a goof where KVM tries to grab source vCPUs from the destination VM
when doing intrahost migration.  Grabbing the wrong vCPU not only hoses
the guest, it also crashes the host due to the VMSA pointer being left
NULL.

  BUG: unable to handle page fault for address: ffffe38687000000
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] SMP NOPTI
  CPU: 39 PID: 17143 Comm: sev_migrate_tes Tainted: GO       6.5.0-smp--fff2e47e6c3b-next #151
  Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.28.0 07/10/2023
  RIP: 0010:__free_pages+0x15/0xd0
  RSP: 0018:ffff923fcf6e3c78 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: ffffe38687000000 RCX: 0000000000000100
  RDX: 0000000000000100 RSI: 0000000000000000 RDI: ffffe38687000000
  RBP: ffff923fcf6e3c88 R08: ffff923fcafb0000 R09: 0000000000000000
  R10: 0000000000000000 R11: ffffffff83619b90 R12: ffff923fa9540000
  R13: 0000000000080007 R14: ffff923f6d35d000 R15: 0000000000000000
  FS:  0000000000000000(0000) GS:ffff929d0d7c0000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: ffffe38687000000 CR3: 0000005224c34005 CR4: 0000000000770ee0
  PKRU: 55555554
  Call Trace:
   &lt;TASK&gt;
   sev_free_vcpu+0xcb/0x110 [kvm_amd]
   svm_vcpu_free+0x75/0xf0 [kvm_amd]
   kvm_arch_vcpu_destroy+0x36/0x140 [kvm]
   kvm_destroy_vcpus+0x67/0x100 [kvm]
   kvm_arch_destroy_vm+0x161/0x1d0 [kvm]
   kvm_put_kvm+0x276/0x560 [kvm]
   kvm_vm_release+0x25/0x30 [kvm]
   __fput+0x106/0x280
   ____fput+0x12/0x20
   task_work_run+0x86/0xb0
   do_exit+0x2e3/0x9c0
   do_group_exit+0xb1/0xc0
   __x64_sys_exit_group+0x1b/0x20
   do_syscall_64+0x41/0x90
   entry_SYSCALL_64_after_hwframe+0x63/0xcd
   &lt;/TASK&gt;
  CR2: ffffe38687000000
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54296/">CVE-2023-54296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54296">CVE-2023-54296 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255793">SUSE bug 1255793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54297</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54297" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54297" ref_url="https://www.suse.com/security/cve/CVE-2023-54297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: zoned: fix memory leak after finding block group with super blocks

At exclude_super_stripes(), if we happen to find a block group that has
super blocks mapped to it and we are on a zoned filesystem, we error out
as this is not supposed to happen, indicating either a bug or maybe some
memory corruption for example. However we are exiting the function without
freeing the memory allocated for the logical address of the super blocks.
Fix this by freeing the logical address.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54297/">CVE-2023-54297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54297">CVE-2023-54297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255795">SUSE bug 1255795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54298</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54298" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54298" ref_url="https://www.suse.com/security/cve/CVE-2023-54298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: intel: quark_dts: fix error pointer dereference

If alloc_soc_dts() fails, then we can just return.  Trying to free
"soc_dts" will lead to an Oops.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54298/">CVE-2023-54298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54298">CVE-2023-54298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255796">SUSE bug 1255796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54299</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54299" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54299" ref_url="https://www.suse.com/security/cve/CVE-2023-54299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: bus: verify partner exists in typec_altmode_attention

Some usb hubs will negotiate DisplayPort Alt mode with the device
but will then negotiate a data role swap after entering the alt
mode. The data role swap causes the device to unregister all alt
modes, however the usb hub will still send Attention messages
even after failing to reregister the Alt Mode. type_altmode_attention
currently does not verify whether or not a device's altmode partner
exists, which results in a NULL pointer error when dereferencing
the typec_altmode and typec_altmode_ops belonging to the altmode
partner.

Verify the presence of a device's altmode partner before sending
the Attention message to the Alt Mode driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54299/">CVE-2023-54299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54299">CVE-2023-54299 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255789">SUSE bug 1255789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54300</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54300" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54300" ref_url="https://www.suse.com/security/cve/CVE-2023-54300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx

For the reasons also described in commit b383e8abed41 ("wifi: ath9k: avoid
uninit memory read in ath9k_htc_rx_msg()"), ath9k_htc_rx_msg() should
validate pkt_len before accessing the SKB.

For example, the obtained SKB may have been badly constructed with
pkt_len = 8. In this case, the SKB can only contain a valid htc_frame_hdr
but after being processed in ath9k_htc_rx_msg() and passed to
ath9k_wmi_ctrl_rx() endpoint RX handler, it is expected to have a WMI
command header which should be located inside its data payload.

Implement sanity checking inside ath9k_wmi_ctrl_rx(). Otherwise, uninit
memory can be referenced.

Tested on Qualcomm Atheros Communications AR9271 802.11n .

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54300/">CVE-2023-54300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54300">CVE-2023-54300 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255790">SUSE bug 1255790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54301</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54301" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54301" ref_url="https://www.suse.com/security/cve/CVE-2023-54301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: 8250_bcm7271: fix leak in `brcmuart_probe`

Smatch reports:
drivers/tty/serial/8250/8250_bcm7271.c:1120 brcmuart_probe() warn:
'baud_mux_clk' from clk_prepare_enable() not released on lines: 1032.

The issue is fixed by using a managed clock.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54301/">CVE-2023-54301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54301">CVE-2023-54301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255791">SUSE bug 1255791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54302</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54302" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54302" ref_url="https://www.suse.com/security/cve/CVE-2023-54302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix data race on CQP completion stats

CQP completion statistics is read lockesly in irdma_wait_event and
irdma_check_cqp_progress while it can be updated in the completion
thread irdma_sc_ccq_get_cqe_info on another CPU as KCSAN reports.

Make completion statistics an atomic variable to reflect coherent updates
to it. This will also avoid load/store tearing logic bug potentially
possible by compiler optimizations.

[77346.170861] BUG: KCSAN: data-race in irdma_handle_cqp_op [irdma] / irdma_sc_ccq_get_cqe_info [irdma]

[77346.171383] write to 0xffff8a3250b108e0 of 8 bytes by task 9544 on cpu 4:
[77346.171483]  irdma_sc_ccq_get_cqe_info+0x27a/0x370 [irdma]
[77346.171658]  irdma_cqp_ce_handler+0x164/0x270 [irdma]
[77346.171835]  cqp_compl_worker+0x1b/0x20 [irdma]
[77346.172009]  process_one_work+0x4d1/0xa40
[77346.172024]  worker_thread+0x319/0x700
[77346.172037]  kthread+0x180/0x1b0
[77346.172054]  ret_from_fork+0x22/0x30

[77346.172136] read to 0xffff8a3250b108e0 of 8 bytes by task 9838 on cpu 2:
[77346.172234]  irdma_handle_cqp_op+0xf4/0x4b0 [irdma]
[77346.172413]  irdma_cqp_aeq_cmd+0x75/0xa0 [irdma]
[77346.172592]  irdma_create_aeq+0x390/0x45a [irdma]
[77346.172769]  irdma_rt_init_hw.cold+0x212/0x85d [irdma]
[77346.172944]  irdma_probe+0x54f/0x620 [irdma]
[77346.173122]  auxiliary_bus_probe+0x66/0xa0
[77346.173137]  really_probe+0x140/0x540
[77346.173154]  __driver_probe_device+0xc7/0x220
[77346.173173]  driver_probe_device+0x5f/0x140
[77346.173190]  __driver_attach+0xf0/0x2c0
[77346.173208]  bus_for_each_dev+0xa8/0xf0
[77346.173225]  driver_attach+0x29/0x30
[77346.173240]  bus_add_driver+0x29c/0x2f0
[77346.173255]  driver_register+0x10f/0x1a0
[77346.173272]  __auxiliary_driver_register+0xbc/0x140
[77346.173287]  irdma_init_module+0x55/0x1000 [irdma]
[77346.173460]  do_one_initcall+0x7d/0x410
[77346.173475]  do_init_module+0x81/0x2c0
[77346.173491]  load_module+0x1232/0x12c0
[77346.173506]  __do_sys_finit_module+0x101/0x180
[77346.173522]  __x64_sys_finit_module+0x3c/0x50
[77346.173538]  do_syscall_64+0x39/0x90
[77346.173553]  entry_SYSCALL_64_after_hwframe+0x63/0xcd

[77346.173634] value changed: 0x0000000000000094 -&gt; 0x0000000000000095
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54302/">CVE-2023-54302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54302">CVE-2023-54302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255792">SUSE bug 1255792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54303</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54303" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54303" ref_url="https://www.suse.com/security/cve/CVE-2023-54303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Disable preemption in bpf_perf_event_output

The nesting protection in bpf_perf_event_output relies on disabled
preemption, which is guaranteed for kprobes and tracepoints.

However bpf_perf_event_output can be also called from uprobes context
through bpf_prog_run_array_sleepable function which disables migration,
but keeps preemption enabled.

This can cause task to be preempted by another one inside the nesting
protection and lead eventually to two tasks using same perf_sample_data
buffer and cause crashes like:

  kernel tried to execute NX-protected page - exploit attempt? (uid: 0)
  BUG: unable to handle page fault for address: ffffffff82be3eea
  ...
  Call Trace:
   ? __die+0x1f/0x70
   ? page_fault_oops+0x176/0x4d0
   ? exc_page_fault+0x132/0x230
   ? asm_exc_page_fault+0x22/0x30
   ? perf_output_sample+0x12b/0x910
   ? perf_event_output+0xd0/0x1d0
   ? bpf_perf_event_output+0x162/0x1d0
   ? bpf_prog_c6271286d9a4c938_krava1+0x76/0x87
   ? __uprobe_perf_func+0x12b/0x540
   ? uprobe_dispatcher+0x2c4/0x430
   ? uprobe_notify_resume+0x2da/0xce0
   ? atomic_notifier_call_chain+0x7b/0x110
   ? exit_to_user_mode_prepare+0x13e/0x290
   ? irqentry_exit_to_user_mode+0x5/0x30
   ? asm_exc_int3+0x35/0x40

Fixing this by disabling preemption in bpf_perf_event_output.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54303/">CVE-2023-54303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54303">CVE-2023-54303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255785">SUSE bug 1255785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54304</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54304" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54304" ref_url="https://www.suse.com/security/cve/CVE-2023-54304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: meson_sm: fix to avoid potential NULL pointer dereference

of_match_device() may fail and returns a NULL pointer.

Fix this by checking the return value of of_match_device.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54304/">CVE-2023-54304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54304">CVE-2023-54304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255786">SUSE bug 1255786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54305</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54305" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54305" ref_url="https://www.suse.com/security/cve/CVE-2023-54305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: refuse to create ea block when umounted

The ea block expansion need to access s_root while it is
already set as NULL when umount is triggered. Refuse this
request to avoid panic.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54305/">CVE-2023-54305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54305">CVE-2023-54305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255787">SUSE bug 1255787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54306</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54306" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54306" ref_url="https://www.suse.com/security/cve/CVE-2023-54306" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: tls: avoid hanging tasks on the tx_lock

syzbot sent a hung task report and Eric explains that adversarial
receiver may keep RWIN at 0 for a long time, so we are not guaranteed
to make forward progress. Thread which took tx_lock and went to sleep
may not release tx_lock for hours. Use interruptible sleep where
possible and reschedule the work if it can't take the lock.

Testing: existing selftest passes
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54306/">CVE-2023-54306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54306">CVE-2023-54306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255788">SUSE bug 1255788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54307</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54307" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54307" ref_url="https://www.suse.com/security/cve/CVE-2023-54307" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ptp_qoriq: fix memory leak in probe()

Smatch complains that:
drivers/ptp/ptp_qoriq.c ptp_qoriq_probe()
warn: 'base' from ioremap() not released.

Fix this by revising the parameter from 'ptp_qoriq-&gt;base' to 'base'.
This is only a bug if ptp_qoriq_init() returns on the
first -ENODEV error path.
For other error paths ptp_qoriq-&gt;base and base are the same.
And this change makes the code more readable.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54307/">CVE-2023-54307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54307">CVE-2023-54307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255778">SUSE bug 1255778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54308</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54308" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54308" ref_url="https://www.suse.com/security/cve/CVE-2023-54308" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: ymfpci: Create card with device-managed snd_devm_card_new()

snd_card_ymfpci_remove() was removed in commit c6e6bb5eab74 ("ALSA:
ymfpci: Allocate resources with device-managed APIs"), but the call to
snd_card_new() was not replaced with snd_devm_card_new().

Since there was no longer a call to snd_card_free, unloading the module
would eventually result in Oops:

[697561.532887] BUG: unable to handle page fault for address: ffffffffc0924480
[697561.532893] #PF: supervisor read access in kernel mode
[697561.532896] #PF: error_code(0x0000) - not-present page
[697561.532899] PGD ae1e15067 P4D ae1e15067 PUD ae1e17067 PMD 11a8f5067 PTE 0
[697561.532905] Oops: 0000 [#1] PREEMPT SMP NOPTI
[697561.532909] CPU: 21 PID: 5080 Comm: wireplumber Tainted: G        W  OE      6.2.7 #1
[697561.532914] Hardware name: System manufacturer System Product Name/TUF GAMING X570-PLUS, BIOS 4408 10/28/2022
[697561.532916] RIP: 0010:try_module_get.part.0+0x1a/0xe0
[697561.532924] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 55 48 89 e5 41 55 41 54 49 89 fc bf 01 00 00 00 e8 56 3c f8 ff &lt;41&gt; 83 3c 24 02 0f 84 96 00 00 00 41 8b 84 24 30 03 00 00 85 c0 0f
[697561.532927] RSP: 0018:ffffbe9b858c3bd8 EFLAGS: 00010246
[697561.532930] RAX: ffff9815d14f1900 RBX: ffff9815c14e6000 RCX: 0000000000000000
[697561.532933] RDX: 0000000000000000 RSI: ffffffffc055092c RDI: ffffffffb3778c1a
[697561.532935] RBP: ffffbe9b858c3be8 R08: 0000000000000040 R09: ffff981a1a741380
[697561.532937] R10: ffffbe9b858c3c80 R11: 00000009d56533a6 R12: ffffffffc0924480
[697561.532939] R13: ffff9823439d8500 R14: 0000000000000025 R15: ffff9815cd109f80
[697561.532942] FS:  00007f13084f1f80(0000) GS:ffff9824aef40000(0000) knlGS:0000000000000000
[697561.532945] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[697561.532947] CR2: ffffffffc0924480 CR3: 0000000145344000 CR4: 0000000000350ee0
[697561.532949] Call Trace:
[697561.532951]  &lt;TASK&gt;
[697561.532955]  try_module_get+0x13/0x30
[697561.532960]  snd_ctl_open+0x61/0x1c0 [snd]
[697561.532976]  snd_open+0xb4/0x1e0 [snd]
[697561.532989]  chrdev_open+0xc7/0x240
[697561.532995]  ? fsnotify_perm.part.0+0x6e/0x160
[697561.533000]  ? __pfx_chrdev_open+0x10/0x10
[697561.533005]  do_dentry_open+0x169/0x440
[697561.533009]  vfs_open+0x2d/0x40
[697561.533012]  path_openat+0xa9d/0x10d0
[697561.533017]  ? debug_smp_processor_id+0x17/0x20
[697561.533022]  ? trigger_load_balance+0x65/0x370
[697561.533026]  do_filp_open+0xb2/0x160
[697561.533032]  ? _raw_spin_unlock+0x19/0x40
[697561.533036]  ? alloc_fd+0xa9/0x190
[697561.533040]  do_sys_openat2+0x9f/0x160
[697561.533044]  __x64_sys_openat+0x55/0x90
[697561.533048]  do_syscall_64+0x3b/0x90
[697561.533052]  entry_SYSCALL_64_after_hwframe+0x72/0xdc
[697561.533056] RIP: 0033:0x7f1308a40db4
[697561.533059] Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 46 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 78 68 f8 ff 8b 44
[697561.533062] RSP: 002b:00007ffcce664450 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[697561.533066] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f1308a40db4
[697561.533068] RDX: 0000000000080000 RSI: 00007ffcce664690 RDI: 00000000ffffff9c
[697561.533070] RBP: 00007ffcce664690 R08: 0000000000000000 R09: 0000000000000012
[697561.533072] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000080000
[697561.533074] R13: 00007f13054b069b R14: 0000565209f83200 R15: 0000000000000000
[697561.533078]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54308/">CVE-2023-54308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54308">CVE-2023-54308 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255779">SUSE bug 1255779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54309</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54309" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54309" ref_url="https://www.suse.com/security/cve/CVE-2023-54309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation

/dev/vtpmx is made visible before 'workqueue' is initialized, which can
lead to a memory corruption in the worst case scenario.

Address this by initializing 'workqueue' as the very first step of the
driver initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54309/">CVE-2023-54309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54309">CVE-2023-54309 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255780">SUSE bug 1255780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54310</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54310" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54310" ref_url="https://www.suse.com/security/cve/CVE-2023-54310" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: message: mptlan: Fix use after free bug in mptlan_remove() due to race condition

mptlan_probe() calls mpt_register_lan_device() which initializes the
&amp;priv-&gt;post_buckets_task workqueue. A call to
mpt_lan_wake_post_buckets_task() will subsequently start the work.

During driver unload in mptlan_remove() the following race may occur:

CPU0                  CPU1

                    |mpt_lan_post_receive_buckets_work()
mptlan_remove()     |
  free_netdev()     |
    kfree(dev);     |
                    |
                    | dev-&gt;mtu
                    |   //use

Fix this by finishing the work prior to cleaning up in mptlan_remove().

[mkp: we really should remove mptlan instead of attempting to fix it]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-02"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54310/">CVE-2023-54310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54310">CVE-2023-54310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255782">SUSE bug 1255782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255784">SUSE bug 1255784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54311</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54311" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54311" ref_url="https://www.suse.com/security/cve/CVE-2023-54311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix deadlock when converting an inline directory in nojournal mode

In no journal mode, ext4_finish_convert_inline_dir() can self-deadlock
by calling ext4_handle_dirty_dirblock() when it already has taken the
directory lock.  There is a similar self-deadlock in
ext4_incvert_inline_data_nolock() for data files which we'll fix at
the same time.

A simple reproducer demonstrating the problem:

    mke2fs -Fq -t ext2 -O inline_data -b 4k /dev/vdc 64
    mount -t ext4 -o dirsync /dev/vdc /vdc
    cd /vdc
    mkdir file0
    cd file0
    touch file0
    touch file1
    attr -s BurnSpaceInEA -V abcde .
    touch supercalifragilisticexpialidocious
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-02"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54311/">CVE-2023-54311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54311">CVE-2023-54311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255773">SUSE bug 1255773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54312</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54312" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54312" ref_url="https://www.suse.com/security/cve/CVE-2023-54312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

samples/bpf: Fix buffer overflow in tcp_basertt

Using sizeof(nv) or strlen(nv)+1 is correct.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-02"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54312/">CVE-2023-54312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54312">CVE-2023-54312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255774">SUSE bug 1255774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54313</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54313" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54313" ref_url="https://www.suse.com/security/cve/CVE-2023-54313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ovl: fix null pointer dereference in ovl_get_acl_rcu()

Following process:
         P1                     P2
 path_openat
  link_path_walk
   may_lookup
    inode_permission(rcu)
     ovl_permission
      acl_permission_check
       check_acl
        get_cached_acl_rcu
	 ovl_get_inode_acl
	  realinode = ovl_inode_real(ovl_inode)
	                      drop_cache
		               __dentry_kill(ovl_dentry)
				iput(ovl_inode)
		                 ovl_destroy_inode(ovl_inode)
		                  dput(oi-&gt;__upperdentry)
		                   dentry_kill(upperdentry)
		                    dentry_unlink_inode
				     upperdentry-&gt;d_inode = NULL
	    ovl_inode_upper
	     upperdentry = ovl_i_dentry_upper(ovl_inode)
	     d_inode(upperdentry) // returns NULL
	  IS_POSIXACL(realinode) // NULL pointer dereference
, will trigger an null pointer dereference at realinode:
  [  205.472797] BUG: kernel NULL pointer dereference, address:
                 0000000000000028
  [  205.476701] CPU: 2 PID: 2713 Comm: ls Not tainted
                 6.3.0-12064-g2edfa098e750-dirty #1216
  [  205.478754] RIP: 0010:do_ovl_get_acl+0x5d/0x300
  [  205.489584] Call Trace:
  [  205.489812]  &lt;TASK&gt;
  [  205.490014]  ovl_get_inode_acl+0x26/0x30
  [  205.490466]  get_cached_acl_rcu+0x61/0xa0
  [  205.490908]  generic_permission+0x1bf/0x4e0
  [  205.491447]  ovl_permission+0x79/0x1b0
  [  205.491917]  inode_permission+0x15e/0x2c0
  [  205.492425]  link_path_walk+0x115/0x550
  [  205.493311]  path_lookupat.isra.0+0xb2/0x200
  [  205.493803]  filename_lookup+0xda/0x240
  [  205.495747]  vfs_fstatat+0x7b/0xb0

Fetch a reproducer in [Link].

Use the helper ovl_i_path_realinode() to get realinode and then do
non-nullptr checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54313/">CVE-2023-54313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54313">CVE-2023-54313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255775">SUSE bug 1255775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54314</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54314" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54314" ref_url="https://www.suse.com/security/cve/CVE-2023-54314" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: af9005: Fix null-ptr-deref in af9005_i2c_xfer

In af9005_i2c_xfer, msg is controlled by user. When msg[i].buf
is null and msg[i].len is zero, former checks on msg[i].buf would be
passed. Malicious data finally reach af9005_i2c_xfer. If accessing
msg[i].buf[0] without sanity check, null ptr deref would happen.
We add check on msg[i].len to prevent crash.

Similar commit:
commit 0ed554fd769a
("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()")
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-02"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54314/">CVE-2023-54314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54314">CVE-2023-54314 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255776">SUSE bug 1255776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54315</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54315" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54315" ref_url="https://www.suse.com/security/cve/CVE-2023-54315" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/powernv/sriov: perform null check on iov before dereferencing iov

Currently pointer iov is being dereferenced before the null check of iov
which can lead to null pointer dereference errors. Fix this by moving the
iov null check before the dereferencing.

Detected using cppcheck static analysis:
linux/arch/powerpc/platforms/powernv/pci-sriov.c:597:12: warning: Either
the condition '!iov' is redundant or there is possible null pointer
dereference: iov. [nullPointerRedundantCheck]
 num_vfs = iov-&gt;num_vfs;
           ^
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54315/">CVE-2023-54315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54315">CVE-2023-54315 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255769">SUSE bug 1255769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54316</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54316" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54316" ref_url="https://www.suse.com/security/cve/CVE-2023-54316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

refscale: Fix uninitalized use of wait_queue_head_t

Running the refscale test occasionally crashes the kernel with the
following error:

[ 8569.952896] BUG: unable to handle page fault for address: ffffffffffffffe8
[ 8569.952900] #PF: supervisor read access in kernel mode
[ 8569.952902] #PF: error_code(0x0000) - not-present page
[ 8569.952904] PGD c4b048067 P4D c4b049067 PUD c4b04b067 PMD 0
[ 8569.952910] Oops: 0000 [#1] PREEMPT_RT SMP NOPTI
[ 8569.952916] Hardware name: Dell Inc. PowerEdge R750/0WMWCR, BIOS 1.2.4 05/28/2021
[ 8569.952917] RIP: 0010:prepare_to_wait_event+0x101/0x190
  :
[ 8569.952940] Call Trace:
[ 8569.952941]  &lt;TASK&gt;
[ 8569.952944]  ref_scale_reader+0x380/0x4a0 [refscale]
[ 8569.952959]  kthread+0x10e/0x130
[ 8569.952966]  ret_from_fork+0x1f/0x30
[ 8569.952973]  &lt;/TASK&gt;

The likely cause is that init_waitqueue_head() is called after the call to
the torture_create_kthread() function that creates the ref_scale_reader
kthread.  Although this init_waitqueue_head() call will very likely
complete before this kthread is created and starts running, it is
possible that the calling kthread will be delayed between the calls to
torture_create_kthread() and init_waitqueue_head().  In this case, the
new kthread will use the waitqueue head before it is properly initialized,
which is not good for the kernel's health and well-being.

The above crash happened here:

	static inline void __add_wait_queue(...)
	{
		:
		if (!(wq-&gt;flags &amp; WQ_FLAG_PRIORITY)) &lt;=== Crash here

The offset of flags from list_head entry in wait_queue_entry is
-0x18. If reader_tasks[i].wq.head.next is NULL as allocated reader_task
structure is zero initialized, the instruction will try to access address
0xffffffffffffffe8, which is exactly the fault address listed above.

This commit therefore invokes init_waitqueue_head() before creating
the kthread.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54316/">CVE-2023-54316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54316">CVE-2023-54316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255770">SUSE bug 1255770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54317</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54317" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54317" ref_url="https://www.suse.com/security/cve/CVE-2023-54317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm flakey: don't corrupt the zero page

When we need to zero some range on a block device, the function
__blkdev_issue_zero_pages submits a write bio with the bio vector pointing
to the zero page. If we use dm-flakey with corrupt bio writes option, it
will corrupt the content of the zero page which results in crashes of
various userspace programs. Glibc assumes that memory returned by mmap is
zeroed and it uses it for calloc implementation; if the newly mapped
memory is not zeroed, calloc will return non-zeroed memory.

Fix this bug by testing if the page is equal to ZERO_PAGE(0) and
avoiding the corruption in this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54317/">CVE-2023-54317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54317">CVE-2023-54317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255771">SUSE bug 1255771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54318</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54318" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54318" ref_url="https://www.suse.com/security/cve/CVE-2023-54318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add

While doing smcr_port_add, there maybe linkgroup add into or delete
from smc_lgr_list.list at the same time, which may result kernel crash.
So, use smc_lgr_list.lock to protect smc_lgr_list.list iterate in
smcr_port_add.

The crash calltrace show below:
BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 0 P4D 0
Oops: 0000 [#1] SMP NOPTI
CPU: 0 PID: 559726 Comm: kworker/0:92 Kdump: loaded Tainted: G
Hardware name: Alibaba Cloud Alibaba Cloud ECS, BIOS 449e491 04/01/2014
Workqueue: events smc_ib_port_event_work [smc]
RIP: 0010:smcr_port_add+0xa6/0xf0 [smc]
RSP: 0000:ffffa5a2c8f67de0 EFLAGS: 00010297
RAX: 0000000000000001 RBX: ffff9935e0650000 RCX: 0000000000000000
RDX: 0000000000000010 RSI: ffff9935e0654290 RDI: ffff9935c8560000
RBP: 0000000000000000 R08: 0000000000000000 R09: ffff9934c0401918
R10: 0000000000000000 R11: ffffffffb4a5c278 R12: ffff99364029aae4
R13: ffff99364029aa00 R14: 00000000ffffffed R15: ffff99364029ab08
FS:  0000000000000000(0000) GS:ffff994380600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 0000000f06a10003 CR4: 0000000002770ef0
PKRU: 55555554
Call Trace:
 smc_ib_port_event_work+0x18f/0x380 [smc]
 process_one_work+0x19b/0x340
 worker_thread+0x30/0x370
 ? process_one_work+0x340/0x340
 kthread+0x114/0x130
 ? __kthread_cancel_work+0x50/0x50
 ret_from_fork+0x1f/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-02"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54318/">CVE-2023-54318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54318">CVE-2023-54318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255772">SUSE bug 1255772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54319</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54319" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54319" ref_url="https://www.suse.com/security/cve/CVE-2023-54319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: at91-pio4: check return value of devm_kasprintf()

devm_kasprintf() returns a pointer to dynamically allocated memory.
Pointer could be NULL in case allocation fails. Check pointer validity.
Identified with coccinelle (kmerr.cocci script).

Depends-on: 1c4e5c470a56 ("pinctrl: at91: use devm_kasprintf() to avoid potential leaks")
Depends-on: 5a8f9cf269e8 ("pinctrl: at91-pio4: use proper format specifier for unsigned int")
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-02"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54319/">CVE-2023-54319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54319">CVE-2023-54319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255760">SUSE bug 1255760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54320</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54320" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54320" ref_url="https://www.suse.com/security/cve/CVE-2023-54320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86/amd: pmc: Fix memory leak in amd_pmc_stb_debugfs_open_v2()

Function amd_pmc_stb_debugfs_open_v2() may be called when the STB
debug mechanism enabled.

When amd_pmc_send_cmd() fails, the 'buf' needs to be released.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54320/">CVE-2023-54320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54320">CVE-2023-54320 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255761">SUSE bug 1255761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54321</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54321" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54321" ref_url="https://www.suse.com/security/cve/CVE-2023-54321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

driver core: fix potential null-ptr-deref in device_add()

I got the following null-ptr-deref report while doing fault injection test:

BUG: kernel NULL pointer dereference, address: 0000000000000058
CPU: 2 PID: 278 Comm: 37-i2c-ds2482 Tainted: G    B   W        N 6.1.0-rc3+
RIP: 0010:klist_put+0x2d/0xd0
Call Trace:
 &lt;TASK&gt;
 klist_remove+0xf1/0x1c0
 device_release_driver_internal+0x196/0x210
 bus_remove_device+0x1bd/0x240
 device_add+0xd3d/0x1100
 w1_add_master_device+0x476/0x490 [wire]
 ds2482_probe+0x303/0x3e0 [ds2482]

This is how it happened:

w1_alloc_dev()
  // The dev-&gt;driver is set to w1_master_driver.
  memcpy(&amp;dev-&gt;dev, device, sizeof(struct device));
  device_add()
    bus_add_device()
    dpm_sysfs_add() // It fails, calls bus_remove_device.

    // error path
    bus_remove_device()
      // The dev-&gt;driver is not null, but driver is not bound.
      __device_release_driver()
        klist_remove(&amp;dev-&gt;p-&gt;knode_driver) &lt;-- It causes null-ptr-deref.

    // normal path
    bus_probe_device() // It's not called yet.
      device_bind_driver()

If dev-&gt;driver is set, in the error path after calling bus_add_device()
in device_add(), bus_remove_device() is called, then the device will be
detached from driver. But device_bind_driver() is not called yet, so it
causes null-ptr-deref while access the 'knode_driver'. To fix this, set
dev-&gt;driver to null in the error path before calling bus_remove_device().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54321/">CVE-2023-54321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-54321">CVE-2023-54321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255762">SUSE bug 1255762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54322</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54322" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54322" ref_url="https://www.suse.com/security/cve/CVE-2023-54322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: set __exception_irq_entry with __irq_entry as a default

filter_irq_stacks() is supposed to cut entries which are related irq entries
from its call stack.
And in_irqentry_text() which is called by filter_irq_stacks()
uses __irqentry_text_start/end symbol to find irq entries in callstack.

But it doesn't work correctly as without "CONFIG_FUNCTION_GRAPH_TRACER",
arm64 kernel doesn't include gic_handle_irq which is entry point of arm64 irq
between __irqentry_text_start and __irqentry_text_end as we discussed in below link.
https://lore.kernel.org/all/CACT4Y+aReMGLYua2rCLHgFpS9io5cZC04Q8GLs-uNmrn1ezxYQ@mail.gmail.com/#t

This problem can makes unintentional deep call stack entries especially
in KASAN enabled situation as below.

[ 2479.383395]I[0:launcher-loader: 1719] Stack depot reached limit capacity
[ 2479.383538]I[0:launcher-loader: 1719] WARNING: CPU: 0 PID: 1719 at lib/stackdepot.c:129 __stack_depot_save+0x464/0x46c
[ 2479.385693]I[0:launcher-loader: 1719] pstate: 624000c5 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 2479.385724]I[0:launcher-loader: 1719] pc : __stack_depot_save+0x464/0x46c
[ 2479.385751]I[0:launcher-loader: 1719] lr : __stack_depot_save+0x460/0x46c
[ 2479.385774]I[0:launcher-loader: 1719] sp : ffffffc0080073c0
[ 2479.385793]I[0:launcher-loader: 1719] x29: ffffffc0080073e0 x28: ffffffd00b78a000 x27: 0000000000000000
[ 2479.385839]I[0:launcher-loader: 1719] x26: 000000000004d1dd x25: ffffff891474f000 x24: 00000000ca64d1dd
[ 2479.385882]I[0:launcher-loader: 1719] x23: 0000000000000200 x22: 0000000000000220 x21: 0000000000000040
[ 2479.385925]I[0:launcher-loader: 1719] x20: ffffffc008007440 x19: 0000000000000000 x18: 0000000000000000
[ 2479.385969]I[0:launcher-loader: 1719] x17: 2065726568207475 x16: 000000000000005e x15: 2d2d2d2d2d2d2d20
[ 2479.386013]I[0:launcher-loader: 1719] x14: 5d39313731203a72 x13: 00000000002f6b30 x12: 00000000002f6af8
[ 2479.386057]I[0:launcher-loader: 1719] x11: 00000000ffffffff x10: ffffffb90aacf000 x9 : e8a74a6c16008800
[ 2479.386101]I[0:launcher-loader: 1719] x8 : e8a74a6c16008800 x7 : 00000000002f6b30 x6 : 00000000002f6af8
[ 2479.386145]I[0:launcher-loader: 1719] x5 : ffffffc0080070c8 x4 : ffffffd00b192380 x3 : ffffffd0092b313c
[ 2479.386189]I[0:launcher-loader: 1719] x2 : 0000000000000001 x1 : 0000000000000004 x0 : 0000000000000022
[ 2479.386231]I[0:launcher-loader: 1719] Call trace:
[ 2479.386248]I[0:launcher-loader: 1719]  __stack_depot_save+0x464/0x46c
[ 2479.386273]I[0:launcher-loader: 1719]  kasan_save_stack+0x58/0x70
[ 2479.386303]I[0:launcher-loader: 1719]  save_stack_info+0x34/0x138
[ 2479.386331]I[0:launcher-loader: 1719]  kasan_save_free_info+0x18/0x24
[ 2479.386358]I[0:launcher-loader: 1719]  ____kasan_slab_free+0x16c/0x170
[ 2479.386385]I[0:launcher-loader: 1719]  __kasan_slab_free+0x10/0x20
[ 2479.386410]I[0:launcher-loader: 1719]  kmem_cache_free+0x238/0x53c
[ 2479.386435]I[0:launcher-loader: 1719]  mempool_free_slab+0x1c/0x28
[ 2479.386460]I[0:launcher-loader: 1719]  mempool_free+0x7c/0x1a0
[ 2479.386484]I[0:launcher-loader: 1719]  bvec_free+0x34/0x80
[ 2479.386514]I[0:launcher-loader: 1719]  bio_free+0x60/0x98
[ 2479.386540]I[0:launcher-loader: 1719]  bio_put+0x50/0x21c
[ 2479.386567]I[0:launcher-loader: 1719]  f2fs_write_end_io+0x4ac/0x4d0
[ 2479.386594]I[0:launcher-loader: 1719]  bio_endio+0x2dc/0x300
[ 2479.386622]I[0:launcher-loader: 1719]  __dm_io_complete+0x324/0x37c
[ 2479.386650]I[0:launcher-loader: 1719]  dm_io_dec_pending+0x60/0xa4
[ 2479.386676]I[0:launcher-loader: 1719]  clone_endio+0xf8/0x2f0
[ 2479.386700]I[0:launcher-loader: 1719]  bio_endio+0x2dc/0x300
[ 2479.386727]I[0:launcher-loader: 1719]  blk_update_request+0x258/0x63c
[ 2479.386754]I[0:launcher-loader: 1719]  scsi_end_request+0x50/0x304
[ 2479.386782]I[0:launcher-loader: 1719]  scsi_io_completion+0x88/0x160
[ 2479.386808]I[0:launcher-loader: 1719]  scsi_finish_command+0x17c/0x194
[ 2479.386833]I
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54322/">CVE-2023-54322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54322">CVE-2023-54322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255763">SUSE bug 1255763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54323</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54323" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54323" ref_url="https://www.suse.com/security/cve/CVE-2023-54323" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cxl/pmem: Fix nvdimm registration races

A loop of the form:

    while true; do modprobe cxl_pci; modprobe -r cxl_pci; done

...fails with the following crash signature:

    BUG: kernel NULL pointer dereference, address: 0000000000000040
    [..]
    RIP: 0010:cxl_internal_send_cmd+0x5/0xb0 [cxl_core]
    [..]
    Call Trace:
     &lt;TASK&gt;
     cxl_pmem_ctl+0x121/0x240 [cxl_pmem]
     nvdimm_get_config_data+0xd6/0x1a0 [libnvdimm]
     nd_label_data_init+0x135/0x7e0 [libnvdimm]
     nvdimm_probe+0xd6/0x1c0 [libnvdimm]
     nvdimm_bus_probe+0x7a/0x1e0 [libnvdimm]
     really_probe+0xde/0x380
     __driver_probe_device+0x78/0x170
     driver_probe_device+0x1f/0x90
     __device_attach_driver+0x85/0x110
     bus_for_each_drv+0x7d/0xc0
     __device_attach+0xb4/0x1e0
     bus_probe_device+0x9f/0xc0
     device_add+0x445/0x9c0
     nd_async_device_register+0xe/0x40 [libnvdimm]
     async_run_entry_fn+0x30/0x130

...namely that the bottom half of async nvdimm device registration runs
after the CXL has already torn down the context that cxl_pmem_ctl()
needs. Unlike the ACPI NFIT case that benefits from launching multiple
nvdimm device registrations in parallel from those listed in the table,
CXL is already marked PROBE_PREFER_ASYNCHRONOUS. So provide for a
synchronous registration path to preclude this scenario.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54323/">CVE-2023-54323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54323">CVE-2023-54323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255756">SUSE bug 1255756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54324</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54324" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54324" ref_url="https://www.suse.com/security/cve/CVE-2023-54324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: fix a race condition in retrieve_deps

There's a race condition in the multipath target when retrieve_deps
races with multipath_message calling dm_get_device and dm_put_device.
retrieve_deps walks the list of open devices without holding any lock
but multipath may add or remove devices to the list while it is
running. The end result may be memory corruption or use-after-free
memory access.

See this description of a UAF with multipath_message():
https://listman.redhat.com/archives/dm-devel/2022-October/052373.html

Fix this bug by introducing a new rw semaphore "devices_lock". We grab
devices_lock for read in retrieve_deps and we grab it for write in
dm_get_device and dm_put_device.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54324/">CVE-2023-54324 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54324">CVE-2023-54324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255759">SUSE bug 1255759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54325</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54325" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54325" ref_url="https://www.suse.com/security/cve/CVE-2023-54325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qat - fix out-of-bounds read

When preparing an AER-CTR request, the driver copies the key provided by
the user into a data structure that is accessible by the firmware.
If the target device is QAT GEN4, the key size is rounded up by 16 since
a rounded up size is expected by the device.
If the key size is rounded up before the copy, the size used for copying
the key might be bigger than the size of the region containing the key,
causing an out-of-bounds read.

Fix by doing the copy first and then update the keylen.

This is to fix the following warning reported by KASAN:

	[  138.150574] BUG: KASAN: global-out-of-bounds in qat_alg_skcipher_init_com.isra.0+0x197/0x250 [intel_qat]
	[  138.150641] Read of size 32 at addr ffffffff88c402c0 by task cryptomgr_test/2340

	[  138.150651] CPU: 15 PID: 2340 Comm: cryptomgr_test Not tainted 6.2.0-rc1+ #45
	[  138.150659] Hardware name: Intel Corporation ArcherCity/ArcherCity, BIOS EGSDCRB1.86B.0087.D13.2208261706 08/26/2022
	[  138.150663] Call Trace:
	[  138.150668]  &lt;TASK&gt;
	[  138.150922]  kasan_check_range+0x13a/0x1c0
	[  138.150931]  memcpy+0x1f/0x60
	[  138.150940]  qat_alg_skcipher_init_com.isra.0+0x197/0x250 [intel_qat]
	[  138.151006]  qat_alg_skcipher_init_sessions+0xc1/0x240 [intel_qat]
	[  138.151073]  crypto_skcipher_setkey+0x82/0x160
	[  138.151085]  ? prepare_keybuf+0xa2/0xd0
	[  138.151095]  test_skcipher_vec_cfg+0x2b8/0x800
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-02"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54325/">CVE-2023-54325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54325">CVE-2023-54325 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255757">SUSE bug 1255757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54326</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54326" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54326" ref_url="https://www.suse.com/security/cve/CVE-2023-54326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: pci_endpoint_test: Free IRQs before removing the device

In pci_endpoint_test_remove(), freeing the IRQs after removing the device
creates a small race window for IRQs to be received with the test device
memory already released, causing the IRQ handler to access invalid memory,
resulting in an oops.

Free the device IRQs before removing the device to avoid this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54326/">CVE-2023-54326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54326">CVE-2023-54326 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255758">SUSE bug 1255758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11584</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11584" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11584" ref_url="https://www.suse.com/security/cve/CVE-2024-11584" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2026:20174-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/043804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:20192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/043824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041923.html" source="SUSE-SU"/>
    <description>
    cloud-init  through 25.1.2 includes the systemd socket unit  cloud-init-hotplugd.socket with default  SocketMode  that grants 0666 permissions, making it world-writable.  This is used for the "/run/cloud-init/hook-hotplug-cmd" FIFO. An unprivileged user could trigger  hotplug-hook commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11584/">CVE-2024-11584 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11584">CVE-2024-11584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245403">SUSE bug 1245403</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041352" comment="cloud-init-25.1.3-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041353" comment="cloud-init-config-suse-25.1.3-160000.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11831</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11831" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11831" ref_url="https://www.suse.com/security/cve/CVE-2024-11831" source="SUSE CVE"/>
    <description>
    A flaw was found in npm-serialize-javascript. The vulnerability occurs because the serialize-javascript module does not properly sanitize certain inputs, such as regex or other JavaScript object types, allowing an attacker to inject malicious code. This code could be executed when deserialized by a web browser, causing Cross-site scripting (XSS) attacks. This issue is critical in environments where serialized data is sent to web clients, potentially compromising the security of the website or web application using this package.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11831/">CVE-2024-11831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11831">CVE-2024-11831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236969">SUSE bug 1236969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009750396" comment="cockpit is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750397" comment="cockpit-bridge is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029139" comment="cockpit-firewalld is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029140" comment="cockpit-kdump is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750404" comment="cockpit-networkmanager is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750405" comment="cockpit-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750406" comment="cockpit-storaged is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750399" comment="cockpit-system is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750400" comment="cockpit-ws is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029142" comment="cockpit-ws-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750402" comment="cockpit-machines is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750401" comment="cockpit-podman is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750403" comment="cockpit-tukit is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202412224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-12224</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-12224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12224" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-12224" ref_url="https://www.suse.com/security/cve/CVE-2024-12224" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2025:02203-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/040996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02587-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/040995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/041988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20491-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20716-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20783-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3783-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3785-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025105.html" source="SUSE-SU"/>
    <description>
    Improper Validation of Unsafe Equivalence in punycode by the idna crate from Servo rust-url allows an attacker to create a punycode hostname that one part of a system might treat as distinct while another part of that system would treat as equivalent to another hostname.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12224/">CVE-2024-12224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12224">CVE-2024-12224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243848">SUSE bug 1243848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050018" comment="gdk-pixbuf-loader-rsvg-2.60.2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050019" comment="librsvg-2-2-2.60.2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855783" comment="netavark is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029144" comment="python313-maturin is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202413978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-13978</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-13978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13978" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-13978" ref_url="https://www.suse.com/security/cve/CVE-2024-13978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023396.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as problematic. Affected by this vulnerability is the function t2p_read_tiff_init of the file tools/tiff2pdf.c of the component fax2ps. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The patch is named 2ebfffb0e8836bfb1cd7d85c059cd285c59761a4. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-13978/">CVE-2024-13978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-13978">CVE-2024-13978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247581">SUSE bug 1247581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030535" comment="libtiff6-4.7.1-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21538</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21538" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21538" ref_url="https://www.suse.com/security/cve/CVE-2024-21538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3744-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042269.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORBQAMKYVB4ADL73JD3ZYOHHQFASC62K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQQALSUISVRK3E4P3ZK7VSK52SDURIOH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
    <description>
    Versions of the package cross-spawn before 6.0.6, from 7.0.0 and before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21538/">CVE-2024-21538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21538">CVE-2024-21538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233843">SUSE bug 1233843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009750396" comment="cockpit is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750397" comment="cockpit-bridge is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029139" comment="cockpit-firewalld is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029140" comment="cockpit-kdump is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750404" comment="cockpit-networkmanager is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750405" comment="cockpit-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750406" comment="cockpit-storaged is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750399" comment="cockpit-system is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750400" comment="cockpit-ws is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029142" comment="cockpit-ws-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750402" comment="cockpit-machines is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750401" comment="cockpit-podman is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750403" comment="cockpit-tukit is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2312</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2312" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2312" ref_url="https://www.suse.com/security/cve/CVE-2024-2312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024522.html" source="SUSE-SU"/>
    <description>
    GRUB2 does not call the module fini functions on exit, leading to Debian/Ubuntu's peimage GRUB2 module leaving UEFI system table hooks after exit. This lead to a use-after-free condition, and could possibly lead to secure boot bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2312/">CVE-2024-2312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2312">CVE-2024-2312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222868">SUSE bug 1222868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047568" comment="shim-16.1-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24853</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24853" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24853" ref_url="https://www.suse.com/security/cve/CVE-2024-24853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045211.html" source="SUSE-SU"/>
    <description>
    Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-24853/">CVE-2024-24853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24853">CVE-2024-24853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229129">SUSE bug 1229129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050021" comment="ucode-intel-20260210-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28180</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28180" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1987-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2754-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20550-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044567.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O3WPJO3GKMRSPM2EPUNFU5AXM6YFRQAN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
    <description>
    Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234984">SUSE bug 1234984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045695" comment="containerized-data-importer-manifests-1.64.0-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009343329" comment="podman is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958376" comment="podman-docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871694" comment="podman-remote is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958377" comment="podmansh is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32650</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32650" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32650" ref_url="https://www.suse.com/security/cve/CVE-2024-32650" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03629-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RLZMKRAPDN7C43S56JAGULAWF4RXGB2S/" source="SUSE-SU"/>
    <description>
    Rustls is a modern TLS library written in Rust. `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network input. When using a blocking rustls server, if a client send a `close_notify` message immediately after `client_hello`, the server's `complete_io` will get in an infinite loop. This vulnerability is fixed in 0.23.5, 0.22.4, and 0.21.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32650/">CVE-2024-32650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32650">CVE-2024-32650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223211">SUSE bug 1223211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029144" comment="python313-maturin is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4068</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4068" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4068" ref_url="https://www.suse.com/security/cve/CVE-2024-4068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
    <description>
    The NPM package `braces`, versions prior to 3.0.3, fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In `lib/parse.js,` if a malicious user sends "imbalanced braces" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4068/">CVE-2024-4068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4068">CVE-2024-4068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224256">SUSE bug 1224256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009750396" comment="cockpit is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750397" comment="cockpit-bridge is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029139" comment="cockpit-firewalld is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029140" comment="cockpit-kdump is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750404" comment="cockpit-networkmanager is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750405" comment="cockpit-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750406" comment="cockpit-storaged is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750399" comment="cockpit-system is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750400" comment="cockpit-ws is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029142" comment="cockpit-ws-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750402" comment="cockpit-machines is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750401" comment="cockpit-podman is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750403" comment="cockpit-tukit is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42084</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42084" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42084" ref_url="https://www.suse.com/security/cve/CVE-2024-42084" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ftruncate: pass a signed offset

The old ftruncate() syscall, using the 32-bit off_t misses a sign
extension when called in compat mode on 64-bit architectures.  As a
result, passing a negative length accidentally succeeds in truncating
to file size between 2GiB and 4GiB.

Changing the type of the compat syscall to the signed compat_off_t
changes the behavior so it instead returns -EINVAL.

The native entry point, the truncate() syscall and the corresponding
loff_t based variants are all correct already and do not suffer
from this mistake.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42084/">CVE-2024-42084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42084">CVE-2024-42084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228453">SUSE bug 1228453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42459</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42459" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42459" ref_url="https://www.suse.com/security/cve/CVE-2024-42459" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
    <description>
    In the Elliptic package 6.5.6 for Node.js, EDDSA signature malleability occurs because there is a missing signature length check, and thus zero-valued bytes can be removed or appended.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42459/">CVE-2024-42459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42459">CVE-2024-42459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232538">SUSE bug 1232538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009750396" comment="cockpit is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750397" comment="cockpit-bridge is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029139" comment="cockpit-firewalld is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029140" comment="cockpit-kdump is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750404" comment="cockpit-networkmanager is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750405" comment="cockpit-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750406" comment="cockpit-storaged is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750399" comment="cockpit-system is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750400" comment="cockpit-ws is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029142" comment="cockpit-ws-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750401" comment="cockpit-podman is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42460</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42460" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42460" ref_url="https://www.suse.com/security/cve/CVE-2024-42460" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
    <description>
    In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42460/">CVE-2024-42460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42460">CVE-2024-42460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232538">SUSE bug 1232538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009750396" comment="cockpit is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750397" comment="cockpit-bridge is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029139" comment="cockpit-firewalld is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029140" comment="cockpit-kdump is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750404" comment="cockpit-networkmanager is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750405" comment="cockpit-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750406" comment="cockpit-storaged is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750399" comment="cockpit-system is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750400" comment="cockpit-ws is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029142" comment="cockpit-ws-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750401" comment="cockpit-podman is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42461</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42461" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42461" ref_url="https://www.suse.com/security/cve/CVE-2024-42461" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
    <description>
    In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because BER-encoded signatures are allowed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42461/">CVE-2024-42461 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42461">CVE-2024-42461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232538">SUSE bug 1232538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009750396" comment="cockpit is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750397" comment="cockpit-bridge is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029139" comment="cockpit-firewalld is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029140" comment="cockpit-kdump is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750404" comment="cockpit-networkmanager is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750405" comment="cockpit-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750406" comment="cockpit-storaged is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750399" comment="cockpit-system is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750400" comment="cockpit-ws is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029142" comment="cockpit-ws-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750401" comment="cockpit-podman is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43806</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43806" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43806" ref_url="https://www.suse.com/security/cve/CVE-2024-43806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXPZZSAXTA6CTQAGWASRTKWJQ3DFB7GG/" source="SUSE-SU"/>
    <description>
    Rustix is a set of safe Rust bindings to POSIX-ish APIs. When using `rustix::fs::Dir` using the `linux_raw` backend, it's possible for the iterator to "get stuck" when an IO error is encountered. Combined with a memory over-allocation issue in `rustix::fs::Dir::read_more`, this can cause quick and unbounded memory explosion (gigabytes in a few seconds if used on a hot path) and eventually lead to an OOM crash of the application. The symptoms were initially discovered in https://github.com/imsnif/bandwhich/issues/284. That post has lots of details of our investigation. Full details can be read on the GHSA-c827-hfw6-qwvm repo advisory. If a program tries to access a directory with its file descriptor after the file has been unlinked (or any other action that leaves the `Dir` iterator in the stuck state), and the implementation does not break after seeing an error, it can cause a memory explosion. As an example, Linux's various virtual file systems (e.g. `/proc`, `/sys`) can contain directories that spontaneously pop in and out of existence. Attempting to iterate over them using `rustix::fs::Dir` directly or indirectly (e.g. with the `procfs` crate) can trigger this fault condition if the implementation decides to continue on errors. An attacker knowledgeable about the implementation details of a vulnerable target can therefore try to trigger this fault condition via any one or a combination of several available APIs. If successful, the application host will quickly run out of memory, after which the application will likely be terminated by an OOM killer, leading to denial of service. This issue has been addressed in release versions 0.35.15, 0.36.16, 0.37.25, and 0.38.19. Users are advised to upgrade. There are no known workarounds for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43806/">CVE-2024-43806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43806">CVE-2024-43806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229376">SUSE bug 1229376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050018" comment="gdk-pixbuf-loader-rsvg-2.60.2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050019" comment="librsvg-2-2-2.60.2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009742210" comment="afterburn is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009742211" comment="afterburn-dracut is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855783" comment="netavark is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029144" comment="python313-maturin is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45310</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45310" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45310" ref_url="https://www.suse.com/security/cve/CVE-2024-45310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02198-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02198-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20353-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024607.html" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between two containers and exploiting a race with `os.MkdirAll`. While this could be used to create empty files, existing files would not be truncated. An attacker must have the ability to start containers using some kind of custom volume configuration. Containers using user namespaces are still affected, but the scope of places an attacker can create inodes can be significantly reduced. Sufficiently strict LSM policies (SELinux/Apparmor) can also in principle block this attack -- we suspect the industry standard SELinux policy may restrict this attack's scope but the exact scope of protection hasn't been analysed. This is exploitable using runc directly as well as through Docker and Kubernetes. The issue is fixed in runc v1.1.14 and v1.2.0-rc3.

Some workarounds are available. Using user namespaces restricts this attack fairly significantly such that the attacker can only create inodes in directories that the remapped root user/group has write access to. Unless the root user is remapped to an actual
user on the host (such as with rootless containers that don't use `/etc/sub[ug]id`), this in practice means that an attacker would only be able to create inodes in world-writable directories. A strict enough SELinux or AppArmor policy could in principle also restrict the scope if a specific label is applied to the runc runtime, though neither the extent to which the standard existing policies block this attack nor what exact policies are needed to sufficiently restrict this attack have been thoroughly tested.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45310/">CVE-2024-45310 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45310">CVE-2024-45310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230092">SUSE bug 1230092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257413">SUSE bug 1257413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045701" comment="kubevirt-manifests-1.7.0-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045713" comment="kubevirt-virtctl-1.7.0-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45337</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45337" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02581-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1143-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14585-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3VJBDKTY25NRJXFRK6QZSRH6ZRBUV2UT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RFAKX3BHM5IEGVFZW5ORK472VJQ7GAKL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14592-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRFL3E5J4TDRJ22WLK6BNXDRPBVNWDKW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14593-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AAHWJCS7IRD2RDUFE5DZXZ6M6SOGWYEK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RQIXFLKNJXAP2G3IJXYD2WY62FHMR5IX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14599-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QTUY324RV3FFZBHVIWDHRCIOPJHIJIN4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KJENUST4DVKPMGTJHYGQFE57E55AQQDC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7MPKXR7TT2G72ERR2OMAC2SJ3BTV5F6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUNHR7ATZWEF5LQKUNEXKL22CUQAND3A/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKOLRH73CIQLMQ327IYGUHNSFKCU5MPI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14613-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72PNSQCBBGVVNI7VQE3WSCUAIHCZLRVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14633-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJK5RQOOJ3Q26ODJIGOXXYOYQDDEQ3UX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCLAZVPDAT5UFMI67YRTRQBKGNJYHBIS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14660-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LW4KB34TW645AUU7ROKPDCHUTXLGZZBG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZAWXH6WKGE2WACLTZWYMHTDCJMU3X6R/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIPGSRATX6BG2ZXWE7566EGQCKXLC4RV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14920-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OAFVZYRPJ63SNIOTJJCDPNRWHGLE355Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14969-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSLGKMFCTSANXEKOHC36CPS5WHI66Y6L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15013-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HL46ARER7ICEJBIK62L5XG52R6FHUFHU/" source="SUSE-SU"/>
    <description>
    Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that the key offered is in fact used to authenticate." Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B for which the attacker does not actually control the private key. Since this API is widely misused, as a partial mitigation golang.org/x/cry...@v0.31.0 enforces the property that, when successfully authenticating via public key, the last key passed to ServerConfig.PublicKeyCallback will be the key used to authenticate the connection. PublicKeyCallback will now be called multiple times with the same key, if necessary. Note that the client may still not control the last key passed to PublicKeyCallback if the connection is then authenticated with a different method, such as PasswordCallback, KeyboardInteractiveCallback, or NoClientAuth. Users should be using the Extensions field of the Permissions return value from the various authentication callbacks to record data associated with the authentication attempt instead of referencing external state. Once the connection is established the state corresponding to the successful authentication attempt can be retrieved via the ServerConn.Permissions field. Note that some third-party libraries misuse the Permissions type by sharing it across authentication attempts; users of third-party libraries should refer to the relevant projects for guidance.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234482">SUSE bug 1234482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334435" comment="docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953331" comment="docker-buildx is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958738" comment="docker-compose is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009343329" comment="podman is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958376" comment="podman-docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871694" comment="podman-remote is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958377" comment="podmansh is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659876" comment="skopeo is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45338</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45338" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02581-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20550-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044567.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14603-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GN5BTYONDVDULOG3YURKUJNL2YZ2LDHU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUNHR7ATZWEF5LQKUNEXKL22CUQAND3A/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKOLRH73CIQLMQ327IYGUHNSFKCU5MPI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14613-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72PNSQCBBGVVNI7VQE3WSCUAIHCZLRVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14634-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCY3UOSZNLMH6IOLEYWFNO3UOF3DLF3P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14639-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UHS4NHWGXZ2TKRE7FZUZI5JIQDOZ4E4E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCLAZVPDAT5UFMI67YRTRQBKGNJYHBIS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14666-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VI6PLACYTL73MKICQUXPS2F2JPQOB565/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14711-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VWAYQNBT67LBJHAMRBSUFHHLUR5XBJHE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZAWXH6WKGE2WACLTZWYMHTDCJMU3X6R/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14721-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5YFLTCQGRUOCTVDQZEWUHS7QKU3FNK4S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14725-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TQKDFR4QSFMEP533OXGQTCJ6QXWSSDKD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CZP3P5NBSLZINLGQH7DRQMDTIOVW4D3C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIPGSRATX6BG2ZXWE7566EGQCKXLC4RV/" source="SUSE-SU"/>
    <description>
    An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234794">SUSE bug 1234794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045695" comment="containerized-data-importer-manifests-1.64.0-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334435" comment="docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953331" comment="docker-buildx is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009343329" comment="podman is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958376" comment="podman-docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871694" comment="podman-remote is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958377" comment="podmansh is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45339</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45339" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45339" ref_url="https://www.suse.com/security/cve/CVE-2024-45339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02149-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041898.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLG6TDNP2NZPYXB6GPK2TQLL6BGQNAKY/" source="SUSE-SU"/>
    <description>
    When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45339/">CVE-2024-45339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45339">CVE-2024-45339 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236541">SUSE bug 1236541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009699742" comment="kubevirt-manifests is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009699743" comment="kubevirt-virtctl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202448948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-48948</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-48948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48948" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-48948" ref_url="https://www.suse.com/security/cve/CVE-2024-48948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3744-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042269.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14433-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H6T6CDEWWWFSFMQOVDGVJ3WQLF2J4E2J/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
    <description>
    The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48948/">CVE-2024-48948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48948">CVE-2024-48948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231681">SUSE bug 1231681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009750396" comment="cockpit is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750397" comment="cockpit-bridge is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029139" comment="cockpit-firewalld is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029140" comment="cockpit-kdump is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750404" comment="cockpit-networkmanager is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750405" comment="cockpit-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750406" comment="cockpit-storaged is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750399" comment="cockpit-system is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750400" comment="cockpit-ws is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029142" comment="cockpit-ws-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750401" comment="cockpit-podman is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202448949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-48949</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-48949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48949" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-48949" ref_url="https://www.suse.com/security/cve/CVE-2024-48949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3744-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042269.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14403-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M7BG5WQRKJLY2OVHOL5KXFLQGUMAI2OC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
    <description>
    The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js omits "sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()" validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48949/">CVE-2024-48949 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48949">CVE-2024-48949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231557">SUSE bug 1231557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009750396" comment="cockpit is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750397" comment="cockpit-bridge is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029139" comment="cockpit-firewalld is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029140" comment="cockpit-kdump is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750404" comment="cockpit-networkmanager is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750405" comment="cockpit-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750406" comment="cockpit-storaged is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750399" comment="cockpit-system is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750400" comment="cockpit-ws is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029142" comment="cockpit-ws-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750402" comment="cockpit-machines is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750401" comment="cockpit-podman is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52005</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52005" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52005" ref_url="https://www.suse.com/security/cve/CVE-2024-52005" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7409" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001298.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8414" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001582.html" source="SUSE-SU"/>
    <description>
    Git is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called "sideband channel". These messages will be prefixed with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information, or to mislead the user into executing untrusted scripts. As requested on the git-security mailing list, the patches are under discussion on the public mailing list. Users are advised to update as soon as possible. Users unable to upgrade should avoid recursive clones unless they are from trusted sources.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-52005/">CVE-2024-52005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52005">CVE-2024-52005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235975">SUSE bug 1235975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334118" comment="git is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336075" comment="git-core is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667224" comment="perl-Git is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52615</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52615" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52615" ref_url="https://www.suse.com/security/cve/CVE-2024-52615" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11402" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03331-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024497.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52615/">CVE-2024-52615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52615">CVE-2024-52615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233421">SUSE bug 1233421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037153" comment="avahi-0.8-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037160" comment="libavahi-client3-0.8-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037161" comment="libavahi-common3-0.8-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037162" comment="libavahi-core7-0.8-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53164</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53164" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53164" ref_url="https://www.suse.com/security/cve/CVE-2024-53164" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4050-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: fix ordering of qlen adjustment

Changes to sch-&gt;q.qlen around qdisc_tree_reduce_backlog() need to happen
_before_ a call to said function because otherwise it may fail to notify
parent qdiscs when the child is about to become empty.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53164/">CVE-2024-53164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234863">SUSE bug 1234863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246019">SUSE bug 1246019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040506" comment="kernel-livepatch-6_12_0-160000_5-default-5-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040513" comment="kernel-livepatch-6_12_0-160000_5-rt-4-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54031</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54031" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54031" ref_url="https://www.suse.com/security/cve/CVE-2024-54031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext

Access to genmask field in struct nft_set_ext results in unaligned
atomic read:

[   72.130109] Unable to handle kernel paging request at virtual address ffff0000c2bb708c
[   72.131036] Mem abort info:
[   72.131213]   ESR = 0x0000000096000021
[   72.131446]   EC = 0x25: DABT (current EL), IL = 32 bits
[   72.132209]   SET = 0, FnV = 0
[   72.133216]   EA = 0, S1PTW = 0
[   72.134080]   FSC = 0x21: alignment fault
[   72.135593] Data abort info:
[   72.137194]   ISV = 0, ISS = 0x00000021, ISS2 = 0x00000000
[   72.142351]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[   72.145989]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[   72.150115] swapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000237d27000
[   72.154893] [ffff0000c2bb708c] pgd=0000000000000000, p4d=180000023ffff403, pud=180000023f84b403, pmd=180000023f835403,
+pte=0068000102bb7707
[   72.163021] Internal error: Oops: 0000000096000021 [#1] SMP
[...]
[   72.170041] CPU: 7 UID: 0 PID: 54 Comm: kworker/7:0 Tainted: G            E      6.13.0-rc3+ #2
[   72.170509] Tainted: [E]=UNSIGNED_MODULE
[   72.170720] Hardware name: QEMU QEMU Virtual Machine, BIOS edk2-stable202302-for-qemu 03/01/2023
[   72.171192] Workqueue: events_power_efficient nft_rhash_gc [nf_tables]
[   72.171552] pstate: 21400005 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   72.171915] pc : nft_rhash_gc+0x200/0x2d8 [nf_tables]
[   72.172166] lr : nft_rhash_gc+0x128/0x2d8 [nf_tables]
[   72.172546] sp : ffff800081f2bce0
[   72.172724] x29: ffff800081f2bd40 x28: ffff0000c2bb708c x27: 0000000000000038
[   72.173078] x26: ffff0000c6780ef0 x25: ffff0000c643df00 x24: ffff0000c6778f78
[   72.173431] x23: 000000000000001a x22: ffff0000c4b1f000 x21: ffff0000c6780f78
[   72.173782] x20: ffff0000c2bb70dc x19: ffff0000c2bb7080 x18: 0000000000000000
[   72.174135] x17: ffff0000c0a4e1c0 x16: 0000000000003000 x15: 0000ac26d173b978
[   72.174485] x14: ffffffffffffffff x13: 0000000000000030 x12: ffff0000c6780ef0
[   72.174841] x11: 0000000000000000 x10: ffff800081f2bcf8 x9 : ffff0000c3000000
[   72.175193] x8 : 00000000000004be x7 : 0000000000000000 x6 : 0000000000000000
[   72.175544] x5 : 0000000000000040 x4 : ffff0000c3000010 x3 : 0000000000000000
[   72.175871] x2 : 0000000000003a98 x1 : ffff0000c2bb708c x0 : 0000000000000004
[   72.176207] Call trace:
[   72.176316]  nft_rhash_gc+0x200/0x2d8 [nf_tables] (P)
[   72.176653]  process_one_work+0x178/0x3d0
[   72.176831]  worker_thread+0x200/0x3f0
[   72.176995]  kthread+0xe8/0xf8
[   72.177130]  ret_from_fork+0x10/0x20
[   72.177289] Code: 54fff984 d503201f d2800080 91003261 (f820303f)
[   72.177557] ---[ end trace 0000000000000000 ]---

Align struct nft_set_ext to word size to address this and
documentation it.

pahole reports that this increases the size of elements for rhash and
pipapo in 8 bytes on x86_64.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54031/">CVE-2024-54031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54031">CVE-2024-54031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235905">SUSE bug 1235905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5535</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5535" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5535" ref_url="https://www.suse.com/security/cve/CVE-2024-5535" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7848" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9333" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000610.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3119-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021360.html" source="SUSE-SU"/>
    <description>
    Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an
empty supported client protocols buffer may cause a crash or memory contents to
be sent to the peer.

Impact summary: A buffer overread can have a range of potential consequences
such as unexpected application beahviour or a crash. In particular this issue
could result in up to 255 bytes of arbitrary private data from memory being sent
to the peer leading to a loss of confidentiality. However, only applications
that directly call the SSL_select_next_proto function with a 0 length list of
supported client protocols are affected by this issue. This would normally never
be a valid scenario and is typically not under attacker control but may occur by
accident in the case of a configuration or programming error in the calling
application.

The OpenSSL API function SSL_select_next_proto is typically used by TLS
applications that support ALPN (Application Layer Protocol Negotiation) or NPN
(Next Protocol Negotiation). NPN is older, was never standardised and
is deprecated in favour of ALPN. We believe that ALPN is significantly more
widely deployed than NPN. The SSL_select_next_proto function accepts a list of
protocols from the server and a list of protocols from the client and returns
the first protocol that appears in the server list that also appears in the
client list. In the case of no overlap between the two lists it returns the
first item in the client list. In either case it will signal whether an overlap
between the two lists was found. In the case where SSL_select_next_proto is
called with a zero length client list it fails to notice this condition and
returns the memory immediately following the client list pointer (and reports
that there was no overlap in the lists).

This function is typically called from a server side application callback for
ALPN or a client side application callback for NPN. In the case of ALPN the list
of protocols supplied by the client is guaranteed by libssl to never be zero in
length. The list of server protocols comes from the application and should never
normally be expected to be of zero length. In this case if the
SSL_select_next_proto function has been called as expected (with the list
supplied by the client passed in the client/client_len parameters), then the
application will not be vulnerable to this issue. If the application has
accidentally been configured with a zero length server list, and has
accidentally passed that zero length server list in the client/client_len
parameters, and has additionally failed to correctly handle a "no overlap"
response (which would normally result in a handshake failure in ALPN) then it
will be vulnerable to this problem.

In the case of NPN, the protocol permits the client to opportunistically select
a protocol when there is no overlap. OpenSSL returns the first client protocol
in the no overlap case in support of this. The list of client protocols comes
from the application and should never normally be expected to be of zero length.
However if the SSL_select_next_proto function is accidentally called with a
client_len of 0 then an invalid memory pointer will be returned instead. If the
application uses this output as the opportunistic protocol then the loss of
confidentiality will occur.

This issue has been assessed as Low severity because applications are most
likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not
widely used. It also requires an application configuration or programming error.
Finally, this issue would not typically be under attacker control making active
exploitation unlikely.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.

Due to the low severity of this issue we are not issuing new releases of
OpenSSL at this time. The fix will be included in the next releases when they
become available.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5535/">CVE-2024-5535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227138">SUSE bug 1227138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227147">SUSE bug 1227147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227233">SUSE bug 1227233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56738</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56738" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56738" ref_url="https://www.suse.com/security/cve/CVE-2024-56738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02813-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20654-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023588.html" source="SUSE-SU"/>
    <description>
    GNU GRUB (aka GRUB2) through 2.12 does not use a constant-time algorithm for grub_crypto_memcmp and thus allows side-channel attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-19"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56738/">CVE-2024-56738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56738">CVE-2024-56738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234959">SUSE bug 1234959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010034125" comment="grub2-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034126" comment="grub2-arm64-efi-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034131" comment="grub2-common-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034132" comment="grub2-i386-pc-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034135" comment="grub2-powerpc-ieee1275-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034138" comment="grub2-s390x-emu-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034141" comment="grub2-snapper-plugin-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034143" comment="grub2-x86_64-efi-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034147" comment="grub2-x86_64-xen-2.12-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57891</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57891" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57891" ref_url="https://www.suse.com/security/cve/CVE-2024-57891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched_ext: Fix invalid irq restore in scx_ops_bypass()

While adding outer irqsave/restore locking, 0e7ffff1b811 ("scx: Fix raciness
in scx_ops_bypass()") forgot to convert an inner rq_unlock_irqrestore() to
rq_unlock() which could re-enable IRQ prematurely leading to the following
warning:

  raw_local_irq_restore() called with IRQs enabled
  WARNING: CPU: 1 PID: 96 at kernel/locking/irqflag-debug.c:10 warn_bogus_irq_restore+0x30/0x40
  ...
  Sched_ext: create_dsq (enabling)
  pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  pc : warn_bogus_irq_restore+0x30/0x40
  lr : warn_bogus_irq_restore+0x30/0x40
  ...
  Call trace:
   warn_bogus_irq_restore+0x30/0x40 (P)
   warn_bogus_irq_restore+0x30/0x40 (L)
   scx_ops_bypass+0x224/0x3b8
   scx_ops_enable.isra.0+0x2c8/0xaa8
   bpf_scx_reg+0x18/0x30
  ...
  irq event stamp: 33739
  hardirqs last  enabled at (33739): [&lt;ffff8000800b699c&gt;] scx_ops_bypass+0x174/0x3b8
  hardirqs last disabled at (33738): [&lt;ffff800080d48ad4&gt;] _raw_spin_lock_irqsave+0xb4/0xd8

Drop the stray _irqrestore().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57891/">CVE-2024-57891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57891">CVE-2024-57891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235953">SUSE bug 1235953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57951</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57951" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57951" ref_url="https://www.suse.com/security/cve/CVE-2024-57951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hrtimers: Handle CPU state correctly on hotplug

Consider a scenario where a CPU transitions from CPUHP_ONLINE to halfway
through a CPU hotunplug down to CPUHP_HRTIMERS_PREPARE, and then back to
CPUHP_ONLINE:

Since hrtimers_prepare_cpu() does not run, cpu_base.hres_active remains set
to 1 throughout. However, during a CPU unplug operation, the tick and the
clockevents are shut down at CPUHP_AP_TICK_DYING. On return to the online
state, for instance CFS incorrectly assumes that the hrtick is already
active, and the chance of the clockevent device to transition to oneshot
mode is also lost forever for the CPU, unless it goes back to a lower state
than CPUHP_HRTIMERS_PREPARE once.

This round-trip reveals another issue; cpu_base.online is not set to 1
after the transition, which appears as a WARN_ON_ONCE in enqueue_hrtimer().

Aside of that, the bulk of the per CPU state is not reset either, which
means there are dangling pointers in the worst case.

Address this by adding a corresponding startup() callback, which resets the
stale per CPU state and sets the online flag.

[ tglx: Make the new callback unconditionally available, remove the online
  	modification in the prepare() callback and clear the remaining
  	state in the starting callback instead of the prepare callback ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57951/">CVE-2024-57951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57951">CVE-2024-57951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237108">SUSE bug 1237108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57952</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57952" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57952" ref_url="https://www.suse.com/security/cve/CVE-2024-57952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "libfs: fix infinite directory reads for offset dir"

The current directory offset allocator (based on mtree_alloc_cyclic)
stores the next offset value to return in octx-&gt;next_offset. This
mechanism typically returns values that increase monotonically over
time. Eventually, though, the newly allocated offset value wraps
back to a low number (say, 2) which is smaller than other already-
allocated offset values.

Yu Kuai &lt;yukuai3@huawei.com&gt; reports that, after commit 64a7ce76fb90
("libfs: fix infinite directory reads for offset dir"), if a
directory's offset allocator wraps, existing entries are no longer
visible via readdir/getdents because offset_readdir() stops listing
entries once an entry's offset is larger than octx-&gt;next_offset.
These entries vanish persistently -- they can be looked up, but will
never again appear in readdir(3) output.

The reason for this is that the commit treats directory offsets as
monotonically increasing integer values rather than opaque cookies,
and introduces this comparison:

	if (dentry2offset(dentry) &gt;= last_index) {

On 64-bit platforms, the directory offset value upper bound is
2^63 - 1. Directory offsets will monotonically increase for millions
of years without wrapping.

On 32-bit platforms, however, LONG_MAX is 2^31 - 1. The allocator
can wrap after only a few weeks (at worst).

Revert commit 64a7ce76fb90 ("libfs: fix infinite directory reads for
offset dir") to prepare for a fix that can work properly on 32-bit
systems and might apply to recent LTS kernels where shmem employs
the simple_offset mechanism.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57952/">CVE-2024-57952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57952">CVE-2024-57952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237131">SUSE bug 1237131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58090</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58090" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58090" ref_url="https://www.suse.com/security/cve/CVE-2024-58090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/core: Prevent rescheduling when interrupts are disabled

David reported a warning observed while loop testing kexec jump:

  Interrupts enabled after irqrouter_resume+0x0/0x50
  WARNING: CPU: 0 PID: 560 at drivers/base/syscore.c:103 syscore_resume+0x18a/0x220
   kernel_kexec+0xf6/0x180
   __do_sys_reboot+0x206/0x250
   do_syscall_64+0x95/0x180

The corresponding interrupt flag trace:

  hardirqs last  enabled at (15573): [&lt;ffffffffa8281b8e&gt;] __up_console_sem+0x7e/0x90
  hardirqs last disabled at (15580): [&lt;ffffffffa8281b73&gt;] __up_console_sem+0x63/0x90

That means __up_console_sem() was invoked with interrupts enabled. Further
instrumentation revealed that in the interrupt disabled section of kexec
jump one of the syscore_suspend() callbacks woke up a task, which set the
NEED_RESCHED flag. A later callback in the resume path invoked
cond_resched() which in turn led to the invocation of the scheduler:

  __cond_resched+0x21/0x60
  down_timeout+0x18/0x60
  acpi_os_wait_semaphore+0x4c/0x80
  acpi_ut_acquire_mutex+0x3d/0x100
  acpi_ns_get_node+0x27/0x60
  acpi_ns_evaluate+0x1cb/0x2d0
  acpi_rs_set_srs_method_data+0x156/0x190
  acpi_pci_link_set+0x11c/0x290
  irqrouter_resume+0x54/0x60
  syscore_resume+0x6a/0x200
  kernel_kexec+0x145/0x1c0
  __do_sys_reboot+0xeb/0x240
  do_syscall_64+0x95/0x180

This is a long standing problem, which probably got more visible with
the recent printk changes. Something does a task wakeup and the
scheduler sets the NEED_RESCHED flag. cond_resched() sees it set and
invokes schedule() from a completely bogus context. The scheduler
enables interrupts after context switching, which causes the above
warning at the end.

Quite some of the code paths in syscore_suspend()/resume() can result in
triggering a wakeup with the exactly same consequences. They might not
have done so yet, but as they share a lot of code with normal operations
it's just a question of time.

The problem only affects the PREEMPT_NONE and PREEMPT_VOLUNTARY scheduling
models. Full preemption is not affected as cond_resched() is disabled and
the preemption check preemptible() takes the interrupt disabled flag into
account.

Cure the problem by adding a corresponding check into cond_resched().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58090/">CVE-2024-58090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58090">CVE-2024-58090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240324">SUSE bug 1240324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58241</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58241" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58241" ref_url="https://www.suse.com/security/cve/CVE-2024-58241" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_core: Disable works on hci_unregister_dev

This make use of disable_work_* on hci_unregister_dev since the hci_dev is
about to be freed new submissions are not disarable.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58241/">CVE-2024-58241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58241">CVE-2024-58241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249694">SUSE bug 1249694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58266</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58266" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58266" ref_url="https://www.suse.com/security/cve/CVE-2024-58266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042320.html" source="SUSE-SU"/>
    <description>
    The shlex crate before 1.2.1 for Rust allows unquoted and unescaped instances of the { and \xa0 characters, which may facilitate command injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58266/">CVE-2024-58266 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58266">CVE-2024-58266 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247186">SUSE bug 1247186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009855782" comment="aardvark-dns is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009742210" comment="afterburn is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009742211" comment="afterburn-dracut is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009337725" comment="gdk-pixbuf-loader-rsvg is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009337726" comment="librsvg-2-2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855783" comment="netavark is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016082" comment="nm-configurator is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029188" comment="python313-cryptography is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029144" comment="python313-maturin is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029192" comment="python313-rpds-py is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855784" comment="libekmfweb1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855803" comment="libkmipclient1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855787" comment="s390-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859140" comment="s390-tools-genprotimg-data is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855810" comment="sevctl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010820" comment="thin-provisioning-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010821" comment="zram-generator is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6174</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6174" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6174" ref_url="https://www.suse.com/security/cve/CVE-2024-6174" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10848" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001788.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11324" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:20174-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/043804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:20192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/043824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041923.html" source="SUSE-SU"/>
    <description>
    When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local IP address. To prevent this,  cloud-init default configurations disable platform enumeration.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6174/">CVE-2024-6174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6174">CVE-2024-6174 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245401">SUSE bug 1245401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041352" comment="cloud-init-25.1.3-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041353" comment="cloud-init-config-suse-25.1.3-160000.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6505</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6505" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6505" ref_url="https://www.suse.com/security/cve/CVE-2024-6505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023707.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the virtio-net device in QEMU. When enabling the RSS feature on the virtio-net network card, the indirections_table data within RSS becomes controllable. Setting excessively large values may cause an index out-of-bounds issue, potentially resulting in heap overflow access. This flaw allows a privileged user in the guest to crash the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-6505/">CVE-2024-6505 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6505">CVE-2024-6505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227397">SUSE bug 1227397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673318" comment="qemu-SLOF is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654021" comment="qemu-audio-spice is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335211" comment="qemu-block-iscsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335212" comment="qemu-block-ssh is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654023" comment="qemu-chardev-spice is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335213" comment="qemu-guest-agent is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654024" comment="qemu-hw-display-qxl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654025" comment="qemu-hw-display-virtio-gpu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654026" comment="qemu-hw-display-virtio-gpu-pci is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654027" comment="qemu-hw-display-virtio-vga is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654028" comment="qemu-hw-s390x-virtio-gpu-ccw is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009683071" comment="qemu-hw-usb-host is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654029" comment="qemu-hw-usb-redirect is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859131" comment="qemu-img is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654030" comment="qemu-ksm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335215" comment="qemu-lang is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335216" comment="qemu-ppc is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859132" comment="qemu-pr-helper is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654031" comment="qemu-s390x is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654033" comment="qemu-ui-opengl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654034" comment="qemu-ui-spice-core is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986058" comment="qemu-vmsr-helper is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0306</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0306" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0306" ref_url="https://www.suse.com/security/cve/CVE-2025-0306" source="SUSE CVE"/>
    <description>
    A vulnerability was found in Ruby. The Ruby interpreter is vulnerable to the Marvin Attack. This attack allows the attacker to decrypt previously encrypted messages or forge signatures by exchanging a large number of messages with the vulnerable service.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0306/">CVE-2025-0306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0306">CVE-2025-0306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235620">SUSE bug 1235620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0395</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0395" ref_url="https://www.suse.com/security/cve/CVE-2025-0395" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3828" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001036.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4244" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024576.html" source="SUSE-SU"/>
    <description>
    When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0395/">CVE-2025-0395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0395">CVE-2025-0395 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236282">SUSE bug 1236282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041425" comment="glibc-2.40-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041426" comment="glibc-devel-2.40-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041667" comment="glibc-gconv-modules-extra-2.40-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041434" comment="glibc-locale-2.40-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041435" comment="glibc-locale-base-2.40-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0840</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0840" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0840" ref_url="https://www.suse.com/security/cve/CVE-2025-0840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0840/">CVE-2025-0840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0840">CVE-2025-0840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236632">SUSE bug 1236632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10148</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10148" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10148" ref_url="https://www.suse.com/security/cve/CVE-2025-10148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03198-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03267-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023512.html" source="SUSE-SU"/>
    <description>
    curl's websocket code did not update the 32 bit mask pattern for each new
 outgoing frame as the specification says. Instead it used a fixed mask that
persisted and was used throughout the entire connection.

A predictable mask pattern allows for a malicious server to induce traffic
between the two communicating parties that could be interpreted by an involved
proxy (configured or transparent) as genuine, real, HTTP traffic with content
and thereby poison its cache. That cached poisoned content could then be
served to all users of that proxy.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10148/">CVE-2025-10148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10148">CVE-2025-10148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249348">SUSE bug 1249348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031702" comment="curl-8.14.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031707" comment="libcurl4-8.14.1-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10230</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10230" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10230" ref_url="https://www.suse.com/security/cve/CVE-2025-10230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03603-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03604-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03618-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042218.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller's wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-29"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-10230/">CVE-2025-10230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10230">CVE-2025-10230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251280">SUSE bug 1251280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010030512" comment="libldb2-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030519" comment="samba-client-libs-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10911</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10911" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10911" ref_url="https://www.suse.com/security/cve/CVE-2025-10911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03491-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03595-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024731.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in libxslt while parsing xsl nodes that may lead to the dereference of expired pointers and application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10911/">CVE-2025-10911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10911">CVE-2025-10911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250553">SUSE bug 1250553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010047326" comment="libexslt0-1.1.43-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047327" comment="libxml2-2-2.13.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047330" comment="libxml2-tools-2.13.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047333" comment="libxslt1-1.1.43-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047334" comment="python313-libxml2-2.13.8-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11021</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11021" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11021" ref_url="https://www.suse.com/security/cve/CVE-2025-11021" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19713" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19714" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002204.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20959" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024074.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the cookie date handling logic of the libsoup HTTP library, widely used by GNOME and other applications for web communication. When processing cookies with specially crafted expiration dates, the library may perform an out-of-bounds memory read. This flaw could result in unintended disclosure of memory contents, potentially exposing sensitive information from the process using libsoup.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11021/">CVE-2025-11021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11021">CVE-2025-11021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250562">SUSE bug 1250562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041474" comment="libsoup-3_0-0-3.6.5-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11083</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11083" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11083" ref_url="https://www.suse.com/security/cve/CVE-2025-11083" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23336" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003145.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23343" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003144.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23382" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002321.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23400" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002336.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0052" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003180.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0341" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002412.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0342" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002417.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1359" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003197.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2627" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with "[f]ixed for 2.46".
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11083/">CVE-2025-11083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11083">CVE-2025-11083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250632">SUSE bug 1250632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11187</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11187" ref_url="https://www.suse.com/security/cve/CVE-2025-11187" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024609.html" source="SUSE-SU"/>
    <description>
    Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation
which can trigger a stack-based buffer overflow, invalid pointer or NULL
pointer dereference during MAC verification.

Impact summary: The stack buffer overflow or NULL pointer dereference may
cause a crash leading to Denial of Service for an application that parses
untrusted PKCS#12 files. The buffer overflow may also potentially enable
code execution depending on platform mitigations.

When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2
salt and keylength parameters from the file are used without validation.
If the value of keylength exceeds the size of the fixed stack buffer used
for the derived key (64 bytes), the key derivation will overflow the buffer.
The overflow length is attacker-controlled. Also, if the salt parameter is
not an OCTET STRING type this can lead to invalid or NULL pointer
dereference.

Exploiting this issue requires a user or application to process
a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted
PKCS#12 files in applications as they are usually used to store private
keys which are trusted by definition. For this reason the issue was assessed
as Moderate severity.

The FIPS modules in 3.6, 3.5 and 3.4 are not affected by this issue, as
PKCS#12 processing is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5 and 3.4 are vulnerable to this issue.

OpenSSL 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue as they do
not support PBMAC1 in PKCS#12.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11187/">CVE-2025-11187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11187">CVE-2025-11187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256829">SUSE bug 1256829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256878">SUSE bug 1256878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047375" comment="openssl-3-livepatches-0.3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11230</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11230" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11230" ref_url="https://www.suse.com/security/cve/CVE-2025-11230" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21693" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003126.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03587-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03589-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023879.html" source="SUSE-SU"/>
    <description>
    Inefficient algorithm complexity in mjson in HAProxy allows remote attackers to cause a denial of service via specially crafted JSON requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11230/">CVE-2025-11230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11230">CVE-2025-11230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250983">SUSE bug 1250983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037726" comment="haproxy-3.2.0+git0.e134140d2-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11234</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11234" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11234" ref_url="https://www.suse.com/security/cve/CVE-2025-11234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023769.html" source="SUSE-SU"/>
    <description>
    A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client with network access to the VNC WebSocket port to cause a denial of service during the WebSocket handshake prior to the VNC client authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-23"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11234/">CVE-2025-11234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11234">CVE-2025-11234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250984">SUSE bug 1250984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010034877" comment="qemu-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034878" comment="qemu-SLOF-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034879" comment="qemu-arm-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034880" comment="qemu-audio-spice-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034881" comment="qemu-block-iscsi-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034882" comment="qemu-block-ssh-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034883" comment="qemu-chardev-spice-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034884" comment="qemu-guest-agent-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034885" comment="qemu-hw-display-qxl-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034886" comment="qemu-hw-display-virtio-gpu-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034887" comment="qemu-hw-display-virtio-gpu-pci-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034888" comment="qemu-hw-display-virtio-vga-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034889" comment="qemu-hw-s390x-virtio-gpu-ccw-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034890" comment="qemu-hw-usb-host-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034891" comment="qemu-hw-usb-redirect-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034892" comment="qemu-img-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034893" comment="qemu-ipxe-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034894" comment="qemu-ksm-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034895" comment="qemu-lang-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034896" comment="qemu-ppc-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034897" comment="qemu-pr-helper-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034898" comment="qemu-s390x-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034899" comment="qemu-seabios-10.0.71.16.3_3_g3d33c746-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034900" comment="qemu-tools-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034901" comment="qemu-ui-opengl-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034902" comment="qemu-ui-spice-core-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034903" comment="qemu-vgabios-10.0.71.16.3_3_g3d33c746-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034904" comment="qemu-vmsr-helper-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034905" comment="qemu-x86-10.0.7-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11411</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11411" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11411" ref_url="https://www.suse.com/security/cve/CVE-2025-11411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21050-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024018.html" source="SUSE-SU"/>
    <description>
    NLnet Labs Unbound up to and including version 1.24.1 is vulnerable to possible domain hijack attacks. Promiscuous NS RRSets that complement positive DNS replies in the authority section can be used to trick resolvers to update their delegation information for the zone. Usually these RRSets are used to update the resolver's knowledge of the zone's name servers. A malicious actor can exploit the possible poisonous effect by injecting NS RRSets (and possibly their respective address records) in a reply. This could be done for example by trying to spoof a packet or fragmentation attacks. Unbound would then proceed to update the NS RRSet data it already has since the new data has enough trust for it, i.e., in-zone data for the delegation point. Unbound 1.24.1 includes a fix that scrubs unsolicited NS RRSets (and their respective address records) from replies mitigating the possible poison effect. Unbound 1.24.2 includes an additional fix that scrubs unsolicited NS RRSets (and their respective address records) from YXDOMAIN and non-referral nodata replies, further mitigating the possible poison effect.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L" cvss4="7.1/CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:L" href="https://www.suse.com/security/cve/CVE-2025-11411/">CVE-2025-11411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11411">CVE-2025-11411 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252525">SUSE bug 1252525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041456" comment="libunbound8-1.24.1-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041459" comment="unbound-anchor-1.24.1-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11412</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11412" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11412" ref_url="https://www.suse.com/security/cve/CVE-2025-11412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in GNU Binutils 2.45. This impacts the function bfd_elf_gc_record_vtentry of the file bfd/elflink.c of the component Linker. The manipulation leads to out-of-bounds read. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of the patch is 047435dd988a3975d40c6626a8f739a0b2e154bc. To fix this issue, it is recommended to deploy a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11412/">CVE-2025-11412 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11412">CVE-2025-11412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251275">SUSE bug 1251275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11413</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11413" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11413" ref_url="https://www.suse.com/security/cve/CVE-2025-11413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.45. Affected is the function elf_link_add_object_symbols of the file bfd/elflink.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. Upgrading to version 2.46 is able to address this issue. The patch is identified as 72efdf166aa0ed72ecc69fc2349af6591a7a19c0. Upgrading the affected component is advised.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11413/">CVE-2025-11413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11413">CVE-2025-11413 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251276">SUSE bug 1251276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11414</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11414" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11414" ref_url="https://www.suse.com/security/cve/CVE-2025-11414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was determined in GNU Binutils 2.45. Affected by this vulnerability is the function get_link_hash_entry of the file bfd/elflink.c of the component Linker. This manipulation causes out-of-bounds read. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.46 addresses this issue. Patch name: aeaaa9af6359c8e394ce9cf24911fec4f4d23703. It is advisable to upgrade the affected component.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11414/">CVE-2025-11414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11414">CVE-2025-11414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251277">SUSE bug 1251277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11468</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11468" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11468" ref_url="https://www.suse.com/security/cve/CVE-2025-11468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
    <description>
    When folding a long comment in an email header containing exclusively unfoldable characters, the parenthesis would not be preserved. This could be used for injecting headers into email messages where addresses are user-controlled and not sanitized.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11468/">CVE-2025-11468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11468">CVE-2025-11468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257029">SUSE bug 1257029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010044584" comment="libpython3_13-1_0-3.13.12-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044587" comment="python313-3.13.12-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044588" comment="python313-base-3.13.12-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044590" comment="python313-curses-3.13.12-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1147</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1147" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1147" ref_url="https://www.suse.com/security/cve/CVE-2025-1147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in GNU Binutils 2.43 and classified as problematic. Affected by this vulnerability is the function __sanitizer::internal_strlen of the file binutils/nm.c of the component nm. The manipulation of the argument const leads to buffer overflow. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1147/">CVE-2025-1147 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1147">CVE-2025-1147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236976">SUSE bug 1236976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1148</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1148" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1148" ref_url="https://www.suse.com/security/cve/CVE-2025-1148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.43 and classified as problematic. Affected by this issue is the function link_order_scan of the file ld/ldelfgen.c of the component ld. The manipulation leads to memory leak. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1148/">CVE-2025-1148 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1148">CVE-2025-1148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236978">SUSE bug 1236978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1149</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1149" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1149" ref_url="https://www.suse.com/security/cve/CVE-2025-1149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.43. It has been classified as problematic. This affects the function xstrdup of the file libiberty/xmalloc.c of the component ld. The manipulation leads to memory leak. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1149/">CVE-2025-1149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1149">CVE-2025-1149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236977">SUSE bug 1236977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11494</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11494" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11494" ref_url="https://www.suse.com/security/cve/CVE-2025-11494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.45. Impacted is the function _bfd_x86_elf_late_size_sections of the file bfd/elfxx-x86.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. The patch is identified as b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a. A patch should be applied to remediate this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11494/">CVE-2025-11494 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11494">CVE-2025-11494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251794">SUSE bug 1251794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11495</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11495" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11495" ref_url="https://www.suse.com/security/cve/CVE-2025-11495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was determined in GNU Binutils 2.45. The affected element is the function elf_x86_64_relocate_section of the file elf64-x86-64.c of the component Linker. This manipulation causes heap-based buffer overflow. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Patch name: 6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0. To fix this issue, it is recommended to deploy a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11495/">CVE-2025-11495 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11495">CVE-2025-11495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251795">SUSE bug 1251795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1150</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1150" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1150" ref_url="https://www.suse.com/security/cve/CVE-2025-1150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.43. It has been declared as problematic. This vulnerability affects the function bfd_malloc of the file libbfd.c of the component ld. The manipulation leads to memory leak. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1150/">CVE-2025-1150 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1150">CVE-2025-1150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237005">SUSE bug 1237005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1151</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1151" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1151" ref_url="https://www.suse.com/security/cve/CVE-2025-1151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.43. It has been rated as problematic. This issue affects the function xmemdup of the file xmemdup.c of the component ld. The manipulation leads to memory leak. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1151/">CVE-2025-1151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1151">CVE-2025-1151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237003">SUSE bug 1237003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1152</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1152" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1152" ref_url="https://www.suse.com/security/cve/CVE-2025-1152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as problematic has been found in GNU Binutils 2.43. Affected is the function xstrdup of the file xstrdup.c of the component ld. The manipulation leads to memory leak. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1152/">CVE-2025-1152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1152">CVE-2025-1152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237001">SUSE bug 1237001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1153</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1153" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1153" ref_url="https://www.suse.com/security/cve/CVE-2025-1153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as problematic was found in GNU Binutils 2.43/2.44. Affected by this vulnerability is the function bfd_set_format of the file format.c. The manipulation leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 2.45 is able to address this issue. The identifier of the patch is 8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150. It is recommended to upgrade the affected component.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1153/">CVE-2025-1153 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1153">CVE-2025-1153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237000">SUSE bug 1237000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11561</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11561" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11561" ref_url="https://www.suse.com/security/cve/CVE-2025-11561" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19610" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002175.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002540.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20954" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003082.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21067" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023724.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems. In default configurations, the Kerberos local authentication plugin (sssd_krb5_localauth_plugin) is enabled, but a fallback to the an2ln plugin is possible. This fallback allows an attacker with permission to modify certain AD attributes (such as userPrincipalName or samAccountName) to impersonate privileged users, potentially resulting in unauthorized access or privilege escalation on domain-joined Linux hosts.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11561/">CVE-2025-11561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11561">CVE-2025-11561 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251827">SUSE bug 1251827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035633" comment="libsss_certmap0-2.9.5-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035635" comment="libsss_idmap0-2.9.5-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035641" comment="python3-sssd-config-2.9.5-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035642" comment="sssd-2.9.5-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035643" comment="sssd-ad-2.9.5-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035645" comment="sssd-dbus-2.9.5-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035648" comment="sssd-krb5-2.9.5-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035649" comment="sssd-krb5-common-2.9.5-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035650" comment="sssd-ldap-2.9.5-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035652" comment="sssd-tools-2.9.5-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11563</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11563" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11563" ref_url="https://www.suse.com/security/cve/CVE-2025-11563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023437.html" source="SUSE-SU"/>
    <description>
    URLs containing percent-encoded slashes (`/` or `\`) can trick wcurl into
saving the output file outside of the current directory without the user
explicitly asking for it.

This flaw only affects the wcurl command line tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11563/">CVE-2025-11563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11563">CVE-2025-11563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253757">SUSE bug 1253757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031702" comment="curl-8.14.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031707" comment="libcurl4-8.14.1-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11731</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11731" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11731" ref_url="https://www.suse.com/security/cve/CVE-2025-11731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3743-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024373.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the exsltFuncResultComp() function of libxslt, which handles EXSLT &lt;func:result&gt; elements during stylesheet parsing. Due to improper type handling, the function may treat an XML document node as a regular XML element node, resulting in a type confusion. This can cause unexpected memory reads and potential crashes. While difficult to exploit, the flaw could lead to application instability or denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11731/">CVE-2025-11731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11731">CVE-2025-11731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251979">SUSE bug 1251979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010030538" comment="libexslt0-1.1.43-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030541" comment="libxslt1-1.1.43-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1176</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1176" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1176" ref_url="https://www.suse.com/security/cve/CVE-2025-1176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.43 and classified as critical. This issue affects the function _bfd_elf_gc_mark_rsec of the file elflink.c of the component ld. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The patch is named f9978defb6fab0bd8583942d97c112b0932ac814. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1176/">CVE-2025-1176 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1176">CVE-2025-1176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236999">SUSE bug 1236999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1178</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1178" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1178" ref_url="https://www.suse.com/security/cve/CVE-2025-1178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.43. It has been declared as problematic. Affected by this vulnerability is the function bfd_putl64 of the file libbfd.c of the component ld. The manipulation leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 75086e9de1707281172cc77f178e7949a4414ed0. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1178/">CVE-2025-1178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1178">CVE-2025-1178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237018">SUSE bug 1237018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1179</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1179" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1179" ref_url="https://www.suse.com/security/cve/CVE-2025-1179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.43. It has been rated as critical. Affected by this issue is the function bfd_putl64 of the file bfd/libbfd.c of the component ld. The manipulation leads to memory corruption. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. It is recommended to upgrade the affected component. The code maintainer explains, that "[t]his bug has been fixed at some point between the 2.43 and 2.44 releases".
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1179/">CVE-2025-1179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1179">CVE-2025-1179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237021">SUSE bug 1237021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1180</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1180" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1180" ref_url="https://www.suse.com/security/cve/CVE-2025-1180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as problematic has been found in GNU Binutils 2.43. This affects the function _bfd_elf_write_section_eh_frame of the file bfd/elf-eh-frame.c of the component ld. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1180/">CVE-2025-1180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1180">CVE-2025-1180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237020">SUSE bug 1237020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1181</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1181" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1181" ref_url="https://www.suse.com/security/cve/CVE-2025-1181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as critical was found in GNU Binutils 2.43. This vulnerability affects the function _bfd_elf_gc_mark_rsec of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 931494c9a89558acb36a03a340c01726545eef24. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1181/">CVE-2025-1181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1181">CVE-2025-1181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237019">SUSE bug 1237019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1182</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1182" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1182" ref_url="https://www.suse.com/security/cve/CVE-2025-1182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as critical, was found in GNU Binutils 2.43. Affected is the function bfd_elf_reloc_symbol_deleted_p of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The patch is identified as b425859021d17adf62f06fb904797cf8642986ad. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1182/">CVE-2025-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1182">CVE-2025-1182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237042">SUSE bug 1237042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11961</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11961" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11961" ref_url="https://www.suse.com/security/cve/CVE-2025-11961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023949.html" source="SUSE-SU"/>
    <description>
    pcap_ether_aton() is an auxiliary function in libpcap, it takes a string argument and returns a fixed-size allocated buffer.  The string argument must be a well-formed MAC-48 address in one of the supported formats, but this requirement has been poorly documented.  If an application calls the function with an argument that deviates from the expected format, the function can read data beyond the end of the provided string and write data beyond the end of the allocated buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11961/">CVE-2025-11961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11961">CVE-2025-11961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255765">SUSE bug 1255765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039640" comment="libpcap1-1.10.5-160000.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12084</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12084" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0022" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002438.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002346.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1374" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002442.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1408" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003158.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1410" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003202.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1478" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003215.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1583" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002451.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1631" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002456.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2275" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002482.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2713" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
    <description>
    When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254997">SUSE bug 1254997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039656" comment="libpython3_13-1_0-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039659" comment="python313-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039660" comment="python313-base-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039662" comment="python313-curses-3.13.11-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12105</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12105" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12105" ref_url="https://www.suse.com/security/cve/CVE-2025-12105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the asynchronous message queue handling of the libsoup library, widely used by GNOME and WebKit-based applications to manage HTTP/2 communications. When network operations are aborted at specific timing intervals, an internal message queue item may be freed twice due to missing state synchronization. This leads to a use-after-free memory access, potentially crashing the affected application. Attackers could exploit this behavior remotely by triggering specific HTTP/2 read and cancel sequences, resulting in a denial-of-service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12105/">CVE-2025-12105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12105">CVE-2025-12105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252555">SUSE bug 1252555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12464</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12464" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12464" ref_url="https://www.suse.com/security/cve/CVE-2025-12464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023769.html" source="SUSE-SU"/>
    <description>
    A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding short frames was dropped from individual network devices and moved to the net core code. The issue stems from the device's receive code still being able to process a short frame in loopback mode. This could lead to a buffer overrun in the e1000_receive_iov() function via the loopback code path. A malicious guest user could use this vulnerability to crash the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-23"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12464/">CVE-2025-12464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12464">CVE-2025-12464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253002">SUSE bug 1253002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010034877" comment="qemu-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034878" comment="qemu-SLOF-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034879" comment="qemu-arm-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034880" comment="qemu-audio-spice-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034881" comment="qemu-block-iscsi-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034882" comment="qemu-block-ssh-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034883" comment="qemu-chardev-spice-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034884" comment="qemu-guest-agent-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034885" comment="qemu-hw-display-qxl-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034886" comment="qemu-hw-display-virtio-gpu-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034887" comment="qemu-hw-display-virtio-gpu-pci-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034888" comment="qemu-hw-display-virtio-vga-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034889" comment="qemu-hw-s390x-virtio-gpu-ccw-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034890" comment="qemu-hw-usb-host-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034891" comment="qemu-hw-usb-redirect-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034892" comment="qemu-img-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034893" comment="qemu-ipxe-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034894" comment="qemu-ksm-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034895" comment="qemu-lang-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034896" comment="qemu-ppc-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034897" comment="qemu-pr-helper-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034898" comment="qemu-s390x-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034899" comment="qemu-seabios-10.0.71.16.3_3_g3d33c746-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034900" comment="qemu-tools-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034901" comment="qemu-ui-opengl-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034902" comment="qemu-ui-spice-core-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034903" comment="qemu-vgabios-10.0.71.16.3_3_g3d33c746-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034904" comment="qemu-vmsr-helper-10.0.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034905" comment="qemu-x86-10.0.7-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12748</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12748" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12748" ref_url="https://www.suse.com/security/cve/CVE-2025-12748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023758.html" source="SUSE-SU"/>
    <description>
    A flaw was discovered in libvirt in the XML file processing. More specifically, the parsing of user provided XML files was performed before the ACL checks. A malicious user with limited permissions could exploit this flaw by submitting a specially crafted XML file, causing libvirt to allocate too much memory on the host. The excessive memory consumption could lead to a libvirt process crash on the host, resulting in a denial-of-service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12748/">CVE-2025-12748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12748">CVE-2025-12748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253277">SUSE bug 1253277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010032044" comment="libvirt-client-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032045" comment="libvirt-client-qemu-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032047" comment="libvirt-daemon-common-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032048" comment="libvirt-daemon-config-network-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032049" comment="libvirt-daemon-config-nwfilter-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032050" comment="libvirt-daemon-driver-network-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032051" comment="libvirt-daemon-driver-nodedev-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032052" comment="libvirt-daemon-driver-nwfilter-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032053" comment="libvirt-daemon-driver-qemu-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032054" comment="libvirt-daemon-driver-secret-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032055" comment="libvirt-daemon-driver-storage-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032056" comment="libvirt-daemon-driver-storage-core-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032057" comment="libvirt-daemon-driver-storage-disk-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032058" comment="libvirt-daemon-driver-storage-iscsi-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032059" comment="libvirt-daemon-driver-storage-iscsi-direct-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032060" comment="libvirt-daemon-driver-storage-logical-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032061" comment="libvirt-daemon-driver-storage-mpath-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032062" comment="libvirt-daemon-driver-storage-scsi-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032063" comment="libvirt-daemon-hooks-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032064" comment="libvirt-daemon-lock-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032065" comment="libvirt-daemon-log-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032066" comment="libvirt-daemon-plugin-lockd-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032067" comment="libvirt-daemon-proxy-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032068" comment="libvirt-daemon-qemu-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032071" comment="libvirt-libs-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032072" comment="libvirt-nss-11.4.0-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12816</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12816" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12816" ref_url="https://www.suse.com/security/cve/CVE-2025-12816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024095.html" source="SUSE-SU"/>
    <description>
    An interpretation-conflict (CWE-436) vulnerability in node-forge versions 1.3.1 and earlier enables unauthenticated attackers to craft ASN.1 structures to desynchronize schema validations, yielding a semantic divergence that may bypass downstream cryptographic verifications and security decisions.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-12816/">CVE-2025-12816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12816">CVE-2025-12816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255584">SUSE bug 1255584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009750396" comment="cockpit is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750397" comment="cockpit-bridge is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029139" comment="cockpit-firewalld is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029140" comment="cockpit-kdump is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750404" comment="cockpit-networkmanager is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750405" comment="cockpit-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750406" comment="cockpit-storaged is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750399" comment="cockpit-system is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750400" comment="cockpit-ws is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029142" comment="cockpit-ws-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750402" comment="cockpit-machines is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13034</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13034" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13034" ref_url="https://www.suse.com/security/cve/CVE-2025-13034" source="SUSE CVE"/>
    <description>
    When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey`
with the curl tool,curl should check the public key of the server certificate
to verify the peer.

This check was skipped in a certain condition that would then make curl allow
the connection without performing the proper check, thus not noticing a
possible impostor. To skip this check, the connection had to be done with QUIC
with ngtcp2 built to use GnuTLS and the user had to explicitly disable the
standard certificate verification.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13034/">CVE-2025-13034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13034">CVE-2025-13034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255730">SUSE bug 1255730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335173" comment="libcurl4 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13151</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13151" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13151" ref_url="https://www.suse.com/security/cve/CVE-2025-13151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21001-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045405.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-13"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13151/">CVE-2025-13151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13151">CVE-2025-13151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256341">SUSE bug 1256341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053369" comment="libtasn1-6-4.21.0-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13193</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13193" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13193" ref_url="https://www.suse.com/security/cve/CVE-2025-13193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023758.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libvirt. External inactive snapshots for shut-down VMs are incorrectly created as world-readable, making it possible for unprivileged users to inspect the guest OS contents. This results in an information disclosure vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13193/">CVE-2025-13193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13193">CVE-2025-13193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253703">SUSE bug 1253703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010032044" comment="libvirt-client-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032045" comment="libvirt-client-qemu-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032047" comment="libvirt-daemon-common-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032048" comment="libvirt-daemon-config-network-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032049" comment="libvirt-daemon-config-nwfilter-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032050" comment="libvirt-daemon-driver-network-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032051" comment="libvirt-daemon-driver-nodedev-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032052" comment="libvirt-daemon-driver-nwfilter-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032053" comment="libvirt-daemon-driver-qemu-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032054" comment="libvirt-daemon-driver-secret-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032055" comment="libvirt-daemon-driver-storage-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032056" comment="libvirt-daemon-driver-storage-core-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032057" comment="libvirt-daemon-driver-storage-disk-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032058" comment="libvirt-daemon-driver-storage-iscsi-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032059" comment="libvirt-daemon-driver-storage-iscsi-direct-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032060" comment="libvirt-daemon-driver-storage-logical-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032061" comment="libvirt-daemon-driver-storage-mpath-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032062" comment="libvirt-daemon-driver-storage-scsi-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032063" comment="libvirt-daemon-hooks-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032064" comment="libvirt-daemon-lock-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032065" comment="libvirt-daemon-log-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032066" comment="libvirt-daemon-plugin-lockd-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032067" comment="libvirt-daemon-proxy-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032068" comment="libvirt-daemon-qemu-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032071" comment="libvirt-libs-11.4.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032072" comment="libvirt-nss-11.4.0-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13465</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13465" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13465" ref_url="https://www.suse.com/security/cve/CVE-2025-13465" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2452" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024728.html" source="SUSE-SU"/>
    <description>
    Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset  and _.omit  functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.

The issue permits deletion of properties but does not allow overwriting their original behavior.

This issue is patched on 4.17.23
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13465/">CVE-2025-13465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257321">SUSE bug 1257321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010044370" comment="cockpit-354-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044371" comment="cockpit-bridge-354-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044374" comment="cockpit-firewalld-354-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044375" comment="cockpit-kdump-354-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044376" comment="cockpit-machines-346-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044377" comment="cockpit-networkmanager-354-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047931" comment="cockpit-podman-117-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044577" comment="cockpit-repos-4.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044379" comment="cockpit-selinux-354-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044380" comment="cockpit-storaged-354-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042306" comment="cockpit-subscriptions-12.1-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044381" comment="cockpit-system-354-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044382" comment="cockpit-ws-354-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044383" comment="cockpit-ws-selinux-354-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13601</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13601" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13601" ref_url="https://www.suse.com/security/cve/CVE-2025-13601" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0936" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003174.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0991" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002426.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1465" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002447.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1608" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024480.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13601/">CVE-2025-13601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13601">CVE-2025-13601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254297">SUSE bug 1254297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037475" comment="gio-branding-SLE-16-160000.2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037198" comment="glib2-tools-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037199" comment="libgio-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037200" comment="libgirepository-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037201" comment="libglib-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037202" comment="libgmodule-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037203" comment="libgobject-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037206" comment="typelib-1_0-GLib-2_0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037208" comment="typelib-1_0-GModule-2_0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037209" comment="typelib-1_0-GObject-2_0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037210" comment="typelib-1_0-Gio-2_0-2.84.4-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13836</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13836" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13836" ref_url="https://www.suse.com/security/cve/CVE-2025-13836" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1374" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002442.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1408" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003158.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1410" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003202.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2419" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002500.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3900" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0624-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024938.html" source="SUSE-SU"/>
    <description>
    When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13836/">CVE-2025-13836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13836">CVE-2025-13836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254400">SUSE bug 1254400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039656" comment="libpython3_13-1_0-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039659" comment="python313-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039660" comment="python313-base-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039662" comment="python313-curses-3.13.11-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13837</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13837" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13837" ref_url="https://www.suse.com/security/cve/CVE-2025-13837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
    <description>
    When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13837/">CVE-2025-13837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13837">CVE-2025-13837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254401">SUSE bug 1254401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039656" comment="libpython3_13-1_0-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039659" comment="python313-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039660" comment="python313-base-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039662" comment="python313-curses-3.13.11-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14017</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14017" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14017" ref_url="https://www.suse.com/security/cve/CVE-2025-14017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024325.html" source="SUSE-SU"/>
    <description>
    When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl,
changing TLS options in one thread would inadvertently change them globally
and therefore possibly also affect other concurrently setup transfers.

Disabling certificate verification for a specific transfer could
unintentionally disable the feature for other threads as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14017/">CVE-2025-14017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14017">CVE-2025-14017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256105">SUSE bug 1256105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037720" comment="curl-8.14.1-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037725" comment="libcurl4-8.14.1-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14087</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14087" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14087" ref_url="https://www.suse.com/security/cve/CVE-2025-14087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024480.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14087/">CVE-2025-14087 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14087">CVE-2025-14087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254662">SUSE bug 1254662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037475" comment="gio-branding-SLE-16-160000.2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037198" comment="glib2-tools-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037199" comment="libgio-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037200" comment="libgirepository-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037201" comment="libglib-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037202" comment="libgmodule-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037203" comment="libgobject-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037206" comment="typelib-1_0-GLib-2_0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037208" comment="typelib-1_0-GModule-2_0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037209" comment="typelib-1_0-GObject-2_0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037210" comment="typelib-1_0-Gio-2_0-2.84.4-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14104</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14104" ref_url="https://www.suse.com/security/cve/CVE-2025-14104" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1852" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002473.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1913" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21016-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045390.html" source="SUSE-SU"/>
    <description>
    A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-13"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14104/">CVE-2025-14104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14104">CVE-2025-14104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254666">SUSE bug 1254666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056314" comment="lastlog2-2.41.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056315" comment="libblkid1-2.41.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056316" comment="libfdisk1-2.41.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056317" comment="liblastlog2-2-2.41.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056318" comment="libmount1-2.41.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056319" comment="libsmartcols1-2.41.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056320" comment="libuuid1-2.41.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056321" comment="util-linux-2.41.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056322" comment="util-linux-systemd-2.41.1-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14512</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14512" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14512" ref_url="https://www.suse.com/security/cve/CVE-2025-14512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024480.html" source="SUSE-SU"/>
    <description>
    A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14512/">CVE-2025-14512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14512">CVE-2025-14512 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254878">SUSE bug 1254878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037475" comment="gio-branding-SLE-16-160000.2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037198" comment="glib2-tools-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037199" comment="libgio-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037200" comment="libgirepository-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037201" comment="libglib-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037202" comment="libgmodule-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037203" comment="libgobject-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037206" comment="typelib-1_0-GLib-2_0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037208" comment="typelib-1_0-GModule-2_0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037209" comment="typelib-1_0-GObject-2_0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037210" comment="typelib-1_0-Gio-2_0-2.84.4-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14523</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14523" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14523" ref_url="https://www.suse.com/security/cve/CVE-2025-14523" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003170.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0907" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002419.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1509" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw in libsoup's HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing. Common front proxies often honor the first Host: header, so this mismatch can cause vhost confusion where a proxy routes a request to one backend but the backend interprets it as destined for another host. This discrepancy enables request-smuggling style attacks, cache poisoning, or bypassing host-based access controls when an attacker supplies duplicate Host headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14523/">CVE-2025-14523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14523">CVE-2025-14523 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254876">SUSE bug 1254876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14524</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14524" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14524" ref_url="https://www.suse.com/security/cve/CVE-2025-14524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023878.html" source="SUSE-SU"/>
    <description>
    When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer
performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP,
POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new
target host.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14524/">CVE-2025-14524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14524">CVE-2025-14524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255731">SUSE bug 1255731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037720" comment="curl-8.14.1-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037725" comment="libcurl4-8.14.1-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14819</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14819" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14819" ref_url="https://www.suse.com/security/cve/CVE-2025-14819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023878.html" source="SUSE-SU"/>
    <description>
    When doing TLS related transfers with reused easy or multi handles and
altering the  `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally
reuse a CA store cached in memory for which the partial chain option was
reversed. Contrary to the user's wishes and expectations. This could make
libcurl find and accept a trust chain that it otherwise would not.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14819/">CVE-2025-14819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14819">CVE-2025-14819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255732">SUSE bug 1255732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037720" comment="curl-8.14.1-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037725" comment="libcurl4-8.14.1-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14821</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14821" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14821" ref_url="https://www.suse.com/security/cve/CVE-2025-14821" source="SUSE CVE"/>
    <description>
    A flaw was found in libssh. This vulnerability allows local man-in-the-middle attacks, security downgrades of SSH (Secure Shell) connections, and manipulation of trusted host information, posing a significant risk to the confidentiality, integrity, and availability of SSH communications via an insecure default configuration on Windows systems where the library automatically loads configuration files from the C:\etc directory, which can be created and modified by unprivileged local users.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-14"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-14821/">CVE-2025-14821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14821">CVE-2025-14821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261992">SUSE bug 1261992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335952" comment="libssh2-1 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14831</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14831" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14831" ref_url="https://www.suse.com/security/cve/CVE-2025-14831" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003274.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5585" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002624.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6630" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20962-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20968-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045347.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14831/">CVE-2025-14831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14831">CVE-2025-14831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257960">SUSE bug 1257960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010052615" comment="gnutls-3.8.10-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052618" comment="libgnutls30-3.8.10-160000.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14876</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14876" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14876" ref_url="https://www.suse.com/security/cve/CVE-2025-14876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024769.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the virtio-crypto device of QEMU. A malicious guest operating system can exploit a missing length limit in the AKCIPHER path, leading to uncontrolled memory allocation. This can result in a denial of service (DoS) on the host system by causing the QEMU process to terminate unexpectedly.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14876/">CVE-2025-14876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14876">CVE-2025-14876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255400">SUSE bug 1255400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010048658" comment="qemu-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048659" comment="qemu-SLOF-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010049216" comment="qemu-arm-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048668" comment="qemu-audio-spice-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048671" comment="qemu-block-iscsi-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048674" comment="qemu-block-ssh-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048676" comment="qemu-chardev-spice-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048679" comment="qemu-guest-agent-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048681" comment="qemu-hw-display-qxl-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048682" comment="qemu-hw-display-virtio-gpu-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048683" comment="qemu-hw-display-virtio-gpu-pci-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048684" comment="qemu-hw-display-virtio-vga-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010049217" comment="qemu-hw-s390x-virtio-gpu-ccw-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048686" comment="qemu-hw-usb-host-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048687" comment="qemu-hw-usb-redirect-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048689" comment="qemu-img-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048690" comment="qemu-ipxe-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048692" comment="qemu-ksm-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048693" comment="qemu-lang-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010049218" comment="qemu-ppc-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048697" comment="qemu-pr-helper-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010049219" comment="qemu-s390x-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048699" comment="qemu-seabios-10.0.81.16.3_3_g3d33c746-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048702" comment="qemu-tools-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048706" comment="qemu-ui-opengl-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048708" comment="qemu-ui-spice-core-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048709" comment="qemu-vgabios-10.0.81.16.3_3_g3d33c746-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048711" comment="qemu-vmsr-helper-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010049220" comment="qemu-x86-10.0.8-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14946</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14946" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14946" ref_url="https://www.suse.com/security/cve/CVE-2025-14946" source="SUSE CVE"/>
    <description>
    A flaw was found in libnbd. A malicious actor could exploit this by convincing libnbd to open a specially crafted Uniform Resource Identifier (URI). This vulnerability arises because non-standard hostnames starting with '-o' are incorrectly interpreted as arguments to the Secure Shell (SSH) process, rather than as hostnames. This could lead to arbitrary code execution with the privileges of the user running libnbd.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-14946/">CVE-2025-14946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14946">CVE-2025-14946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255432">SUSE bug 1255432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009699741" comment="containerized-data-importer-manifests is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15079</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15079" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15079" ref_url="https://www.suse.com/security/cve/CVE-2025-15079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023878.html" source="SUSE-SU"/>
    <description>
    When doing SSH-based transfers using either SCP or SFTP, and setting the
known_hosts file, libcurl could still mistakenly accept connecting to hosts
*not present* in the specified file if they were added as recognized in the
libssh *global* known_hosts file.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15079/">CVE-2025-15079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15079">CVE-2025-15079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255733">SUSE bug 1255733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037720" comment="curl-8.14.1-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037725" comment="libcurl4-8.14.1-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15224</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15224" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15224" ref_url="https://www.suse.com/security/cve/CVE-2025-15224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023878.html" source="SUSE-SU"/>
    <description>
    When doing SSH-based transfers using either SCP or SFTP, and asked to do
public key authentication, curl would wrongly still ask and authenticate using
a locally running SSH agent.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15224/">CVE-2025-15224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15224">CVE-2025-15224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255734">SUSE bug 1255734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037720" comment="curl-8.14.1-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037725" comment="libcurl4-8.14.1-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15281</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15281" ref_url="https://www.suse.com/security/cve/CVE-2025-15281" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2786" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003249.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4772" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024576.html" source="SUSE-SU"/>
    <description>
    Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15281/">CVE-2025-15281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15281">CVE-2025-15281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257005">SUSE bug 1257005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041425" comment="glibc-2.40-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041426" comment="glibc-devel-2.40-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041667" comment="glibc-gconv-modules-extra-2.40-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041434" comment="glibc-locale-2.40-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041435" comment="glibc-locale-base-2.40-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037683" comment="glibc-livepatches is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037673" comment="linux-glibc-devel is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15282</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15282" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15282" ref_url="https://www.suse.com/security/cve/CVE-2025-15282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
    <description>
    User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in the data URL mediatype.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15282/">CVE-2025-15282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15282">CVE-2025-15282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257046">SUSE bug 1257046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010044584" comment="libpython3_13-1_0-3.13.12-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044587" comment="python313-3.13.12-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044588" comment="python313-base-3.13.12-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044590" comment="python313-curses-3.13.12-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15444</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15444" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15444" ref_url="https://www.suse.com/security/cve/CVE-2025-15444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025102.html" source="SUSE-SU"/>
    <description>
    Crypt::Sodium::XS module versions prior to  0.000042,  for Perl, include a vulnerable version of libsodium

libsodium &lt;= 1.0.20 or a version of libsodium released before December 30, 2025 contains a vulnerability documented as CVE-2025-69277   https://www.cve.org/CVERecord?id=CVE-2025-69277 .

The libsodium vulnerability states:

In atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group.

0.000042 includes a version of  libsodium updated to 1.0.20-stable, released January 3, 2026, which includes a fix for the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-15444/">CVE-2025-15444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15444">CVE-2025-15444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256070">SUSE bug 1256070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050020" comment="libsodium26-1.0.20-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15467</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15467" ref_url="https://www.suse.com/security/cve/CVE-2025-15467" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1503" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024609.html" source="SUSE-SU"/>
    <description>
    Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with
maliciously crafted AEAD parameters can trigger a stack buffer overflow.

Impact summary: A stack buffer overflow may lead to a crash, causing Denial
of Service, or potentially remote code execution.

When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as
AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is
copied into a fixed-size stack buffer without verifying that its length fits
the destination. An attacker can supply a crafted CMS message with an
oversized IV, causing a stack-based out-of-bounds write before any
authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using
AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable.
Because the overflow occurs prior to authentication, no valid key material
is required to trigger it. While exploitability to remote code execution
depends on platform and toolchain mitigations, the stack-based write
primitive represents a severe risk.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this
issue, as the CMS implementation is outside the OpenSSL FIPS module
boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue.

OpenSSL 1.1.1 and 1.0.2 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15467/">CVE-2025-15467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15467">CVE-2025-15467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256830">SUSE bug 1256830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256876">SUSE bug 1256876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047375" comment="openssl-3-livepatches-0.3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15468</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15468" ref_url="https://www.suse.com/security/cve/CVE-2025-15468" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024609.html" source="SUSE-SU"/>
    <description>
    Issue summary: If an application using the SSL_CIPHER_find() function in
a QUIC protocol client or server receives an unknown cipher suite from
the peer, a NULL dereference occurs.

Impact summary: A NULL pointer dereference leads to abnormal termination of
the running process causing Denial of Service.

Some applications call SSL_CIPHER_find() from the client_hello_cb callback
on the cipher ID received from the peer. If this is done with an SSL object
implementing the QUIC protocol, NULL pointer dereference will happen if
the examined cipher ID is unknown or unsupported.

As it is not very common to call this function in applications using the QUIC 
protocol and the worst outcome is Denial of Service, the issue was assessed
as Low severity.

The vulnerable code was introduced in the 3.2 version with the addition
of the QUIC protocol support.

The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,
as the QUIC implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.

OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15468/">CVE-2025-15468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15468">CVE-2025-15468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256831">SUSE bug 1256831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256880">SUSE bug 1256880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047375" comment="openssl-3-livepatches-0.3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15469</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15469" ref_url="https://www.suse.com/security/cve/CVE-2025-15469" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: The 'openssl dgst' command-line tool silently truncates input
data to 16MB when using one-shot signing algorithms and reports success instead
of an error.

Impact summary: A user signing or verifying files larger than 16MB with
one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire
file is authenticated while trailing data beyond 16MB remains unauthenticated.

When the 'openssl dgst' command is used with algorithms that only support
one-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input
is buffered with a 16MB limit. If the input exceeds this limit, the tool
silently truncates to the first 16MB and continues without signaling an error,
contrary to what the documentation states. This creates an integrity gap where
trailing bytes can be modified without detection if both signing and
verification are performed using the same affected codepath.

The issue affects only the command-line tool behavior. Verifiers that process
the full message using library APIs will reject the signature, so the risk
primarily affects workflows that both sign and verify with the affected
'openssl dgst' command. Streaming digest algorithms for 'openssl dgst' and
library users are unaffected.

The FIPS modules in 3.5 and 3.6 are not affected by this issue, as the
command-line tools are outside the OpenSSL FIPS module boundary.

OpenSSL 3.5 and 3.6 are vulnerable to this issue.

OpenSSL 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15469/">CVE-2025-15469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15469">CVE-2025-15469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256832">SUSE bug 1256832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941029" comment="openssl-3-livepatches is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21816</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21816" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21816" ref_url="https://www.suse.com/security/cve/CVE-2025-21816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hrtimers: Force migrate away hrtimers queued after CPUHP_AP_HRTIMERS_DYING

hrtimers are migrated away from the dying CPU to any online target at
the CPUHP_AP_HRTIMERS_DYING stage in order not to delay bandwidth timers
handling tasks involved in the CPU hotplug forward progress.

However wakeups can still be performed by the outgoing CPU after
CPUHP_AP_HRTIMERS_DYING. Those can result again in bandwidth timers being
armed. Depending on several considerations (crystal ball power management
based election, earliest timer already enqueued, timer migration enabled or
not), the target may eventually be the current CPU even if offline. If that
happens, the timer is eventually ignored.

The most notable example is RCU which had to deal with each and every of
those wake-ups by deferring them to an online CPU, along with related
workarounds:

_ e787644caf76 (rcu: Defer RCU kthreads wakeup when CPU is dying)
_ 9139f93209d1 (rcu/nocb: Fix RT throttling hrtimer armed from offline CPU)
_ f7345ccc62a4 (rcu/nocb: Fix rcuog wake-up from offline softirq)

The problem isn't confined to RCU though as the stop machine kthread
(which runs CPUHP_AP_HRTIMERS_DYING) reports its completion at the end
of its work through cpu_stop_signal_done() and performs a wake up that
eventually arms the deadline server timer:

   WARNING: CPU: 94 PID: 588 at kernel/time/hrtimer.c:1086 hrtimer_start_range_ns+0x289/0x2d0
   CPU: 94 UID: 0 PID: 588 Comm: migration/94 Not tainted
   Stopper: multi_cpu_stop+0x0/0x120 &lt;- stop_machine_cpuslocked+0x66/0xc0
   RIP: 0010:hrtimer_start_range_ns+0x289/0x2d0
   Call Trace:
   &lt;TASK&gt;
     start_dl_timer
     enqueue_dl_entity
     dl_server_start
     enqueue_task_fair
     enqueue_task
     ttwu_do_activate
     try_to_wake_up
     complete
     cpu_stopper_thread

Instead of providing yet another bandaid to work around the situation, fix
it in the hrtimers infrastructure instead: always migrate away a timer to
an online target whenever it is enqueued from an offline CPU.

This will also allow to revert all the above RCU disgraceful hacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21816/">CVE-2025-21816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21816">CVE-2025-21816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238472">SUSE bug 1238472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22034</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22034" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22034" ref_url="https://www.suse.com/security/cve/CVE-2025-22034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/gup: reject FOLL_SPLIT_PMD with hugetlb VMAs

Patch series "mm: fixes for device-exclusive entries (hmm)", v2.

Discussing the PageTail() call in make_device_exclusive_range() with
Willy, I recently discovered [1] that device-exclusive handling does not
properly work with THP, making the hmm-tests selftests fail if THPs are
enabled on the system.

Looking into more details, I found that hugetlb is not properly fenced,
and I realized that something that was bugging me for longer -- how
device-exclusive entries interact with mapcounts -- completely breaks
migration/swapout/split/hwpoison handling of these folios while they have
device-exclusive PTEs.

The program below can be used to allocate 1 GiB worth of pages and making
them device-exclusive on a kernel with CONFIG_TEST_HMM.

Once they are device-exclusive, these folios cannot get swapped out
(proc$pid/smaps_rollup will always indicate 1 GiB RSS no matter how much
one forces memory reclaim), and when having a memory block onlined to
ZONE_MOVABLE, trying to offline it will loop forever and complain about
failed migration of a page that should be movable.

# echo offline &gt; /sys/devices/system/memory/memory136/state
# echo online_movable &gt; /sys/devices/system/memory/memory136/state
# ./hmm-swap &amp;
... wait until everything is device-exclusive
# echo offline &gt; /sys/devices/system/memory/memory136/state
[  285.193431][T14882] page: refcount:2 mapcount:0 mapping:0000000000000000
  index:0x7f20671f7 pfn:0x442b6a
[  285.196618][T14882] memcg:ffff888179298000
[  285.198085][T14882] anon flags: 0x5fff0000002091c(referenced|uptodate|
  dirty|active|owner_2|swapbacked|node=1|zone=3|lastcpupid=0x7ff)
[  285.201734][T14882] raw: ...
[  285.204464][T14882] raw: ...
[  285.207196][T14882] page dumped because: migration failure
[  285.209072][T14882] page_owner tracks the page as allocated
[  285.210915][T14882] page last allocated via order 0, migratetype
  Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_COMP|__GFP_ZERO),
  id 14926, tgid 14926 (hmm-swap), ts 254506295376, free_ts 227402023774
[  285.216765][T14882]  post_alloc_hook+0x197/0x1b0
[  285.218874][T14882]  get_page_from_freelist+0x76e/0x3280
[  285.220864][T14882]  __alloc_frozen_pages_noprof+0x38e/0x2740
[  285.223302][T14882]  alloc_pages_mpol+0x1fc/0x540
[  285.225130][T14882]  folio_alloc_mpol_noprof+0x36/0x340
[  285.227222][T14882]  vma_alloc_folio_noprof+0xee/0x1a0
[  285.229074][T14882]  __handle_mm_fault+0x2b38/0x56a0
[  285.230822][T14882]  handle_mm_fault+0x368/0x9f0
...

This series fixes all issues I found so far.  There is no easy way to fix
without a bigger rework/cleanup.  I have a bunch of cleanups on top (some
previous sent, some the result of the discussion in v1) that I will send
out separately once this landed and I get to it.

I wish we could just use some special present PROT_NONE PTEs instead of
these (non-present, non-none) fake-swap entries; but that just results in
the same problem we keep having (lack of spare PTE bits), and staring at
other similar fake-swap entries, that ship has sailed.

With this series, make_device_exclusive() doesn't actually belong into
mm/rmap.c anymore, but I'll leave moving that for another day.

I only tested this series with the hmm-tests selftests due to lack of HW,
so I'd appreciate some testing, especially if the interaction between two
GPUs wanting a device-exclusive entry works as expected.

&lt;program&gt;
#include &lt;stdio.h&gt;
#include &lt;fcntl.h&gt;
#include &lt;stdint.h&gt;
#include &lt;unistd.h&gt;
#include &lt;stdlib.h&gt;
#include &lt;string.h&gt;
#include &lt;sys/mman.h&gt;
#include &lt;sys/ioctl.h&gt;
#include &lt;linux/types.h&gt;
#include &lt;linux/ioctl.h&gt;

#define HMM_DMIRROR_EXCLUSIVE _IOWR('H', 0x05, struct hmm_dmirror_cmd)

struct hmm_dmirror_cmd {
	__u64 addr;
	__u64 ptr;
	__u64 npages;
	__u64 cpages;
	__u64 faults;
};

const size_t size = 1 * 1024 * 1024 * 1024ul;
const size_t chunk_size = 2 * 1024 * 1024ul;

int m
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22034/">CVE-2025-22034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22034">CVE-2025-22034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241435">SUSE bug 1241435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22077</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22077" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22077" ref_url="https://www.suse.com/security/cve/CVE-2025-22077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "smb: client: fix TCP timers deadlock after rmmod"

This reverts commit e9f2517a3e18a54a3943c098d2226b245d488801.

Commit e9f2517a3e18 ("smb: client: fix TCP timers deadlock after
rmmod") is intended to fix a null-ptr-deref in LOCKDEP, which is
mentioned as CVE-2024-54680, but is actually did not fix anything;
The issue can be reproduced on top of it. [0]

Also, it reverted the change by commit ef7134c7fc48 ("smb: client:
Fix use-after-free of network namespace.") and introduced a real
issue by reviving the kernel TCP socket.

When a reconnect happens for a CIFS connection, the socket state
transitions to FIN_WAIT_1.  Then, inet_csk_clear_xmit_timers_sync()
in tcp_close() stops all timers for the socket.

If an incoming FIN packet is lost, the socket will stay at FIN_WAIT_1
forever, and such sockets could be leaked up to net.ipv4.tcp_max_orphans.

Usually, FIN can be retransmitted by the peer, but if the peer aborts
the connection, the issue comes into reality.

I warned about this privately by pointing out the exact report [1],
but the bogus fix was finally merged.

So, we should not stop the timers to finally kill the connection on
our side in that case, meaning we must not use a kernel socket for
TCP whose sk-&gt;sk_net_refcnt is 0.

The kernel socket does not have a reference to its netns to make it
possible to tear down netns without cleaning up every resource in it.

For example, tunnel devices use a UDP socket internally, but we can
destroy netns without removing such devices and let it complete
during exit.  Otherwise, netns would be leaked when the last application
died.

However, this is problematic for TCP sockets because TCP has timers to
close the connection gracefully even after the socket is close()d.  The
lifetime of the socket and its netns is different from the lifetime of
the underlying connection.

If the socket user does not maintain the netns lifetime, the timer could
be fired after the socket is close()d and its netns is freed up, resulting
in use-after-free.

Actually, we have seen so many similar issues and converted such sockets
to have a reference to netns.

That's why I converted the CIFS client socket to have a reference to
netns (sk-&gt;sk_net_refcnt == 1), which is somehow mentioned as out-of-scope
of CIFS and technically wrong in e9f2517a3e18, but **is in-scope and right
fix**.

Regarding the LOCKDEP issue, we can prevent the module unload by
bumping the module refcount when switching the LOCKDDEP key in
sock_lock_init_class_and_name(). [2]

For a while, let's revert the bogus fix.

Note that now we can use sk_net_refcnt_upgrade() for the socket
conversion, but I'll do so later separately to make backport easy.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22077/">CVE-2025-22077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22077">CVE-2025-22077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241403">SUSE bug 1241403</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22868</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22868" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02014-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02035-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02040-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02041-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02046-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03540-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1062-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-March/038860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1102-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20515-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20550-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044567.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WXUOMZG43G5AZBMH5HY5IUTZ2CLZL6M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JTZ2DTLVURMW7SOEALLXE6GW75RG2MM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CKYE7I5OJNC37LL7255HIGX5ALO2LO5S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14868-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LNQ27T4HTWIIJODQRGADXNKI7X2EGTL6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14869-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AU4XP3W2PVBNVPQA4YEB63MRXXOHFOUY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P2BVMS3UPZ5WY4VHA7P2XTPDJMOKLPXM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3KAY6CKW45XK546N3GCKSKWNPBQG7GUO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WXSUXV2PEOLT2UD2VEZ6IZQTHDWIVZNI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKWQ6ES2RHURE5QOZDDNTWPTMPKEXYXM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14988-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQWUH5CIGBJCVZRE6D76AYCLT3MS47XX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC2EUYZRCX6GXM6Y26SHEX6QS2URIZ2I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/27CRURJAEL5XMMKNEMZUVGHMUILSPME2/" source="SUSE-SU"/>
    <description>
    An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239185">SUSE bug 1239185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239186">SUSE bug 1239186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045695" comment="containerized-data-importer-manifests-1.64.0-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659876" comment="skopeo is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22869</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22869" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000997.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3336" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001010.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3833" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001061.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7391" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001348.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7416" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02093-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03540-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1062-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-March/038860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1102-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20373-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKOLRH73CIQLMQ327IYGUHNSFKCU5MPI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CKYE7I5OJNC37LL7255HIGX5ALO2LO5S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14881-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLILESXTUSI5RA744QQ3PZ6BOEUIKZJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14887-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKHXEY6EIRYIRT5OFXFAGRE6PTYMVUZF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIPGSRATX6BG2ZXWE7566EGQCKXLC4RV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14918-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R2WDHFL2CJ54WXZCWMM62SG3EEXCUE7B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14919-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SLMCPFY73CP4P47VPVL2WKQEHQZDTY6B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKWQ6ES2RHURE5QOZDDNTWPTMPKEXYXM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14988-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQWUH5CIGBJCVZRE6D76AYCLT3MS47XX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC2EUYZRCX6GXM6Y26SHEX6QS2URIZ2I/" source="SUSE-SU"/>
    <description>
    SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239322">SUSE bug 1239322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010047314" comment="podman-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047315" comment="podman-docker-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047316" comment="podman-remote-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047317" comment="podmansh-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659876" comment="skopeo is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22872</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22872" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01940-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02121-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02289-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02336-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02350-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02350-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02366-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02366-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02383-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02383-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02423-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02423-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02424-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02515-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02515-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20457-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20510-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20516-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20535-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024607.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJN6I53PLG7NO5USQWWJUIVQTZDQDRHC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QPKEZWS6JMWB5YHJ6IJNYFNNGZGXQM55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QA73DOMVV4XIT7C22BBHOSQN2YR3QNWF/" source="SUSE-SU"/>
    <description>
    The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. &lt;math&gt;, &lt;svg&gt;, etc contexts).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241710">SUSE bug 1241710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041418" comment="elemental-register-1.8.1-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041419" comment="elemental-support-1.8.1-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041666" comment="elemental-toolkit-2.3.2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045701" comment="kubevirt-manifests-1.7.0-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045713" comment="kubevirt-virtctl-1.7.0-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20252312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-2312</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-2312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2312" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-2312" ref_url="https://www.suse.com/security/cve/CVE-2025-2312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html" source="SUSE-SU"/>
    <description>
    A flaw was found in cifs-utils. When trying to obtain Kerberos credentials, the cifs.upcall program from the cifs-utils package makes an upcall to the wrong namespace in containerized environments. This issue may lead to disclosing sensitive data from the host's Kerberos credentials cache.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2312/">CVE-2025-2312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2312">CVE-2025-2312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239680">SUSE bug 1239680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334349" comment="cifs-utils is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035147" comment="wb-cifs-idmap-plugin is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23141</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23141" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23141" ref_url="https://www.suse.com/security/cve/CVE-2025-23141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses

Acquire a lock on kvm-&gt;srcu when userspace is getting MP state to handle a
rather extreme edge case where "accepting" APIC events, i.e. processing
pending INIT or SIPI, can trigger accesses to guest memory.  If the vCPU
is in L2 with INIT *and* a TRIPLE_FAULT request pending, then getting MP
state will trigger a nested VM-Exit by way of -&gt;check_nested_events(), and
emuating the nested VM-Exit can access guest memory.

The splat was originally hit by syzkaller on a Google-internal kernel, and
reproduced on an upstream kernel by hacking the triple_fault_event_test
selftest to stuff a pending INIT, store an MSR on VM-Exit (to generate a
memory access on VMX), and do vcpu_mp_state_get() to trigger the scenario.

  =============================
  WARNING: suspicious RCU usage
  6.14.0-rc3-b112d356288b-vmx/pi_lockdep_false_pos-lock #3 Not tainted
  -----------------------------
  include/linux/kvm_host.h:1058 suspicious rcu_dereference_check() usage!

  other info that might help us debug this:

  rcu_scheduler_active = 2, debug_locks = 1
  1 lock held by triple_fault_ev/1256:
   #0: ffff88810df5a330 (&amp;vcpu-&gt;mutex){+.+.}-{4:4}, at: kvm_vcpu_ioctl+0x8b/0x9a0 [kvm]

  stack backtrace:
  CPU: 11 UID: 1000 PID: 1256 Comm: triple_fault_ev Not tainted 6.14.0-rc3-b112d356288b-vmx #3
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x7f/0x90
   lockdep_rcu_suspicious+0x144/0x190
   kvm_vcpu_gfn_to_memslot+0x156/0x180 [kvm]
   kvm_vcpu_read_guest+0x3e/0x90 [kvm]
   read_and_check_msr_entry+0x2e/0x180 [kvm_intel]
   __nested_vmx_vmexit+0x550/0xde0 [kvm_intel]
   kvm_check_nested_events+0x1b/0x30 [kvm]
   kvm_apic_accept_events+0x33/0x100 [kvm]
   kvm_arch_vcpu_ioctl_get_mpstate+0x30/0x1d0 [kvm]
   kvm_vcpu_ioctl+0x33e/0x9a0 [kvm]
   __x64_sys_ioctl+0x8b/0xb0
   do_syscall_64+0x6c/0x170
   entry_SYSCALL_64_after_hwframe+0x4b/0x53
   &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23141/">CVE-2025-23141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23141">CVE-2025-23141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242782">SUSE bug 1242782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23259</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23259" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23259" ref_url="https://www.suse.com/security/cve/CVE-2025-23259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024069.html" source="SUSE-SU"/>
    <description>
    NVIDIA Mellanox DPDK contains a vulnerability in Poll Mode Driver (PMD), where an attacker on a VM in the system might be able to cause information disclosure and denial of service on the network interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23259/">CVE-2025-23259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23259">CVE-2025-23259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254161">SUSE bug 1254161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041563" comment="dpdk-24.11.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041568" comment="dpdk-tools-24.11.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041569" comment="libdpdk-25-24.11.4-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23280</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23280" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23280" ref_url="https://www.suse.com/security/cve/CVE-2025-23280" source="SUSE CVE"/>
    <description>
    NVIDIA Display Driver for Linux contains a vulnerability where an attacker could cause a use-after-free. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-23"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23280/">CVE-2025-23280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23280">CVE-2025-23280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251946">SUSE bug 1251946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009852927" comment="nvidia-open-driver-G06-signed-kmp-64kb is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009852928" comment="nvidia-open-driver-G06-signed-kmp-default is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23282</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23282" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23282" ref_url="https://www.suse.com/security/cve/CVE-2025-23282" source="SUSE CVE"/>
    <description>
    NVIDIA Display Driver for Linux contains a vulnerability where an attacker might be able to use a race condition to escalate privileges. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23282/">CVE-2025-23282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23282">CVE-2025-23282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251943">SUSE bug 1251943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009852927" comment="nvidia-open-driver-G06-signed-kmp-64kb is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009852928" comment="nvidia-open-driver-G06-signed-kmp-default is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23300</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23300" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23300" ref_url="https://www.suse.com/security/cve/CVE-2025-23300" source="SUSE CVE"/>
    <description>
    NVIDIA Display Driver for Linux contains a vulnerability in the kernel driver, where a user could cause a null pointer dereference by allocating a specific memory resource. A successful exploit of this vulnerability might lead to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-23"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23300/">CVE-2025-23300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23300">CVE-2025-23300 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252659">SUSE bug 1252659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009852927" comment="nvidia-open-driver-G06-signed-kmp-64kb is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009852928" comment="nvidia-open-driver-G06-signed-kmp-default is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23330</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23330" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23330" ref_url="https://www.suse.com/security/cve/CVE-2025-23330" source="SUSE CVE"/>
    <description>
    NVIDIA Display Driver for Linux contains a vulnerability where an attacker might be able to trigger a null pointer dereference. A successful exploit of this vulnerability might lead to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-23"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23330/">CVE-2025-23330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23330">CVE-2025-23330 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252660">SUSE bug 1252660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009852927" comment="nvidia-open-driver-G06-signed-kmp-64kb is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009852928" comment="nvidia-open-driver-G06-signed-kmp-default is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23332</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23332" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23332" ref_url="https://www.suse.com/security/cve/CVE-2025-23332" source="SUSE CVE"/>
    <description>
    NVIDIA Display Driver for Linux contains a vulnerability in a kernel module, where an attacker might be able to trigger a null pointer deference. A successful exploit of this vulnerability might lead to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-23"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23332/">CVE-2025-23332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23332">CVE-2025-23332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252662">SUSE bug 1252662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009852927" comment="nvidia-open-driver-G06-signed-kmp-64kb is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009852928" comment="nvidia-open-driver-G06-signed-kmp-default is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23345</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23345" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23345" ref_url="https://www.suse.com/security/cve/CVE-2025-23345" source="SUSE CVE"/>
    <description>
    NVIDIA Display Driver for Windows and Linux contains a vulnerability in a video decoder, where an attacker might cause an out-of-bounds read. A successful exploit of this vulnerability might lead to information disclosure or denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-23"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23345/">CVE-2025-23345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23345">CVE-2025-23345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252661">SUSE bug 1252661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009852927" comment="nvidia-open-driver-G06-signed-kmp-64kb is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009852928" comment="nvidia-open-driver-G06-signed-kmp-default is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26434</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26434" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26434" ref_url="https://www.suse.com/security/cve/CVE-2025-26434" source="SUSE CVE"/>
    <description>
    In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-26434/">CVE-2025-26434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26434">CVE-2025-26434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249250">SUSE bug 1249250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009337751" comment="libxml2-2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009337752" comment="libxml2-tools is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202528162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-28162</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-28162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-28162" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-28162" ref_url="https://www.suse.com/security/cve/CVE-2025-28162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024834.html" source="SUSE-SU"/>
    <description>
    Buffer Overflow vulnerability in libpng 1.6.43-1.6.46 allows a local attacker to cause a denial of service via the pngimage with AddressSanitizer (ASan), the program leaks memory in various locations, eventually leading to high memory usage and causing the program to become unresponsive
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-28162/">CVE-2025-28162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-28162">CVE-2025-28162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257364">SUSE bug 1257364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050012" comment="libpng16-16-1.6.44-160000.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202528164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-28164</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-28164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-28164" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-28164" ref_url="https://www.suse.com/security/cve/CVE-2025-28164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024834.html" source="SUSE-SU"/>
    <description>
    Buffer Overflow vulnerability in libpng 1.6.43-1.6.46 allows a local attacker to cause a denial of service via png_create_read_struct() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-28164/">CVE-2025-28164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-28164">CVE-2025-28164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257365">SUSE bug 1257365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050012" comment="libpng16-16-1.6.44-160000.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202531133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-31133</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-31133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31133" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-31133" ref_url="https://www.suse.com/security/cve/CVE-2025-31133" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002207.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20957" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003086.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21232" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4073-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack:  an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-31133/">CVE-2025-31133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31133">CVE-2025-31133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252232">SUSE bug 1252232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255063">SUSE bug 1255063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010047314" comment="podman-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047315" comment="podman-docker-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047316" comment="podman-remote-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047317" comment="podmansh-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030577" comment="runc-1.3.3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334435" comment="docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953331" comment="docker-buildx is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202531648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-31648</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-31648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31648" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-31648" ref_url="https://www.suse.com/security/cve/CVE-2025-31648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045211.html" source="SUSE-SU"/>
    <description>
    Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-31648/">CVE-2025-31648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31648">CVE-2025-31648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258046">SUSE bug 1258046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050021" comment="ucode-intel-20260210-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3198</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3198" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3198" ref_url="https://www.suse.com/security/cve/CVE-2025-3198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3198/">CVE-2025-3198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3198">CVE-2025-3198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240870">SUSE bug 1240870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32049</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32049" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32049" ref_url="https://www.suse.com/security/cve/CVE-2025-32049" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8126" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001317.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8132" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9179" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. The SoupWebsocketConnection may accept a large WebSocket message, which may cause libsoup to allocate memory and lead to a denial of service (DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32049/">CVE-2025-32049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32049">CVE-2025-32049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240751">SUSE bug 1240751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250562">SUSE bug 1250562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32386</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32386" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32386" ref_url="https://www.suse.com/security/cve/CVE-2025-32386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01830-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01830-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E43FPQVMRXXDJFNVP6BBWLBUQXMXBJ3W/" source="SUSE-SU"/>
    <description>
    Helm is a tool for managing Charts. A chart archive file can be crafted in a manner where it expands to be significantly larger uncompressed than compressed (e.g., &gt;800x difference). When Helm loads this specially crafted chart, memory can be exhausted causing the application to terminate. This issue has been resolved in Helm v3.17.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32386/">CVE-2025-32386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32386">CVE-2025-32386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241029">SUSE bug 1241029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009339480" comment="helm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009683669" comment="helm-bash-completion is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32387</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32387" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32387" ref_url="https://www.suse.com/security/cve/CVE-2025-32387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01830-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01830-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E43FPQVMRXXDJFNVP6BBWLBUQXMXBJ3W/" source="SUSE-SU"/>
    <description>
    Helm is a package manager for Charts for Kubernetes. A JSON Schema file within a chart can be crafted with a deeply nested chain of references, leading to parser recursion that can exceed the stack size limit and trigger a stack overflow. This issue has been resolved in Helm v3.17.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32387/">CVE-2025-32387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32387">CVE-2025-32387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241032">SUSE bug 1241032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009339480" comment="helm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009683669" comment="helm-bash-completion is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3576</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3576" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3576" ref_url="https://www.suse.com/security/cve/CVE-2025-3576" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8411" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001579.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9430" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024180.html" source="SUSE-SU"/>
    <description>
    A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3576/">CVE-2025-3576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3576">CVE-2025-3576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241218">SUSE bug 1241218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333953" comment="krb5 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334924" comment="krb5-client is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37744</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37744" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37744" ref_url="https://www.suse.com/security/cve/CVE-2025-37744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix memory leak in ath12k_pci_remove()

Kmemleak reported this error:

  unreferenced object 0xffff1c165cec3060 (size 32):
    comm "insmod", pid 560, jiffies 4296964570 (age 235.596s)
    backtrace:
      [&lt;000000005434db68&gt;] __kmem_cache_alloc_node+0x1f4/0x2c0
      [&lt;000000001203b155&gt;] kmalloc_trace+0x40/0x88
      [&lt;0000000028adc9c8&gt;] _request_firmware+0xb8/0x608
      [&lt;00000000cad1aef7&gt;] firmware_request_nowarn+0x50/0x80
      [&lt;000000005011a682&gt;] local_pci_probe+0x48/0xd0
      [&lt;00000000077cd295&gt;] pci_device_probe+0xb4/0x200
      [&lt;0000000087184c94&gt;] really_probe+0x150/0x2c0

The firmware memory was allocated in ath12k_pci_probe(), but not
freed in ath12k_pci_remove() in case ATH12K_FLAG_QMI_FAIL bit is
set. So call ath12k_fw_unmap() to free the memory.

Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.2.0-02280-QCAHMTSWPL_V1.0_V2.0_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37744/">CVE-2025-37744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37744">CVE-2025-37744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243662">SUSE bug 1243662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37751</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37751" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37751" ref_url="https://www.suse.com/security/cve/CVE-2025-37751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/cpu: Avoid running off the end of an AMD erratum table

The NULL array terminator at the end of erratum_1386_microcode was
removed during the switch from x86_cpu_desc to x86_cpu_id. This
causes readers to run off the end of the array.

Replace the NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37751/">CVE-2025-37751 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37751">CVE-2025-37751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242505">SUSE bug 1242505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37798</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37798" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37798" ref_url="https://www.suse.com/security/cve/CVE-2025-37798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

codel: remove sch-&gt;q.qlen check before qdisc_tree_reduce_backlog()

After making all -&gt;qlen_notify() callbacks idempotent, now it is safe to
remove the check of qlen!=0 from both fq_codel_dequeue() and
codel_qdisc_dequeue().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37798/">CVE-2025-37798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37798">CVE-2025-37798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242414">SUSE bug 1242414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242417">SUSE bug 1242417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37821</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37821" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37821" ref_url="https://www.suse.com/security/cve/CVE-2025-37821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/eevdf: Fix se-&gt;slice being set to U64_MAX and resulting crash

There is a code path in dequeue_entities() that can set the slice of a
sched_entity to U64_MAX, which sometimes results in a crash.

The offending case is when dequeue_entities() is called to dequeue a
delayed group entity, and then the entity's parent's dequeue is delayed.
In that case:

1. In the if (entity_is_task(se)) else block at the beginning of
   dequeue_entities(), slice is set to
   cfs_rq_min_slice(group_cfs_rq(se)). If the entity was delayed, then
   it has no queued tasks, so cfs_rq_min_slice() returns U64_MAX.
2. The first for_each_sched_entity() loop dequeues the entity.
3. If the entity was its parent's only child, then the next iteration
   tries to dequeue the parent.
4. If the parent's dequeue needs to be delayed, then it breaks from the
   first for_each_sched_entity() loop _without updating slice_.
5. The second for_each_sched_entity() loop sets the parent's -&gt;slice to
   the saved slice, which is still U64_MAX.

This throws off subsequent calculations with potentially catastrophic
results. A manifestation we saw in production was:

6. In update_entity_lag(), se-&gt;slice is used to calculate limit, which
   ends up as a huge negative number.
7. limit is used in se-&gt;vlag = clamp(vlag, -limit, limit). Because limit
   is negative, vlag &gt; limit, so se-&gt;vlag is set to the same huge
   negative number.
8. In place_entity(), se-&gt;vlag is scaled, which overflows and results in
   another huge (positive or negative) number.
9. The adjusted lag is subtracted from se-&gt;vruntime, which increases or
   decreases se-&gt;vruntime by a huge number.
10. pick_eevdf() calls entity_eligible()/vruntime_eligible(), which
    incorrectly returns false because the vruntime is so far from the
    other vruntimes on the queue, causing the
    (vruntime - cfs_rq-&gt;min_vruntime) * load calulation to overflow.
11. Nothing appears to be eligible, so pick_eevdf() returns NULL.
12. pick_next_entity() tries to dereference the return value of
    pick_eevdf() and crashes.

Dumping the cfs_rq states from the core dumps with drgn showed tell-tale
huge vruntime ranges and bogus vlag values, and I also traced se-&gt;slice
being set to U64_MAX on live systems (which was usually "benign" since
the rest of the runqueue needed to be in a particular state to crash).

Fix it in dequeue_entities() by always setting slice from the first
non-empty cfs_rq.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37821/">CVE-2025-37821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37821">CVE-2025-37821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242864">SUSE bug 1242864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37841</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37841" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37841" ref_url="https://www.suse.com/security/cve/CVE-2025-37841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pm: cpupower: bench: Prevent NULL dereference on malloc failure

If malloc returns NULL due to low memory, 'config' pointer can be NULL.
Add a check to prevent NULL dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37841/">CVE-2025-37841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37841">CVE-2025-37841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242974">SUSE bug 1242974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37845</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37845" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37845" ref_url="https://www.suse.com/security/cve/CVE-2025-37845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: fprobe events: Fix possible UAF on modules

Commit ac91052f0ae5 ("tracing: tprobe-events: Fix leakage of module
refcount") moved try_module_get() from __find_tracepoint_module_cb()
to find_tracepoint() caller, but that introduced a possible UAF
because the module can be unloaded before try_module_get(). In this
case, the module object should be freed too. Thus, try_module_get()
does not only fail but may access to the freed object.

To avoid that, try_module_get() in __find_tracepoint_module_cb()
again.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37845/">CVE-2025-37845 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37845">CVE-2025-37845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242986">SUSE bug 1242986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37849</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37849" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37849" ref_url="https://www.suse.com/security/cve/CVE-2025-37849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Tear down vGIC on failed vCPU creation

If kvm_arch_vcpu_create() fails to share the vCPU page with the
hypervisor, we propagate the error back to the ioctl but leave the
vGIC vCPU data initialised. Note only does this leak the corresponding
memory when the vCPU is destroyed but it can also lead to use-after-free
if the redistributor device handling tries to walk into the vCPU.

Add the missing cleanup to kvm_arch_vcpu_create(), ensuring that the
vGIC vCPU structures are destroyed on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-37849/">CVE-2025-37849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37849">CVE-2025-37849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243000">SUSE bug 1243000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37856</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37856" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37856" ref_url="https://www.suse.com/security/cve/CVE-2025-37856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: harden block_group::bg_list against list_del() races

As far as I can tell, these calls of list_del_init() on bg_list cannot
run concurrently with btrfs_mark_bg_unused() or btrfs_mark_bg_to_reclaim(),
as they are in transaction error paths and situations where the block
group is readonly.

However, if there is any chance at all of racing with mark_bg_unused(),
or a different future user of bg_list, better to be safe than sorry.

Otherwise we risk the following interleaving (bg_list refcount in parens)

T1 (some random op)                       T2 (btrfs_mark_bg_unused)
                                        !list_empty(&amp;bg-&gt;bg_list); (1)
list_del_init(&amp;bg-&gt;bg_list); (1)
                                        list_move_tail (1)
btrfs_put_block_group (0)
                                        btrfs_delete_unused_bgs
                                             bg = list_first_entry
                                             list_del_init(&amp;bg-&gt;bg_list);
                                             btrfs_put_block_group(bg); (-1)

Ultimately, this results in a broken ref count that hits zero one deref
early and the real final deref underflows the refcount, resulting in a WARNING.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37856/">CVE-2025-37856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37856">CVE-2025-37856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243068">SUSE bug 1243068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37861</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37861" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37861" ref_url="https://www.suse.com/security/cve/CVE-2025-37861" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue

When the task management thread processes reply queues while the reset
thread resets them, the task management thread accesses an invalid queue ID
(0xFFFF), set by the reset thread, which points to unallocated memory,
causing a crash.

Add flag 'io_admin_reset_sync' to synchronize access between the reset,
I/O, and admin threads. Before a reset, the reset handler sets this flag to
block I/O and admin processing threads. If any thread bypasses the initial
check, the reset thread waits up to 10 seconds for processing to finish. If
the wait exceeds 10 seconds, the controller is marked as unrecoverable.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37861/">CVE-2025-37861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37861">CVE-2025-37861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243055">SUSE bug 1243055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37864</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37864" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37864" ref_url="https://www.suse.com/security/cve/CVE-2025-37864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: clean up FDB, MDB, VLAN entries on unbind

As explained in many places such as commit b117e1e8a86d ("net: dsa:
delete dsa_legacy_fdb_add and dsa_legacy_fdb_del"), DSA is written given
the assumption that higher layers have balanced additions/deletions.
As such, it only makes sense to be extremely vocal when those
assumptions are violated and the driver unbinds with entries still
present.

But Ido Schimmel points out a very simple situation where that is wrong:
https://lore.kernel.org/netdev/ZDazSM5UsPPjQuKr@shredder/
(also briefly discussed by me in the aforementioned commit).

Basically, while the bridge bypass operations are not something that DSA
explicitly documents, and for the majority of DSA drivers this API
simply causes them to go to promiscuous mode, that isn't the case for
all drivers. Some have the necessary requirements for bridge bypass
operations to do something useful - see dsa_switch_supports_uc_filtering().

Although in tools/testing/selftests/net/forwarding/local_termination.sh,
we made an effort to popularize better mechanisms to manage address
filters on DSA interfaces from user space - namely macvlan for unicast,
and setsockopt(IP_ADD_MEMBERSHIP) - through mtools - for multicast, the
fact is that 'bridge fdb add ... self static local' also exists as
kernel UAPI, and might be useful to someone, even if only for a quick
hack.

It seems counter-productive to block that path by implementing shim
.ndo_fdb_add and .ndo_fdb_del operations which just return -EOPNOTSUPP
in order to prevent the ndo_dflt_fdb_add() and ndo_dflt_fdb_del() from
running, although we could do that.

Accepting that cleanup is necessary seems to be the only option.
Especially since we appear to be coming back at this from a different
angle as well. Russell King is noticing that the WARN_ON() triggers even
for VLANs:
https://lore.kernel.org/netdev/Z_li8Bj8bD4-BYKQ@shell.armlinux.org.uk/

What happens in the bug report above is that dsa_port_do_vlan_del() fails,
then the VLAN entry lingers on, and then we warn on unbind and leak it.

This is not a straight revert of the blamed commit, but we now add an
informational print to the kernel log (to still have a way to see
that bugs exist), and some extra comments gathered from past years'
experience, to justify the logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37864/">CVE-2025-37864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37864">CVE-2025-37864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242965">SUSE bug 1242965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37904</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37904" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37904" ref_url="https://www.suse.com/security/cve/CVE-2025-37904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix the inode leak in btrfs_iget()

[BUG]
There is a bug report that a syzbot reproducer can lead to the following
busy inode at unmount time:

  BTRFS info (device loop1): last unmount of filesystem 1680000e-3c1e-4c46-84b6-56bd3909af50
  VFS: Busy inodes after unmount of loop1 (btrfs)
  ------------[ cut here ]------------
  kernel BUG at fs/super.c:650!
  Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI
  CPU: 0 UID: 0 PID: 48168 Comm: syz-executor Not tainted 6.15.0-rc2-00471-g119009db2674 #2 PREEMPT(full)
  Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
  RIP: 0010:generic_shutdown_super+0x2e9/0x390 fs/super.c:650
  Call Trace:
   &lt;TASK&gt;
   kill_anon_super+0x3a/0x60 fs/super.c:1237
   btrfs_kill_super+0x3b/0x50 fs/btrfs/super.c:2099
   deactivate_locked_super+0xbe/0x1a0 fs/super.c:473
   deactivate_super fs/super.c:506 [inline]
   deactivate_super+0xe2/0x100 fs/super.c:502
   cleanup_mnt+0x21f/0x440 fs/namespace.c:1435
   task_work_run+0x14d/0x240 kernel/task_work.c:227
   resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
   exit_to_user_mode_loop kernel/entry/common.c:114 [inline]
   exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline]
   __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
   syscall_exit_to_user_mode+0x269/0x290 kernel/entry/common.c:218
   do_syscall_64+0xd4/0x250 arch/x86/entry/syscall_64.c:100
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
   &lt;/TASK&gt;

[CAUSE]
When btrfs_alloc_path() failed, btrfs_iget() directly returned without
releasing the inode already allocated by btrfs_iget_locked().

This results the above busy inode and trigger the kernel BUG.

[FIX]
Fix it by calling iget_failed() if btrfs_alloc_path() failed.

If we hit error inside btrfs_read_locked_inode(), it will properly call
iget_failed(), so nothing to worry about.

Although the iget_failed() cleanup inside btrfs_read_locked_inode() is a
break of the normal error handling scheme, let's fix the obvious bug
and backport first, then rework the error handling later.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37904/">CVE-2025-37904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37904">CVE-2025-37904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243452">SUSE bug 1243452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37916</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37916" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37916" ref_url="https://www.suse.com/security/cve/CVE-2025-37916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pds_core: remove write-after-free of client_id

A use-after-free error popped up in stress testing:

[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]
[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):
[Mon Apr 21 21:21:33 2025]  pdsc_auxbus_dev_del+0xef/0x160 [pds_core]
[Mon Apr 21 21:21:33 2025]  pdsc_remove+0xc0/0x1b0 [pds_core]
[Mon Apr 21 21:21:33 2025]  pci_device_remove+0x24/0x70
[Mon Apr 21 21:21:33 2025]  device_release_driver_internal+0x11f/0x180
[Mon Apr 21 21:21:33 2025]  driver_detach+0x45/0x80
[Mon Apr 21 21:21:33 2025]  bus_remove_driver+0x83/0xe0
[Mon Apr 21 21:21:33 2025]  pci_unregister_driver+0x1a/0x80

The actual device uninit usually happens on a separate thread
scheduled after this code runs, but there is no guarantee of order
of thread execution, so this could be a problem.  There's no
actual need to clear the client_id at this point, so simply
remove the offending code.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37916/">CVE-2025-37916 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37916">CVE-2025-37916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243474">SUSE bug 1243474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243535">SUSE bug 1243535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37955</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37955" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37955" ref_url="https://www.suse.com/security/cve/CVE-2025-37955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-net: free xsk_buffs on error in virtnet_xsk_pool_enable()

The selftests added to our CI by Bui Quang Minh recently reveals
that there is a mem leak on the error path of virtnet_xsk_pool_enable():

unreferenced object 0xffff88800a68a000 (size 2048):
  comm "xdp_helper", pid 318, jiffies 4294692778
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 0):
    __kvmalloc_node_noprof+0x402/0x570
    virtnet_xsk_pool_enable+0x293/0x6a0 (drivers/net/virtio_net.c:5882)
    xp_assign_dev+0x369/0x670 (net/xdp/xsk_buff_pool.c:226)
    xsk_bind+0x6a5/0x1ae0
    __sys_bind+0x15e/0x230
    __x64_sys_bind+0x72/0xb0
    do_syscall_64+0xc1/0x1d0
    entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37955/">CVE-2025-37955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37955">CVE-2025-37955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243507">SUSE bug 1243507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38006</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38006" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38006" ref_url="https://www.suse.com/security/cve/CVE-2025-38006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mctp: Don't access ifa_index when missing

In mctp_dump_addrinfo, ifa_index can be used to filter interfaces, but
only when the struct ifaddrmsg is provided. Otherwise it will be
comparing to uninitialised memory - reproducible in the syzkaller case from
dhcpd, or busybox "ip addr show".

The kernel MCTP implementation has always filtered by ifa_index, so
existing userspace programs expecting to dump MCTP addresses must
already be passing a valid ifa_index value (either 0 or a real index).

BUG: KMSAN: uninit-value in mctp_dump_addrinfo+0x208/0xac0 net/mctp/device.c:128
 mctp_dump_addrinfo+0x208/0xac0 net/mctp/device.c:128
 rtnl_dump_all+0x3ec/0x5b0 net/core/rtnetlink.c:4380
 rtnl_dumpit+0xd5/0x2f0 net/core/rtnetlink.c:6824
 netlink_dump+0x97b/0x1690 net/netlink/af_netlink.c:2309
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38006/">CVE-2025-38006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38006">CVE-2025-38006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244930">SUSE bug 1244930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38008</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38008" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38008" ref_url="https://www.suse.com/security/cve/CVE-2025-38008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/page_alloc: fix race condition in unaccepted memory handling

The page allocator tracks the number of zones that have unaccepted memory
using static_branch_enc/dec() and uses that static branch in hot paths to
determine if it needs to deal with unaccepted memory.

Borislav and Thomas pointed out that the tracking is racy: operations on
static_branch are not serialized against adding/removing unaccepted pages
to/from the zone.

Sanity checks inside static_branch machinery detects it:

WARNING: CPU: 0 PID: 10 at kernel/jump_label.c:276 __static_key_slow_dec_cpuslocked+0x8e/0xa0

The comment around the WARN() explains the problem:

	/*
	 * Warn about the '-1' case though; since that means a
	 * decrement is concurrent with a first (0-&gt;1) increment. IOW
	 * people are trying to disable something that wasn't yet fully
	 * enabled. This suggests an ordering problem on the user side.
	 */

The effect of this static_branch optimization is only visible on
microbenchmark.

Instead of adding more complexity around it, remove it altogether.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38008/">CVE-2025-38008 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38008">CVE-2025-38008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244939">SUSE bug 1244939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38019</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38019" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38019" ref_url="https://www.suse.com/security/cve/CVE-2025-38019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_router: Fix use-after-free when deleting GRE net devices

The driver only offloads neighbors that are constructed on top of net
devices registered by it or their uppers (which are all Ethernet). The
device supports GRE encapsulation and decapsulation of forwarded
traffic, but the driver will not offload dummy neighbors constructed on
top of GRE net devices as they are not uppers of its net devices:

 # ip link add name gre1 up type gre tos inherit local 192.0.2.1 remote 198.51.100.1
 # ip neigh add 0.0.0.0 lladdr 0.0.0.0 nud noarp dev gre1
 $ ip neigh show dev gre1 nud noarp
 0.0.0.0 lladdr 0.0.0.0 NOARP

(Note that the neighbor is not marked with 'offload')

When the driver is reloaded and the existing configuration is replayed,
the driver does not perform the same check regarding existing neighbors
and offloads the previously added one:

 # devlink dev reload pci/0000:01:00.0
 $ ip neigh show dev gre1 nud noarp
 0.0.0.0 lladdr 0.0.0.0 offload NOARP

If the neighbor is later deleted, the driver will ignore the
notification (given the GRE net device is not its upper) and will
therefore keep referencing freed memory, resulting in a use-after-free
[1] when the net device is deleted:

 # ip neigh del 0.0.0.0 lladdr 0.0.0.0 dev gre1
 # ip link del dev gre1

Fix by skipping neighbor replay if the net device for which the replay
is performed is not our upper.

[1]
BUG: KASAN: slab-use-after-free in mlxsw_sp_neigh_entry_update+0x1ea/0x200
Read of size 8 at addr ffff888155b0e420 by task ip/2282
[...]
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x6f/0xa0
 print_address_description.constprop.0+0x6f/0x350
 print_report+0x108/0x205
 kasan_report+0xdf/0x110
 mlxsw_sp_neigh_entry_update+0x1ea/0x200
 mlxsw_sp_router_rif_gone_sync+0x2a8/0x440
 mlxsw_sp_rif_destroy+0x1e9/0x750
 mlxsw_sp_netdevice_ipip_ol_event+0x3c9/0xdc0
 mlxsw_sp_router_netdevice_event+0x3ac/0x15e0
 notifier_call_chain+0xca/0x150
 call_netdevice_notifiers_info+0x7f/0x100
 unregister_netdevice_many_notify+0xc8c/0x1d90
 rtnl_dellink+0x34e/0xa50
 rtnetlink_rcv_msg+0x6fb/0xb70
 netlink_rcv_skb+0x131/0x360
 netlink_unicast+0x426/0x710
 netlink_sendmsg+0x75a/0xc20
 __sock_sendmsg+0xc1/0x150
 ____sys_sendmsg+0x5aa/0x7b0
 ___sys_sendmsg+0xfc/0x180
 __sys_sendmsg+0x121/0x1b0
 do_syscall_64+0xbb/0x1d0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38019/">CVE-2025-38019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38019">CVE-2025-38019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245000">SUSE bug 1245000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38034</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38034" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38034" ref_url="https://www.suse.com/security/cve/CVE-2025-38034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref

btrfs_prelim_ref() calls the old and new reference variables in the
incorrect order. This causes a NULL pointer dereference because oldref
is passed as NULL to trace_btrfs_prelim_ref_insert().

Note, trace_btrfs_prelim_ref_insert() is being called with newref as
oldref (and oldref as NULL) on purpose in order to print out
the values of newref.

To reproduce:
echo 1 &gt; /sys/kernel/debug/tracing/events/btrfs/btrfs_prelim_ref_insert/enable

Perform some writeback operations.

Backtrace:
BUG: kernel NULL pointer dereference, address: 0000000000000018
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 115949067 P4D 115949067 PUD 11594a067 PMD 0
 Oops: Oops: 0000 [#1] SMP NOPTI
 CPU: 1 UID: 0 PID: 1188 Comm: fsstress Not tainted 6.15.0-rc2-tester+ #47 PREEMPT(voluntary)  7ca2cef72d5e9c600f0c7718adb6462de8149622
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-2-gc13ff2cd-prebuilt.qemu.org 04/01/2014
 RIP: 0010:trace_event_raw_event_btrfs__prelim_ref+0x72/0x130
 Code: e8 43 81 9f ff 48 85 c0 74 78 4d 85 e4 0f 84 8f 00 00 00 49 8b 94 24 c0 06 00 00 48 8b 0a 48 89 48 08 48 8b 52 08 48 89 50 10 &lt;49&gt; 8b 55 18 48 89 50 18 49 8b 55 20 48 89 50 20 41 0f b6 55 28 88
 RSP: 0018:ffffce44820077a0 EFLAGS: 00010286
 RAX: ffff8c6b403f9014 RBX: ffff8c6b55825730 RCX: 304994edf9cf506b
 RDX: d8b11eb7f0fdb699 RSI: ffff8c6b403f9010 RDI: ffff8c6b403f9010
 RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000010
 R10: 00000000ffffffff R11: 0000000000000000 R12: ffff8c6b4e8fb000
 R13: 0000000000000000 R14: ffffce44820077a8 R15: ffff8c6b4abd1540
 FS:  00007f4dc6813740(0000) GS:ffff8c6c1d378000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000018 CR3: 000000010eb42000 CR4: 0000000000750ef0
 PKRU: 55555554
 Call Trace:
  &lt;TASK&gt;
  prelim_ref_insert+0x1c1/0x270
  find_parent_nodes+0x12a6/0x1ee0
  ? __entry_text_end+0x101f06/0x101f09
  ? srso_alias_return_thunk+0x5/0xfbef5
  ? srso_alias_return_thunk+0x5/0xfbef5
  ? srso_alias_return_thunk+0x5/0xfbef5
  ? srso_alias_return_thunk+0x5/0xfbef5
  btrfs_is_data_extent_shared+0x167/0x640
  ? fiemap_process_hole+0xd0/0x2c0
  extent_fiemap+0xa5c/0xbc0
  ? __entry_text_end+0x101f05/0x101f09
  btrfs_fiemap+0x7e/0xd0
  do_vfs_ioctl+0x425/0x9d0
  __x64_sys_ioctl+0x75/0xc0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38034/">CVE-2025-38034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38034">CVE-2025-38034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244792">SUSE bug 1244792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38038</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38038" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38038" ref_url="https://www.suse.com/security/cve/CVE-2025-38038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: amd-pstate: Remove unnecessary driver_lock in set_boost

set_boost is a per-policy function call, hence a driver wide lock is
unnecessary. Also this mutex_acquire can collide with the mutex_acquire
from the mode-switch path in status_store(), which can lead to a
deadlock. So, remove it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38038/">CVE-2025-38038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38038">CVE-2025-38038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244812">SUSE bug 1244812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38052</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38052" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38052" ref_url="https://www.suse.com/security/cve/CVE-2025-38052" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001874.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12752" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done

Syzbot reported a slab-use-after-free with the following call trace:

  ==================================================================
  BUG: KASAN: slab-use-after-free in tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840
  Read of size 8 at addr ffff88807a733000 by task kworker/1:0/25

  Call Trace:
   kasan_report+0xd9/0x110 mm/kasan/report.c:601
   tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840
   crypto_request_complete include/crypto/algapi.h:266
   aead_request_complete include/crypto/internal/aead.h:85
   cryptd_aead_crypt+0x3b8/0x750 crypto/cryptd.c:772
   crypto_request_complete include/crypto/algapi.h:266
   cryptd_queue_worker+0x131/0x200 crypto/cryptd.c:181
   process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231

  Allocated by task 8355:
   kzalloc_noprof include/linux/slab.h:778
   tipc_crypto_start+0xcc/0x9e0 net/tipc/crypto.c:1466
   tipc_init_net+0x2dd/0x430 net/tipc/core.c:72
   ops_init+0xb9/0x650 net/core/net_namespace.c:139
   setup_net+0x435/0xb40 net/core/net_namespace.c:343
   copy_net_ns+0x2f0/0x670 net/core/net_namespace.c:508
   create_new_namespaces+0x3ea/0xb10 kernel/nsproxy.c:110
   unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:228
   ksys_unshare+0x419/0x970 kernel/fork.c:3323
   __do_sys_unshare kernel/fork.c:3394

  Freed by task 63:
   kfree+0x12a/0x3b0 mm/slub.c:4557
   tipc_crypto_stop+0x23c/0x500 net/tipc/crypto.c:1539
   tipc_exit_net+0x8c/0x110 net/tipc/core.c:119
   ops_exit_list+0xb0/0x180 net/core/net_namespace.c:173
   cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640
   process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231

After freed the tipc_crypto tx by delete namespace, tipc_aead_encrypt_done
may still visit it in cryptd_queue_worker workqueue.

I reproduce this issue by:
  ip netns add ns1
  ip link add veth1 type veth peer name veth2
  ip link set veth1 netns ns1
  ip netns exec ns1 tipc bearer enable media eth dev veth1
  ip netns exec ns1 tipc node set key this_is_a_master_key master
  ip netns exec ns1 tipc bearer disable media eth dev veth1
  ip netns del ns1

The key of reproduction is that, simd_aead_encrypt is interrupted, leading
to crypto_simd_usable() return false. Thus, the cryptd_queue_worker is
triggered, and the tipc_crypto tx will be visited.

  tipc_disc_timeout
    tipc_bearer_xmit_skb
      tipc_crypto_xmit
        tipc_aead_encrypt
          crypto_aead_encrypt
            // encrypt()
            simd_aead_encrypt
              // crypto_simd_usable() is false
              child = &amp;ctx-&gt;cryptd_tfm-&gt;base;

  simd_aead_encrypt
    crypto_aead_encrypt
      // encrypt()
      cryptd_aead_encrypt_enqueue
        cryptd_aead_enqueue
          cryptd_enqueue_request
            // trigger cryptd_queue_worker
            queue_work_on(smp_processor_id(), cryptd_wq, &amp;cpu_queue-&gt;work)

Fix this by holding net reference count before encrypt.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38052/">CVE-2025-38052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38052">CVE-2025-38052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244749">SUSE bug 1244749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38058</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38058" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38058" ref_url="https://www.suse.com/security/cve/CVE-2025-38058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

__legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock

... or we risk stealing final mntput from sync umount - raising mnt_count
after umount(2) has verified that victim is not busy, but before it
has set MNT_SYNC_UMOUNT; in that case __legitimize_mnt() doesn't see
that it's safe to quietly undo mnt_count increment and leaves dropping
the reference to caller, where it'll be a full-blown mntput().

Check under mount_lock is needed; leaving the current one done before
taking that makes no sense - it's nowhere near common enough to bother
with.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38058/">CVE-2025-38058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38058">CVE-2025-38058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245151">SUSE bug 1245151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38062</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38062" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38062" ref_url="https://www.suse.com/security/cve/CVE-2025-38062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

genirq/msi: Store the IOMMU IOVA directly in msi_desc instead of iommu_cookie

The IOMMU translation for MSI message addresses has been a 2-step process,
separated in time:

 1) iommu_dma_prepare_msi(): A cookie pointer containing the IOVA address
    is stored in the MSI descriptor when an MSI interrupt is allocated.

 2) iommu_dma_compose_msi_msg(): this cookie pointer is used to compute a
    translated message address.

This has an inherent lifetime problem for the pointer stored in the cookie
that must remain valid between the two steps. However, there is no locking
at the irq layer that helps protect the lifetime. Today, this works under
the assumption that the iommu domain is not changed while MSI interrupts
being programmed. This is true for normal DMA API users within the kernel,
as the iommu domain is attached before the driver is probed and cannot be
changed while a driver is attached.

Classic VFIO type1 also prevented changing the iommu domain while VFIO was
running as it does not support changing the "container" after starting up.

However, iommufd has improved this so that the iommu domain can be changed
during VFIO operation. This potentially allows userspace to directly race
VFIO_DEVICE_ATTACH_IOMMUFD_PT (which calls iommu_attach_group()) and
VFIO_DEVICE_SET_IRQS (which calls into iommu_dma_compose_msi_msg()).

This potentially causes both the cookie pointer and the unlocked call to
iommu_get_domain_for_dev() on the MSI translation path to become UAFs.

Fix the MSI cookie UAF by removing the cookie pointer. The translated IOVA
address is already known during iommu_dma_prepare_msi() and cannot change.
Thus, it can simply be stored as an integer in the MSI descriptor.

The other UAF related to iommu_get_domain_for_dev() will be addressed in
patch "iommu: Make iommu_dma_prepare_msi() into a generic operation" by
using the IOMMU group mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38062/">CVE-2025-38062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38062">CVE-2025-38062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245216">SUSE bug 1245216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38075</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38075" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38075" ref_url="https://www.suse.com/security/cve/CVE-2025-38075" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: iscsi: Fix timeout on deleted connection

NOPIN response timer may expire on a deleted connection and crash with
such logs:

Did not receive response to NOPIN on CID: 0, failing connection for I_T Nexus (null),i,0x00023d000125,iqn.2017-01.com.iscsi.target,t,0x3d

BUG: Kernel NULL pointer dereference on read at 0x00000000
NIP  strlcpy+0x8/0xb0
LR iscsit_fill_cxn_timeout_err_stats+0x5c/0xc0 [iscsi_target_mod]
Call Trace:
 iscsit_handle_nopin_response_timeout+0xfc/0x120 [iscsi_target_mod]
 call_timer_fn+0x58/0x1f0
 run_timer_softirq+0x740/0x860
 __do_softirq+0x16c/0x420
 irq_exit+0x188/0x1c0
 timer_interrupt+0x184/0x410

That is because nopin response timer may be re-started on nopin timer
expiration.

Stop nopin timer before stopping the nopin response timer to be sure
that no one of them will be re-started.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38075/">CVE-2025-38075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38075">CVE-2025-38075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244734">SUSE bug 1244734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38084</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38084" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38084" ref_url="https://www.suse.com/security/cve/CVE-2025-38084" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: unshare page tables during VMA split, not before

Currently, __split_vma() triggers hugetlb page table unsharing through
vm_ops-&gt;may_split().  This happens before the VMA lock and rmap locks are
taken - which is too early, it allows racing VMA-locked page faults in our
process and racing rmap walks from other processes to cause page tables to
be shared again before we actually perform the split.

Fix it by explicitly calling into the hugetlb unshare logic from
__split_vma() in the same place where THP splitting also happens.  At that
point, both the VMA and the rmap(s) are write-locked.

An annoying detail is that we can now call into the helper
hugetlb_unshare_pmds() from two different locking contexts:

1. from hugetlb_split(), holding:
    - mmap lock (exclusively)
    - VMA lock
    - file rmap lock (exclusively)
2. hugetlb_unshare_all_pmds(), which I think is designed to be able to
   call us with only the mmap lock held (in shared mode), but currently
   only runs while holding mmap lock (exclusively) and VMA lock

Backporting note:
This commit fixes a racy protection that was introduced in commit
b30c14cd6102 ("hugetlb: unshare some PMDs when splitting VMAs"); that
commit claimed to fix an issue introduced in 5.13, but it should actually
also go all the way back.

[jannh@google.com: v2]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38084/">CVE-2025-38084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38084">CVE-2025-38084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245498">SUSE bug 1245498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38085</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38085" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38085" ref_url="https://www.suse.com/security/cve/CVE-2025-38085" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001909.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race

huge_pmd_unshare() drops a reference on a page table that may have
previously been shared across processes, potentially turning it into a
normal page table used in another process in which unrelated VMAs can
afterwards be installed.

If this happens in the middle of a concurrent gup_fast(), gup_fast() could
end up walking the page tables of another process.  While I don't see any
way in which that immediately leads to kernel memory corruption, it is
really weird and unexpected.

Fix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),
just like we do in khugepaged when removing page tables for a THP
collapse.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38085/">CVE-2025-38085 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38085">CVE-2025-38085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245499">SUSE bug 1245499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38087</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38087" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38087" ref_url="https://www.suse.com/security/cve/CVE-2025-38087" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03104-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03106-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03108-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03109-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03111-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03213-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03215-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03223-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03235-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20702-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20709-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20763-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20775-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20776-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20779-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20780-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: fix use-after-free in taprio_dev_notifier

Since taprio's taprio_dev_notifier() isn't protected by an
RCU read-side critical section, a race with advance_sched()
can lead to a use-after-free.

Adding rcu_read_lock() inside taprio_dev_notifier() prevents this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38087/">CVE-2025-38087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38087">CVE-2025-38087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245504">SUSE bug 1245504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245505">SUSE bug 1245505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38088</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38088" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38088" ref_url="https://www.suse.com/security/cve/CVE-2025-38088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap

memtrace mmap issue has an out of bounds issue. This patch fixes the by
checking that the requested mapping region size should stay within the
allocated region size.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38088/">CVE-2025-38088 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38088">CVE-2025-38088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245506">SUSE bug 1245506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245507">SUSE bug 1245507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38089</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38089" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38089" ref_url="https://www.suse.com/security/cve/CVE-2025-38089" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11411" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03472-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03494-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03495-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03566-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03567-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03575-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20806-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20813-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20815-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20816-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20819-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20826-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20828-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20829-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20830-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20831-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20835-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20836-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20837-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20838-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sunrpc: handle SVC_GARBAGE during svc auth processing as auth error

tianshuo han reported a remotely-triggerable crash if the client sends a
kernel RPC server a specially crafted packet. If decoding the RPC reply
fails in such a way that SVC_GARBAGE is returned without setting the
rq_accept_statp pointer, then that pointer can be dereferenced and a
value stored there.

If it's the first time the thread has processed an RPC, then that
pointer will be set to NULL and the kernel will crash. In other cases,
it could create a memory scribble.

The server sunrpc code treats a SVC_GARBAGE return from svc_authenticate
or pg_authenticate as if it should send a GARBAGE_ARGS reply. RFC 5531
says that if authentication fails that the RPC should be rejected
instead with a status of AUTH_ERR.

Handle a SVC_GARBAGE return as an AUTH_ERROR, with a reason of
AUTH_BADCRED instead of returning GARBAGE_ARGS in that case. This
sidesteps the whole problem of touching the rpc_accept_statp pointer in
this situation and avoids the crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38089/">CVE-2025-38089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38089">CVE-2025-38089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245508">SUSE bug 1245508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245509">SUSE bug 1245509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38090</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38090" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38090" ref_url="https://www.suse.com/security/cve/CVE-2025-38090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers/rapidio/rio_cm.c: prevent possible heap overwrite

In

riocm_cdev_ioctl(RIO_CM_CHAN_SEND)
   -&gt; cm_chan_msg_send()
      -&gt; riocm_ch_send()

cm_chan_msg_send() checks that userspace didn't send too much data but
riocm_ch_send() failed to check that userspace sent sufficient data.  The
result is that riocm_ch_send() can write to fields in the rio_ch_chan_hdr
which were outside the bounds of the space which cm_chan_msg_send()
allocated.

Address this by teaching riocm_ch_send() to check that the entire
rio_ch_chan_hdr was copied in from userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38090/">CVE-2025-38090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38090">CVE-2025-38090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245510">SUSE bug 1245510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245511">SUSE bug 1245511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38091</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38091" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38091" ref_url="https://www.suse.com/security/cve/CVE-2025-38091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: check stream id dml21 wrapper to get plane_id

[Why &amp; How]
Fix a false positive warning which occurs due to lack of correct checks
when querying plane_id in DML21. This fixes the warning when performing a
mode1 reset (cat /sys/kernel/debug/dri/1/amdgpu_gpu_recover):

[   35.751250] WARNING: CPU: 11 PID: 326 at /tmp/amd.PHpyAl7v/amd/amdgpu/../display/dc/dml2/dml2_dc_resource_mgmt.c:91 dml2_map_dc_pipes+0x243d/0x3f40 [amdgpu]
[   35.751434] Modules linked in: amdgpu(OE) amddrm_ttm_helper(OE) amdttm(OE) amddrm_buddy(OE) amdxcp(OE) amddrm_exec(OE) amd_sched(OE) amdkcl(OE) drm_suballoc_helper drm_ttm_helper ttm drm_display_helper cec rc_core i2c_algo_bit rfcomm qrtr cmac algif_hash algif_skcipher af_alg bnep amd_atl intel_rapl_msr intel_rapl_common snd_hda_codec_hdmi snd_hda_intel edac_mce_amd snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec kvm_amd snd_hda_core snd_hwdep snd_pcm kvm snd_seq_midi snd_seq_midi_event snd_rawmidi crct10dif_pclmul polyval_clmulni polyval_generic btusb ghash_clmulni_intel sha256_ssse3 btrtl sha1_ssse3 snd_seq btintel aesni_intel btbcm btmtk snd_seq_device crypto_simd sunrpc cryptd bluetooth snd_timer ccp binfmt_misc rapl snd i2c_piix4 wmi_bmof gigabyte_wmi k10temp i2c_smbus soundcore gpio_amdpt mac_hid sch_fq_codel msr parport_pc ppdev lp parport efi_pstore nfnetlink dmi_sysfs ip_tables x_tables autofs4 hid_generic usbhid hid crc32_pclmul igc ahci xhci_pci libahci xhci_pci_renesas video wmi
[   35.751501] CPU: 11 UID: 0 PID: 326 Comm: kworker/u64:9 Tainted: G           OE      6.11.0-21-generic #21~24.04.1-Ubuntu
[   35.751504] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
[   35.751505] Hardware name: Gigabyte Technology Co., Ltd. X670E AORUS PRO X/X670E AORUS PRO X, BIOS F30 05/22/2024
[   35.751506] Workqueue: amdgpu-reset-dev amdgpu_debugfs_reset_work [amdgpu]
[   35.751638] RIP: 0010:dml2_map_dc_pipes+0x243d/0x3f40 [amdgpu]
[   35.751794] Code: 6d 0c 00 00 8b 84 24 88 00 00 00 41 3b 44 9c 20 0f 84 fc 07 00 00 48 83 c3 01 48 83 fb 06 75 b3 4c 8b 64 24 68 4c 8b 6c 24 40 &lt;0f&gt; 0b b8 06 00 00 00 49 8b 94 24 a0 49 00 00 89 c3 83 f8 07 0f 87
[   35.751796] RSP: 0018:ffffbfa3805d7680 EFLAGS: 00010246
[   35.751798] RAX: 0000000000010000 RBX: 0000000000000006 RCX: 0000000000000000
[   35.751799] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000000
[   35.751800] RBP: ffffbfa3805d78f0 R08: 0000000000000000 R09: 0000000000000000
[   35.751801] R10: 0000000000000000 R11: 0000000000000000 R12: ffffbfa383249000
[   35.751802] R13: ffffa0e68f280000 R14: ffffbfa383249658 R15: 0000000000000000
[   35.751803] FS:  0000000000000000(0000) GS:ffffa0edbe580000(0000) knlGS:0000000000000000
[   35.751804] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   35.751805] CR2: 00005d847ef96c58 CR3: 000000041de3e000 CR4: 0000000000f50ef0
[   35.751806] PKRU: 55555554
[   35.751807] Call Trace:
[   35.751810]  &lt;TASK&gt;
[   35.751816]  ? show_regs+0x6c/0x80
[   35.751820]  ? __warn+0x88/0x140
[   35.751822]  ? dml2_map_dc_pipes+0x243d/0x3f40 [amdgpu]
[   35.751964]  ? report_bug+0x182/0x1b0
[   35.751969]  ? handle_bug+0x6e/0xb0
[   35.751972]  ? exc_invalid_op+0x18/0x80
[   35.751974]  ? asm_exc_invalid_op+0x1b/0x20
[   35.751978]  ? dml2_map_dc_pipes+0x243d/0x3f40 [amdgpu]
[   35.752117]  ? math_pow+0x48/0xa0 [amdgpu]
[   35.752256]  ? srso_alias_return_thunk+0x5/0xfbef5
[   35.752260]  ? math_pow+0x48/0xa0 [amdgpu]
[   35.752400]  ? srso_alias_return_thunk+0x5/0xfbef5
[   35.752403]  ? math_pow+0x11/0xa0 [amdgpu]
[   35.752524]  ? srso_alias_return_thunk+0x5/0xfbef5
[   35.752526]  ? core_dcn4_mode_programming+0xe4d/0x20d0 [amdgpu]
[   35.752663]  ? srso_alias_return_thunk+0x5/0xfbef5
[   35.752669]  dml21_validate+0x3d4/0x980 [amdgpu]

(cherry picked from commit f8ad62c0a93e5dd94243e10f1b742232e4d6411e)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38091/">CVE-2025-38091 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38091">CVE-2025-38091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245621">SUSE bug 1245621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38095</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38095" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38095" ref_url="https://www.suse.com/security/cve/CVE-2025-38095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-buf: insert memory barrier before updating num_fences

smp_store_mb() inserts memory barrier after storing operation.
It is different with what the comment is originally aiming so Null
pointer dereference can be happened if memory update is reordered.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38095/">CVE-2025-38095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38095">CVE-2025-38095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245658">SUSE bug 1245658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38096</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38096" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38096" ref_url="https://www.suse.com/security/cve/CVE-2025-38096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: don't warn when if there is a FW error

iwl_trans_reclaim is warning if it is called when the FW is not alive.
But if it is called when there is a pending restart, i.e. after a FW
error, there is no need to warn, instead - return silently.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38096/">CVE-2025-38096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38096">CVE-2025-38096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245657">SUSE bug 1245657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38098</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38098" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38098" ref_url="https://www.suse.com/security/cve/CVE-2025-38098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Don't treat wb connector as physical in create_validate_stream_for_sink

Don't try to operate on a drm_wb_connector as an amdgpu_dm_connector.
While dereferencing aconnector-&gt;base will "work" it's wrong and
might lead to unknown bad things. Just... don't.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38098/">CVE-2025-38098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38098">CVE-2025-38098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245654">SUSE bug 1245654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38099</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38099" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38099" ref_url="https://www.suse.com/security/cve/CVE-2025-38099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Disable SCO support if READ_VOICE_SETTING is unsupported/broken

A SCO connection without the proper voice_setting can cause
the controller to lock up.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38099/">CVE-2025-38099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38099">CVE-2025-38099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245671">SUSE bug 1245671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38101</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38101" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38101" ref_url="https://www.suse.com/security/cve/CVE-2025-38101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Fix buffer locking in ring_buffer_subbuf_order_set()

Enlarge the critical section in ring_buffer_subbuf_order_set() to
ensure that error handling takes place with per-buffer mutex held,
thus preventing list corruption and other concurrency-related issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38101/">CVE-2025-38101 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38101">CVE-2025-38101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245659">SUSE bug 1245659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38102</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38102" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38102" ref_url="https://www.suse.com/security/cve/CVE-2025-38102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify

During our test, it is found that a warning can be trigger in try_grab_folio
as follow:

  ------------[ cut here ]------------
  WARNING: CPU: 0 PID: 1678 at mm/gup.c:147 try_grab_folio+0x106/0x130
  Modules linked in:
  CPU: 0 UID: 0 PID: 1678 Comm: syz.3.31 Not tainted 6.15.0-rc5 #163 PREEMPT(undef)
  RIP: 0010:try_grab_folio+0x106/0x130
  Call Trace:
   &lt;TASK&gt;
   follow_huge_pmd+0x240/0x8e0
   follow_pmd_mask.constprop.0.isra.0+0x40b/0x5c0
   follow_pud_mask.constprop.0.isra.0+0x14a/0x170
   follow_page_mask+0x1c2/0x1f0
   __get_user_pages+0x176/0x950
   __gup_longterm_locked+0x15b/0x1060
   ? gup_fast+0x120/0x1f0
   gup_fast_fallback+0x17e/0x230
   get_user_pages_fast+0x5f/0x80
   vmci_host_unlocked_ioctl+0x21c/0xf80
  RIP: 0033:0x54d2cd
  ---[ end trace 0000000000000000 ]---

Digging into the source, context-&gt;notify_page may init by get_user_pages_fast
and can be seen in vmci_ctx_unset_notify which will try to put_page. However
get_user_pages_fast is not finished here and lead to following
try_grab_folio warning. The race condition is shown as follow:

cpu0			cpu1
vmci_host_do_set_notify
vmci_host_setup_notify
get_user_pages_fast(uva, 1, FOLL_WRITE, &amp;context-&gt;notify_page);
lockless_pages_from_mm
gup_pgd_range
gup_huge_pmd  // update &amp;context-&gt;notify_page
			vmci_host_do_set_notify
			vmci_ctx_unset_notify
			notify_page = context-&gt;notify_page;
			if (notify_page)
			put_page(notify_page);	// page is freed
__gup_longterm_locked
__get_user_pages
follow_trans_huge_pmd
try_grab_folio // warn here

To slove this, use local variable page to make notify_page can be seen
after finish get_user_pages_fast.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38102/">CVE-2025-38102 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38102">CVE-2025-38102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245669">SUSE bug 1245669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38103</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38103" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38103" ref_url="https://www.suse.com/security/cve/CVE-2025-38103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse()

Update struct hid_descriptor to better reflect the mandatory and
optional parts of the HID Descriptor as per USB HID 1.11 specification.
Note: the kernel currently does not parse any optional HID class
descriptors, only the mandatory report descriptor.

Update all references to member element desc[0] to rpt_desc.

Add test to verify bLength and bNumDescriptors values are valid.

Replace the for loop with direct access to the mandatory HID class
descriptor member for the report descriptor. This eliminates the
possibility of getting an out-of-bounds fault.

Add a warning message if the HID descriptor contains any unsupported
optional HID class descriptors.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38103/">CVE-2025-38103 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38103">CVE-2025-38103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245663">SUSE bug 1245663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38106</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38106" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38106" ref_url="https://www.suse.com/security/cve/CVE-2025-38106" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002621.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix use-after-free of sq-&gt;thread in __io_uring_show_fdinfo()

syzbot reports:

BUG: KASAN: slab-use-after-free in getrusage+0x1109/0x1a60
Read of size 8 at addr ffff88810de2d2c8 by task a.out/304

CPU: 0 UID: 0 PID: 304 Comm: a.out Not tainted 6.16.0-rc1 #1 PREEMPT(voluntary)
Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x53/0x70
 print_report+0xd0/0x670
 ? __pfx__raw_spin_lock_irqsave+0x10/0x10
 ? getrusage+0x1109/0x1a60
 kasan_report+0xce/0x100
 ? getrusage+0x1109/0x1a60
 getrusage+0x1109/0x1a60
 ? __pfx_getrusage+0x10/0x10
 __io_uring_show_fdinfo+0x9fe/0x1790
 ? ksys_read+0xf7/0x1c0
 ? do_syscall_64+0xa4/0x260
 ? vsnprintf+0x591/0x1100
 ? __pfx___io_uring_show_fdinfo+0x10/0x10
 ? __pfx_vsnprintf+0x10/0x10
 ? mutex_trylock+0xcf/0x130
 ? __pfx_mutex_trylock+0x10/0x10
 ? __pfx_show_fd_locks+0x10/0x10
 ? io_uring_show_fdinfo+0x57/0x80
 io_uring_show_fdinfo+0x57/0x80
 seq_show+0x38c/0x690
 seq_read_iter+0x3f7/0x1180
 ? inode_set_ctime_current+0x160/0x4b0
 seq_read+0x271/0x3e0
 ? __pfx_seq_read+0x10/0x10
 ? __pfx__raw_spin_lock+0x10/0x10
 ? __mark_inode_dirty+0x402/0x810
 ? selinux_file_permission+0x368/0x500
 ? file_update_time+0x10f/0x160
 vfs_read+0x177/0xa40
 ? __pfx___handle_mm_fault+0x10/0x10
 ? __pfx_vfs_read+0x10/0x10
 ? mutex_lock+0x81/0xe0
 ? __pfx_mutex_lock+0x10/0x10
 ? fdget_pos+0x24d/0x4b0
 ksys_read+0xf7/0x1c0
 ? __pfx_ksys_read+0x10/0x10
 ? do_user_addr_fault+0x43b/0x9c0
 do_syscall_64+0xa4/0x260
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f0f74170fc9
Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 8
RSP: 002b:00007fffece049e8 EFLAGS: 00000206 ORIG_RAX: 0000000000000000
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0f74170fc9
RDX: 0000000000001000 RSI: 00007fffece049f0 RDI: 0000000000000004
RBP: 00007fffece05ad0 R08: 0000000000000000 R09: 00007fffece04d90
R10: 0000000000000000 R11: 0000000000000206 R12: 00005651720a1100
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
 &lt;/TASK&gt;

Allocated by task 298:
 kasan_save_stack+0x33/0x60
 kasan_save_track+0x14/0x30
 __kasan_slab_alloc+0x6e/0x70
 kmem_cache_alloc_node_noprof+0xe8/0x330
 copy_process+0x376/0x5e00
 create_io_thread+0xab/0xf0
 io_sq_offload_create+0x9ed/0xf20
 io_uring_setup+0x12b0/0x1cc0
 do_syscall_64+0xa4/0x260
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 22:
 kasan_save_stack+0x33/0x60
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3b/0x60
 __kasan_slab_free+0x37/0x50
 kmem_cache_free+0xc4/0x360
 rcu_core+0x5ff/0x19f0
 handle_softirqs+0x18c/0x530
 run_ksoftirqd+0x20/0x30
 smpboot_thread_fn+0x287/0x6c0
 kthread+0x30d/0x630
 ret_from_fork+0xef/0x1a0
 ret_from_fork_asm+0x1a/0x30

Last potentially related work creation:
 kasan_save_stack+0x33/0x60
 kasan_record_aux_stack+0x8c/0xa0
 __call_rcu_common.constprop.0+0x68/0x940
 __schedule+0xff2/0x2930
 __cond_resched+0x4c/0x80
 mutex_lock+0x5c/0xe0
 io_uring_del_tctx_node+0xe1/0x2b0
 io_uring_clean_tctx+0xb7/0x160
 io_uring_cancel_generic+0x34e/0x760
 do_exit+0x240/0x2350
 do_group_exit+0xab/0x220
 __x64_sys_exit_group+0x39/0x40
 x64_sys_call+0x1243/0x1840
 do_syscall_64+0xa4/0x260
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

The buggy address belongs to the object at ffff88810de2cb00
 which belongs to the cache task_struct of size 3712
The buggy address is located 1992 bytes inside of
 freed 3712-byte region [ffff88810de2cb00, ffff88810de2d980)

which is caused by the task_struct pointed to by sq-&gt;thread being
released while it is being used in the function
__io_uring_show_fdinfo(). Holding ctx-&gt;uring_lock does not prevent ehre
relase or exit of sq-&gt;thread.

Fix this by assigning and looking up -&gt;thread under RCU, and grabbing a
reference to the task_struct. This e
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38106/">CVE-2025-38106 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38106">CVE-2025-38106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245664">SUSE bug 1245664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38107</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38107" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38107" ref_url="https://www.suse.com/security/cve/CVE-2025-38107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net_sched: ets: fix a race in ets_qdisc_change()

Gerrard Tai reported a race condition in ETS, whenever SFQ perturb timer
fires at the wrong time.

The race is as follows:

CPU 0                                 CPU 1
[1]: lock root
[2]: qdisc_tree_flush_backlog()
[3]: unlock root
 |
 |                                    [5]: lock root
 |                                    [6]: rehash
 |                                    [7]: qdisc_tree_reduce_backlog()
 |
[4]: qdisc_put()

This can be abused to underflow a parent's qlen.

Calling qdisc_purge_queue() instead of qdisc_tree_flush_backlog()
should fix the race, because all packets will be purged from the qdisc
before releasing the lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38107/">CVE-2025-38107 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38107">CVE-2025-38107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245676">SUSE bug 1245676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38108</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38108" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38108" ref_url="https://www.suse.com/security/cve/CVE-2025-38108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net_sched: red: fix a race in __red_change()

Gerrard Tai reported a race condition in RED, whenever SFQ perturb timer
fires at the wrong time.

The race is as follows:

CPU 0                                 CPU 1
[1]: lock root
[2]: qdisc_tree_flush_backlog()
[3]: unlock root
 |
 |                                    [5]: lock root
 |                                    [6]: rehash
 |                                    [7]: qdisc_tree_reduce_backlog()
 |
[4]: qdisc_put()

This can be abused to underflow a parent's qlen.

Calling qdisc_purge_queue() instead of qdisc_tree_flush_backlog()
should fix the race, because all packets will be purged from the qdisc
before releasing the lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38108/">CVE-2025-38108 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38108">CVE-2025-38108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245675">SUSE bug 1245675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38109</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38109" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38109" ref_url="https://www.suse.com/security/cve/CVE-2025-38109" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6570" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03317-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03412-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03418-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20723-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20728-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20737-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20785-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20787-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20790-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix ECVF vports unload on shutdown flow

Fix shutdown flow UAF when a virtual function is created on the embedded
chip (ECVF) of a BlueField device. In such case the vport acl ingress
table is not properly destroyed.

ECVF functionality is independent of ecpf_vport_exists capability and
thus functions mlx5_eswitch_(enable|disable)_pf_vf_vports() should not
test it when enabling/disabling ECVF vports.

kernel log:
[] refcount_t: underflow; use-after-free.
[] WARNING: CPU: 3 PID: 1 at lib/refcount.c:28
   refcount_warn_saturate+0x124/0x220
----------------
[] Call trace:
[] refcount_warn_saturate+0x124/0x220
[] tree_put_node+0x164/0x1e0 [mlx5_core]
[] mlx5_destroy_flow_table+0x98/0x2c0 [mlx5_core]
[] esw_acl_ingress_table_destroy+0x28/0x40 [mlx5_core]
[] esw_acl_ingress_lgcy_cleanup+0x80/0xf4 [mlx5_core]
[] esw_legacy_vport_acl_cleanup+0x44/0x60 [mlx5_core]
[] esw_vport_cleanup+0x64/0x90 [mlx5_core]
[] mlx5_esw_vport_disable+0xc0/0x1d0 [mlx5_core]
[] mlx5_eswitch_unload_ec_vf_vports+0xcc/0x150 [mlx5_core]
[] mlx5_eswitch_disable_sriov+0x198/0x2a0 [mlx5_core]
[] mlx5_device_disable_sriov+0xb8/0x1e0 [mlx5_core]
[] mlx5_sriov_detach+0x40/0x50 [mlx5_core]
[] mlx5_unload+0x40/0xc4 [mlx5_core]
[] mlx5_unload_one_devl_locked+0x6c/0xe4 [mlx5_core]
[] mlx5_unload_one+0x3c/0x60 [mlx5_core]
[] shutdown+0x7c/0xa4 [mlx5_core]
[] pci_device_shutdown+0x3c/0xa0
[] device_shutdown+0x170/0x340
[] __do_sys_reboot+0x1f4/0x2a0
[] __arm64_sys_reboot+0x2c/0x40
[] invoke_syscall+0x78/0x100
[] el0_svc_common.constprop.0+0x54/0x184
[] do_el0_svc+0x30/0xac
[] el0_svc+0x48/0x160
[] el0t_64_sync_handler+0xa4/0x12c
[] el0t_64_sync+0x1a4/0x1a8
[] --[ end trace 9c4601d68c70030e ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38109/">CVE-2025-38109 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38109">CVE-2025-38109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245684">SUSE bug 1245684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245685">SUSE bug 1245685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38110</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38110" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38110" ref_url="https://www.suse.com/security/cve/CVE-2025-38110" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mdiobus: Fix potential out-of-bounds clause 45 read/write access

When using publicly available tools like 'mdio-tools' to read/write data
from/to network interface and its PHY via C45 (clause 45) mdiobus,
there is no verification of parameters passed to the ioctl and
it accepts any mdio address.
Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define,
but it is possible to pass higher value than that via ioctl.
While read/write operation should generally fail in this case,
mdiobus provides stats array, where wrong address may allow out-of-bounds
read/write.

Fix that by adding address verification before C45 read/write operation.
While this excludes this access from any statistics, it improves security of
read/write operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38110/">CVE-2025-38110 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38110">CVE-2025-38110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245665">SUSE bug 1245665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249458">SUSE bug 1249458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38111</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38111" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38111" ref_url="https://www.suse.com/security/cve/CVE-2025-38111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20457-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20458-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20460-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20464-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mdiobus: Fix potential out-of-bounds read/write access

When using publicly available tools like 'mdio-tools' to read/write data
from/to network interface and its PHY via mdiobus, there is no verification of
parameters passed to the ioctl and it accepts any mdio address.
Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define,
but it is possible to pass higher value than that via ioctl.
While read/write operation should generally fail in this case,
mdiobus provides stats array, where wrong address may allow out-of-bounds
read/write.

Fix that by adding address verification before read/write operation.
While this excludes this access from any statistics, it improves security of
read/write operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38111/">CVE-2025-38111 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38111">CVE-2025-38111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245666">SUSE bug 1245666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249455">SUSE bug 1249455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38112</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38112" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38112" ref_url="https://www.suse.com/security/cve/CVE-2025-38112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: Fix TOCTOU issue in sk_is_readable()

sk-&gt;sk_prot-&gt;sock_is_readable is a valid function pointer when sk resides
in a sockmap. After the last sk_psock_put() (which usually happens when
socket is removed from sockmap), sk-&gt;sk_prot gets restored and
sk-&gt;sk_prot-&gt;sock_is_readable becomes NULL.

This makes sk_is_readable() racy, if the value of sk-&gt;sk_prot is reloaded
after the initial check. Which in turn may lead to a null pointer
dereference.

Ensure the function pointer does not turn NULL after the check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38112/">CVE-2025-38112 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38112">CVE-2025-38112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245668">SUSE bug 1245668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38113</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38113" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38113" ref_url="https://www.suse.com/security/cve/CVE-2025-38113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: CPPC: Fix NULL pointer dereference when nosmp is used

With nosmp in cmdline, other CPUs are not brought up, leaving
their cpc_desc_ptr NULL. CPU0's iteration via for_each_possible_cpu()
dereferences these NULL pointers, causing panic.

Panic backtrace:

[    0.401123] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000b8
...
[    0.403255] [&lt;ffffffff809a5818&gt;] cppc_allow_fast_switch+0x6a/0xd4
...
Kernel panic - not syncing: Attempted to kill init!

[ rjw: New subject ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38113/">CVE-2025-38113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38113">CVE-2025-38113 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245683">SUSE bug 1245683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38114</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38114" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38114" ref_url="https://www.suse.com/security/cve/CVE-2025-38114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

e1000: Move cancel_work_sync to avoid deadlock

Previously, e1000_down called cancel_work_sync for the e1000 reset task
(via e1000_down_and_stop), which takes RTNL.

As reported by users and syzbot, a deadlock is possible in the following
scenario:

CPU 0:
  - RTNL is held
  - e1000_close
  - e1000_down
  - cancel_work_sync (cancel / wait for e1000_reset_task())

CPU 1:
  - process_one_work
  - e1000_reset_task
  - take RTNL

To remedy this, avoid calling cancel_work_sync from e1000_down
(e1000_reset_task does nothing if the device is down anyway). Instead,
call cancel_work_sync for e1000_reset_task when the device is being
removed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38114/">CVE-2025-38114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38114">CVE-2025-38114 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245686">SUSE bug 1245686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38117</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38117" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38117" ref_url="https://www.suse.com/security/cve/CVE-2025-38117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Protect mgmt_pending list with its own lock

This uses a mutex to protect from concurrent access of mgmt_pending
list which can cause crashes like:

==================================================================
BUG: KASAN: slab-use-after-free in hci_sock_get_channel+0x60/0x68 net/bluetooth/hci_sock.c:91
Read of size 2 at addr ffff0000c48885b2 by task syz.4.334/7318

CPU: 0 UID: 0 PID: 7318 Comm: syz.4.334 Not tainted 6.15.0-rc7-syzkaller-g187899f4124a #0 PREEMPT
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Call trace:
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C)
 __dump_stack+0x30/0x40 lib/dump_stack.c:94
 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120
 print_address_description+0xa8/0x254 mm/kasan/report.c:408
 print_report+0x68/0x84 mm/kasan/report.c:521
 kasan_report+0xb0/0x110 mm/kasan/report.c:634
 __asan_report_load2_noabort+0x20/0x2c mm/kasan/report_generic.c:379
 hci_sock_get_channel+0x60/0x68 net/bluetooth/hci_sock.c:91
 mgmt_pending_find+0x7c/0x140 net/bluetooth/mgmt_util.c:223
 pending_find net/bluetooth/mgmt.c:947 [inline]
 remove_adv_monitor+0x44/0x1a4 net/bluetooth/mgmt.c:5445
 hci_mgmt_cmd+0x780/0xc00 net/bluetooth/hci_sock.c:1712
 hci_sock_sendmsg+0x544/0xbb0 net/bluetooth/hci_sock.c:1832
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg net/socket.c:727 [inline]
 sock_write_iter+0x25c/0x378 net/socket.c:1131
 new_sync_write fs/read_write.c:591 [inline]
 vfs_write+0x62c/0x97c fs/read_write.c:684
 ksys_write+0x120/0x210 fs/read_write.c:736
 __do_sys_write fs/read_write.c:747 [inline]
 __se_sys_write fs/read_write.c:744 [inline]
 __arm64_sys_write+0x7c/0x90 fs/read_write.c:744
 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
 invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767
 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786
 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600

Allocated by task 7037:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x40/0x78 mm/kasan/common.c:68
 kasan_save_alloc_info+0x44/0x54 mm/kasan/generic.c:562
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0x9c/0xb4 mm/kasan/common.c:394
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __do_kmalloc_node mm/slub.c:4327 [inline]
 __kmalloc_noprof+0x2fc/0x4c8 mm/slub.c:4339
 kmalloc_noprof include/linux/slab.h:909 [inline]
 sk_prot_alloc+0xc4/0x1f0 net/core/sock.c:2198
 sk_alloc+0x44/0x3ac net/core/sock.c:2254
 bt_sock_alloc+0x4c/0x300 net/bluetooth/af_bluetooth.c:148
 hci_sock_create+0xa8/0x194 net/bluetooth/hci_sock.c:2202
 bt_sock_create+0x14c/0x24c net/bluetooth/af_bluetooth.c:132
 __sock_create+0x43c/0x91c net/socket.c:1541
 sock_create net/socket.c:1599 [inline]
 __sys_socket_create net/socket.c:1636 [inline]
 __sys_socket+0xd4/0x1c0 net/socket.c:1683
 __do_sys_socket net/socket.c:1697 [inline]
 __se_sys_socket net/socket.c:1695 [inline]
 __arm64_sys_socket+0x7c/0x94 net/socket.c:1695
 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
 invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767
 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786
 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600

Freed by task 6607:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x40/0x78 mm/kasan/common.c:68
 kasan_save_free_info+0x58/0x70 mm/kasan/generic.c:576
 poison_slab_object mm/kasan/common.c:247 [inline]
 __kasan_slab_free+0x68/0x88 mm/kasan/common.c:264
 kasan_slab_free include/linux/kasan.h:233 [inline
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38117/">CVE-2025-38117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38117">CVE-2025-38117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245695">SUSE bug 1245695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38118</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38118" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38118" ref_url="https://www.suse.com/security/cve/CVE-2025-38118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete

This reworks MGMT_OP_REMOVE_ADV_MONITOR to not use mgmt_pending_add to
avoid crashes like bellow:

==================================================================
BUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406
Read of size 8 at addr ffff88801c53f318 by task kworker/u5:5/5341

CPU: 0 UID: 0 PID: 5341 Comm: kworker/u5:5 Not tainted 6.15.0-syzkaller-10402-g4cb6c8af8591 #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Workqueue: hci0 hci_cmd_sync_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:408 [inline]
 print_report+0xd2/0x2b0 mm/kasan/report.c:521
 kasan_report+0x118/0x150 mm/kasan/report.c:634
 mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406
 hci_cmd_sync_work+0x261/0x3a0 net/bluetooth/hci_sync.c:334
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402
 kthread+0x711/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

Allocated by task 5987:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4358
 kmalloc_noprof include/linux/slab.h:905 [inline]
 kzalloc_noprof include/linux/slab.h:1039 [inline]
 mgmt_pending_new+0x65/0x240 net/bluetooth/mgmt_util.c:252
 mgmt_pending_add+0x34/0x120 net/bluetooth/mgmt_util.c:279
 remove_adv_monitor+0x103/0x1b0 net/bluetooth/mgmt.c:5454
 hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719
 hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg+0x219/0x270 net/socket.c:727
 sock_write_iter+0x258/0x330 net/socket.c:1131
 new_sync_write fs/read_write.c:593 [inline]
 vfs_write+0x548/0xa90 fs/read_write.c:686
 ksys_write+0x145/0x250 fs/read_write.c:738
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 5989:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576
 poison_slab_object mm/kasan/common.c:247 [inline]
 __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264
 kasan_slab_free include/linux/kasan.h:233 [inline]
 slab_free_hook mm/slub.c:2380 [inline]
 slab_free mm/slub.c:4642 [inline]
 kfree+0x18e/0x440 mm/slub.c:4841
 mgmt_pending_foreach+0xc9/0x120 net/bluetooth/mgmt_util.c:242
 mgmt_index_removed+0x10d/0x2f0 net/bluetooth/mgmt.c:9366
 hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314
 __sys_bind_socket net/socket.c:1810 [inline]
 __sys_bind+0x2c3/0x3e0 net/socket.c:1841
 __do_sys_bind net/socket.c:1846 [inline]
 __se_sys_bind net/socket.c:1844 [inline]
 __x64_sys_bind+0x7a/0x90 net/socket.c:1844
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38118/">CVE-2025-38118 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38118">CVE-2025-38118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245670">SUSE bug 1245670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250826">SUSE bug 1250826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38119</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38119" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38119" ref_url="https://www.suse.com/security/cve/CVE-2025-38119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: ufs: Fix a hang in the error handler

ufshcd_err_handling_prepare() calls ufshcd_rpm_get_sync(). The latter
function can only succeed if UFSHCD_EH_IN_PROGRESS is not set because
resuming involves submitting a SCSI command and ufshcd_queuecommand()
returns SCSI_MLQUEUE_HOST_BUSY if UFSHCD_EH_IN_PROGRESS is set. Fix this
hang by setting UFSHCD_EH_IN_PROGRESS after ufshcd_rpm_get_sync() has
been called instead of before.

Backtrace:
__switch_to+0x174/0x338
__schedule+0x600/0x9e4
schedule+0x7c/0xe8
schedule_timeout+0xa4/0x1c8
io_schedule_timeout+0x48/0x70
wait_for_common_io+0xa8/0x160 //waiting on START_STOP
wait_for_completion_io_timeout+0x10/0x20
blk_execute_rq+0xe4/0x1e4
scsi_execute_cmd+0x108/0x244
ufshcd_set_dev_pwr_mode+0xe8/0x250
__ufshcd_wl_resume+0x94/0x354
ufshcd_wl_runtime_resume+0x3c/0x174
scsi_runtime_resume+0x64/0xa4
rpm_resume+0x15c/0xa1c
__pm_runtime_resume+0x4c/0x90 // Runtime resume ongoing
ufshcd_err_handler+0x1a0/0xd08
process_one_work+0x174/0x808
worker_thread+0x15c/0x490
kthread+0xf4/0x1ec
ret_from_fork+0x10/0x20

[ bvanassche: rewrote patch description ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38119/">CVE-2025-38119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38119">CVE-2025-38119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245700">SUSE bug 1245700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38120</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38120" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38120" ref_url="https://www.suse.com/security/cve/CVE-2025-38120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_set_pipapo_avx2: fix initial map fill

If the first field doesn't cover the entire start map, then we must zero
out the remainder, else we leak those bits into the next match round map.

The early fix was incomplete and did only fix up the generic C
implementation.

A followup patch adds a test case to nft_concat_range.sh.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38120/">CVE-2025-38120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38120">CVE-2025-38120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245711">SUSE bug 1245711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38122</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38122" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38122" ref_url="https://www.suse.com/security/cve/CVE-2025-38122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gve: add missing NULL check for gve_alloc_pending_packet() in TX DQO

gve_alloc_pending_packet() can return NULL, but gve_tx_add_skb_dqo()
did not check for this case before dereferencing the returned pointer.

Add a missing NULL check to prevent a potential NULL pointer
dereference when allocation fails.

This improves robustness in low-memory scenarios.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38122/">CVE-2025-38122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38122">CVE-2025-38122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245746">SUSE bug 1245746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38123</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38123" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38123" ref_url="https://www.suse.com/security/cve/CVE-2025-38123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: wwan: t7xx: Fix napi rx poll issue

When driver handles the napi rx polling requests, the netdev might
have been released by the dellink logic triggered by the disconnect
operation on user plane. However, in the logic of processing skb in
polling, an invalid netdev is still being used, which causes a panic.

BUG: kernel NULL pointer dereference, address: 00000000000000f1
Oops: 0000 [#1] PREEMPT SMP NOPTI
RIP: 0010:dev_gro_receive+0x3a/0x620
[...]
Call Trace:
 &lt;IRQ&gt;
 ? __die_body+0x68/0xb0
 ? page_fault_oops+0x379/0x3e0
 ? exc_page_fault+0x4f/0xa0
 ? asm_exc_page_fault+0x22/0x30
 ? __pfx_t7xx_ccmni_recv_skb+0x10/0x10 [mtk_t7xx (HASH:1400 7)]
 ? dev_gro_receive+0x3a/0x620
 napi_gro_receive+0xad/0x170
 t7xx_ccmni_recv_skb+0x48/0x70 [mtk_t7xx (HASH:1400 7)]
 t7xx_dpmaif_napi_rx_poll+0x590/0x800 [mtk_t7xx (HASH:1400 7)]
 net_rx_action+0x103/0x470
 irq_exit_rcu+0x13a/0x310
 sysvec_apic_timer_interrupt+0x56/0x90
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38123/">CVE-2025-38123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38123">CVE-2025-38123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245688">SUSE bug 1245688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38124</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38124" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38124" ref_url="https://www.suse.com/security/cve/CVE-2025-38124" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix udp gso skb_segment after pull from frag_list

Commit a1e40ac5b5e9 ("net: gso: fix udp gso fraglist segmentation after
pull from frag_list") detected invalid geometry in frag_list skbs and
redirects them from skb_segment_list to more robust skb_segment. But some
packets with modified geometry can also hit bugs in that code. We don't
know how many such cases exist. Addressing each one by one also requires
touching the complex skb_segment code, which risks introducing bugs for
other types of skbs. Instead, linearize all these packets that fail the
basic invariants on gso fraglist skbs. That is more robust.

If only part of the fraglist payload is pulled into head_skb, it will
always cause exception when splitting skbs by skb_segment. For detailed
call stack information, see below.

Valid SKB_GSO_FRAGLIST skbs
- consist of two or more segments
- the head_skb holds the protocol headers plus first gso_size
- one or more frag_list skbs hold exactly one segment
- all but the last must be gso_size

Optional datapath hooks such as NAT and BPF (bpf_skb_pull_data) can
modify fraglist skbs, breaking these invariants.

In extreme cases they pull one part of data into skb linear. For UDP,
this  causes three payloads with lengths of (11,11,10) bytes were
pulled tail to become (12,10,10) bytes.

The skbs no longer meets the above SKB_GSO_FRAGLIST conditions because
payload was pulled into head_skb, it needs to be linearized before pass
to regular skb_segment.

    skb_segment+0xcd0/0xd14
    __udp_gso_segment+0x334/0x5f4
    udp4_ufo_fragment+0x118/0x15c
    inet_gso_segment+0x164/0x338
    skb_mac_gso_segment+0xc4/0x13c
    __skb_gso_segment+0xc4/0x124
    validate_xmit_skb+0x9c/0x2c0
    validate_xmit_skb_list+0x4c/0x80
    sch_direct_xmit+0x70/0x404
    __dev_queue_xmit+0x64c/0xe5c
    neigh_resolve_output+0x178/0x1c4
    ip_finish_output2+0x37c/0x47c
    __ip_finish_output+0x194/0x240
    ip_finish_output+0x20/0xf4
    ip_output+0x100/0x1a0
    NF_HOOK+0xc4/0x16c
    ip_forward+0x314/0x32c
    ip_rcv+0x90/0x118
    __netif_receive_skb+0x74/0x124
    process_backlog+0xe8/0x1a4
    __napi_poll+0x5c/0x1f8
    net_rx_action+0x154/0x314
    handle_softirqs+0x154/0x4b8

    [118.376811] [C201134] rxq0_pus: [name:bug&amp;]kernel BUG at net/core/skbuff.c:4278!
    [118.376829] [C201134] rxq0_pus: [name:traps&amp;]Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
    [118.470774] [C201134] rxq0_pus: [name:mrdump&amp;]Kernel Offset: 0x178cc00000 from 0xffffffc008000000
    [118.470810] [C201134] rxq0_pus: [name:mrdump&amp;]PHYS_OFFSET: 0x40000000
    [118.470827] [C201134] rxq0_pus: [name:mrdump&amp;]pstate: 60400005 (nZCv daif +PAN -UAO)
    [118.470848] [C201134] rxq0_pus: [name:mrdump&amp;]pc : [0xffffffd79598aefc] skb_segment+0xcd0/0xd14
    [118.470900] [C201134] rxq0_pus: [name:mrdump&amp;]lr : [0xffffffd79598a5e8] skb_segment+0x3bc/0xd14
    [118.470928] [C201134] rxq0_pus: [name:mrdump&amp;]sp : ffffffc008013770
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38124/">CVE-2025-38124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38124">CVE-2025-38124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245690">SUSE bug 1245690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38125</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38125" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38125" ref_url="https://www.suse.com/security/cve/CVE-2025-38125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: make sure that ptp_rate is not 0 before configuring EST

If the ptp_rate recorded earlier in the driver happens to be 0, this
bogus value will propagate up to EST configuration, where it will
trigger a division by 0.

Prevent this division by 0 by adding the corresponding check and error
code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38125/">CVE-2025-38125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38125">CVE-2025-38125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245710">SUSE bug 1245710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38127</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38127" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38127" ref_url="https://www.suse.com/security/cve/CVE-2025-38127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix Tx scheduler error handling in XDP callback

When the XDP program is loaded, the XDP callback adds new Tx queues.
This means that the callback must update the Tx scheduler with the new
queue number. In the event of a Tx scheduler failure, the XDP callback
should also fail and roll back any changes previously made for XDP
preparation.

The previous implementation had a bug that not all changes made by the
XDP callback were rolled back. This caused the crash with the following
call trace:

[  +9.549584] ice 0000:ca:00.0: Failed VSI LAN queue config for XDP, error: -5
[  +0.382335] Oops: general protection fault, probably for non-canonical address 0x50a2250a90495525: 0000 [#1] SMP NOPTI
[  +0.010710] CPU: 103 UID: 0 PID: 0 Comm: swapper/103 Not tainted 6.14.0-net-next-mar-31+ #14 PREEMPT(voluntary)
[  +0.010175] Hardware name: Intel Corporation M50CYP2SBSTD/M50CYP2SBSTD, BIOS SE5C620.86B.01.01.0005.2202160810 02/16/2022
[  +0.010946] RIP: 0010:__ice_update_sample+0x39/0xe0 [ice]

[...]

[  +0.002715] Call Trace:
[  +0.002452]  &lt;IRQ&gt;
[  +0.002021]  ? __die_body.cold+0x19/0x29
[  +0.003922]  ? die_addr+0x3c/0x60
[  +0.003319]  ? exc_general_protection+0x17c/0x400
[  +0.004707]  ? asm_exc_general_protection+0x26/0x30
[  +0.004879]  ? __ice_update_sample+0x39/0xe0 [ice]
[  +0.004835]  ice_napi_poll+0x665/0x680 [ice]
[  +0.004320]  __napi_poll+0x28/0x190
[  +0.003500]  net_rx_action+0x198/0x360
[  +0.003752]  ? update_rq_clock+0x39/0x220
[  +0.004013]  handle_softirqs+0xf1/0x340
[  +0.003840]  ? sched_clock_cpu+0xf/0x1f0
[  +0.003925]  __irq_exit_rcu+0xc2/0xe0
[  +0.003665]  common_interrupt+0x85/0xa0
[  +0.003839]  &lt;/IRQ&gt;
[  +0.002098]  &lt;TASK&gt;
[  +0.002106]  asm_common_interrupt+0x26/0x40
[  +0.004184] RIP: 0010:cpuidle_enter_state+0xd3/0x690

Fix this by performing the missing unmapping of XDP queues from
q_vectors and setting the XDP rings pointer back to NULL after all those
queues are released.
Also, add an immediate exit from the XDP callback in case of ring
preparation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38127/">CVE-2025-38127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38127">CVE-2025-38127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245705">SUSE bug 1245705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38128</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38128" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38128" ref_url="https://www.suse.com/security/cve/CVE-2025-38128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: reject malformed HCI_CMD_SYNC commands

In 'mgmt_hci_cmd_sync()', check whether the size of parameters passed
in 'struct mgmt_cp_hci_cmd_sync' matches the total size of the data
(i.e. 'sizeof(struct mgmt_cp_hci_cmd_sync)' plus trailing bytes).
Otherwise, large invalid 'params_len' will cause 'hci_cmd_sync_alloc()'
to do 'skb_put_data()' from an area beyond the one actually passed to
'mgmt_hci_cmd_sync()'.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38128/">CVE-2025-38128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38128">CVE-2025-38128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245703">SUSE bug 1245703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245704">SUSE bug 1245704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38129</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38129" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38129" ref_url="https://www.suse.com/security/cve/CVE-2025-38129" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3066" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003235.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3083" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024720.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

page_pool: Fix use-after-free in page_pool_recycle_in_ring

syzbot reported a uaf in page_pool_recycle_in_ring:

BUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862
Read of size 8 at addr ffff8880286045a0 by task syz.0.284/6943

CPU: 0 UID: 0 PID: 6943 Comm: syz.0.284 Not tainted 6.13.0-rc3-syzkaller-gdfa94ce54f41 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:489
 kasan_report+0x143/0x180 mm/kasan/report.c:602
 lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862
 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:165 [inline]
 _raw_spin_unlock_bh+0x1b/0x40 kernel/locking/spinlock.c:210
 spin_unlock_bh include/linux/spinlock.h:396 [inline]
 ptr_ring_produce_bh include/linux/ptr_ring.h:164 [inline]
 page_pool_recycle_in_ring net/core/page_pool.c:707 [inline]
 page_pool_put_unrefed_netmem+0x748/0xb00 net/core/page_pool.c:826
 page_pool_put_netmem include/net/page_pool/helpers.h:323 [inline]
 page_pool_put_full_netmem include/net/page_pool/helpers.h:353 [inline]
 napi_pp_put_page+0x149/0x2b0 net/core/skbuff.c:1036
 skb_pp_recycle net/core/skbuff.c:1047 [inline]
 skb_free_head net/core/skbuff.c:1094 [inline]
 skb_release_data+0x6c4/0x8a0 net/core/skbuff.c:1125
 skb_release_all net/core/skbuff.c:1190 [inline]
 __kfree_skb net/core/skbuff.c:1204 [inline]
 sk_skb_reason_drop+0x1c9/0x380 net/core/skbuff.c:1242
 kfree_skb_reason include/linux/skbuff.h:1263 [inline]
 __skb_queue_purge_reason include/linux/skbuff.h:3343 [inline]

root cause is:

page_pool_recycle_in_ring
  ptr_ring_produce
    spin_lock(&amp;r-&gt;producer_lock);
    WRITE_ONCE(r-&gt;queue[r-&gt;producer++], ptr)
      //recycle last page to pool
				page_pool_release
				  page_pool_scrub
				    page_pool_empty_ring
				      ptr_ring_consume
				      page_pool_return_page  //release all page
				  __page_pool_destroy
				     free_percpu(pool-&gt;recycle_stats);
				     free(pool) //free

     spin_unlock(&amp;r-&gt;producer_lock); //pool-&gt;ring uaf read
  recycle_stat_inc(pool, ring);

page_pool can be free while page pool recycle the last page in ring.
Add producer-lock barrier to page_pool_release to prevent the page
pool from being free before all pages have been recycled.

recycle_stat_inc() is empty when CONFIG_PAGE_POOL_STATS is not
enabled, which will trigger Wempty-body build warning. Add definition
for pool stat macro to fix warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38129/">CVE-2025-38129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38129">CVE-2025-38129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245723">SUSE bug 1245723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258139">SUSE bug 1258139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38134</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38134" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38134" ref_url="https://www.suse.com/security/cve/CVE-2025-38134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: acpi: Prevent null pointer dereference in usb_acpi_add_usb4_devlink()

As demonstrated by the fix for update_port_device_state,
commit 12783c0b9e2c ("usb: core: Prevent null pointer dereference in update_port_device_state"),
usb_hub_to_struct_hub() can return NULL in certain scenarios,
such as during hub driver unbind or teardown race conditions,
even if the underlying usb_device structure exists.

Plus, all other places that call usb_hub_to_struct_hub() in the same file
do check for NULL return values.

If usb_hub_to_struct_hub() returns NULL, the subsequent access to
hub-&gt;ports[udev-&gt;portnum - 1] will cause a null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38134/">CVE-2025-38134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38134">CVE-2025-38134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245678">SUSE bug 1245678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38135</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38135" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38135" ref_url="https://www.suse.com/security/cve/CVE-2025-38135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: Fix potential null-ptr-deref in mlb_usio_probe()

devm_ioremap() can return NULL on error. Currently, mlb_usio_probe()
does not check for this case, which could result in a NULL pointer
dereference.

Add NULL check after devm_ioremap() to prevent this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38135/">CVE-2025-38135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38135">CVE-2025-38135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246023">SUSE bug 1246023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38136</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38136" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38136" ref_url="https://www.suse.com/security/cve/CVE-2025-38136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: renesas_usbhs: Reorder clock handling and power management in probe

Reorder the initialization sequence in `usbhs_probe()` to enable runtime
PM before accessing registers, preventing potential crashes due to
uninitialized clocks.

Currently, in the probe path, registers are accessed before enabling the
clocks, leading to a synchronous external abort on the RZ/V2H SoC.
The problematic call flow is as follows:

    usbhs_probe()
        usbhs_sys_clock_ctrl()
            usbhs_bset()
                usbhs_write()
                    iowrite16()  &lt;-- Register access before enabling clocks

Since `iowrite16()` is performed without ensuring the required clocks are
enabled, this can lead to access errors. To fix this, enable PM runtime
early in the probe function and ensure clocks are acquired before register
access, preventing crashes like the following on RZ/V2H:

[13.272640] Internal error: synchronous external abort: 0000000096000010 [#1] PREEMPT SMP
[13.280814] Modules linked in: cec renesas_usbhs(+) drm_kms_helper fuse drm backlight ipv6
[13.289088] CPU: 1 UID: 0 PID: 195 Comm: (udev-worker) Not tainted 6.14.0-rc7+ #98
[13.296640] Hardware name: Renesas RZ/V2H EVK Board based on r9a09g057h44 (DT)
[13.303834] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[13.310770] pc : usbhs_bset+0x14/0x4c [renesas_usbhs]
[13.315831] lr : usbhs_probe+0x2e4/0x5ac [renesas_usbhs]
[13.321138] sp : ffff8000827e3850
[13.324438] x29: ffff8000827e3860 x28: 0000000000000000 x27: ffff8000827e3ca0
[13.331554] x26: ffff8000827e3ba0 x25: ffff800081729668 x24: 0000000000000025
[13.338670] x23: ffff0000c0f08000 x22: 0000000000000000 x21: ffff0000c0f08010
[13.345783] x20: 0000000000000000 x19: ffff0000c3b52080 x18: 00000000ffffffff
[13.352895] x17: 0000000000000000 x16: 0000000000000000 x15: ffff8000827e36ce
[13.360009] x14: 00000000000003d7 x13: 00000000000003d7 x12: 0000000000000000
[13.367122] x11: 0000000000000000 x10: 0000000000000aa0 x9 : ffff8000827e3750
[13.374235] x8 : ffff0000c1850b00 x7 : 0000000003826060 x6 : 000000000000001c
[13.381347] x5 : 000000030d5fcc00 x4 : ffff8000825c0000 x3 : 0000000000000000
[13.388459] x2 : 0000000000000400 x1 : 0000000000000000 x0 : ffff0000c3b52080
[13.395574] Call trace:
[13.398013]  usbhs_bset+0x14/0x4c [renesas_usbhs] (P)
[13.403076]  platform_probe+0x68/0xdc
[13.406738]  really_probe+0xbc/0x2c0
[13.410306]  __driver_probe_device+0x78/0x120
[13.414653]  driver_probe_device+0x3c/0x154
[13.418825]  __driver_attach+0x90/0x1a0
[13.422647]  bus_for_each_dev+0x7c/0xe0
[13.426470]  driver_attach+0x24/0x30
[13.430032]  bus_add_driver+0xe4/0x208
[13.433766]  driver_register+0x68/0x130
[13.437587]  __platform_driver_register+0x24/0x30
[13.442273]  renesas_usbhs_driver_init+0x20/0x1000 [renesas_usbhs]
[13.448450]  do_one_initcall+0x60/0x1d4
[13.452276]  do_init_module+0x54/0x1f8
[13.456014]  load_module+0x1754/0x1c98
[13.459750]  init_module_from_file+0x88/0xcc
[13.464004]  __arm64_sys_finit_module+0x1c4/0x328
[13.468689]  invoke_syscall+0x48/0x104
[13.472426]  el0_svc_common.constprop.0+0xc0/0xe0
[13.477113]  do_el0_svc+0x1c/0x28
[13.480415]  el0_svc+0x30/0xcc
[13.483460]  el0t_64_sync_handler+0x10c/0x138
[13.487800]  el0t_64_sync+0x198/0x19c
[13.491453] Code: 2a0103e1 12003c42 12003c63 8b010084 (79400084)
[13.497522] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38136/">CVE-2025-38136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38136">CVE-2025-38136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245691">SUSE bug 1245691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38137</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38137" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38137" ref_url="https://www.suse.com/security/cve/CVE-2025-38137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI/pwrctrl: Cancel outstanding rescan work when unregistering

It's possible to trigger use-after-free here by:

  (a) forcing rescan_work_func() to take a long time and
  (b) utilizing a pwrctrl driver that may be unloaded for some reason

Cancel outstanding work to ensure it is finished before we allow our data
structures to be cleaned up.

[bhelgaas: tidy commit log]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38137/">CVE-2025-38137 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38137">CVE-2025-38137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245721">SUSE bug 1245721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245722">SUSE bug 1245722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38138</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38138" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38138" ref_url="https://www.suse.com/security/cve/CVE-2025-38138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: ti: Add NULL check in udma_probe()

devm_kasprintf() returns NULL when memory allocation fails. Currently,
udma_probe() does not check for this case, which results in a NULL
pointer dereference.

Add NULL check after devm_kasprintf() to prevent this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38138/">CVE-2025-38138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38138">CVE-2025-38138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245719">SUSE bug 1245719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38140</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38140" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38140" ref_url="https://www.suse.com/security/cve/CVE-2025-38140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: limit swapping tables for devices with zone write plugs

dm_revalidate_zones() only allowed new or previously unzoned devices to
call blk_revalidate_disk_zones(). If the device was already zoned,
disk-&gt;nr_zones would always equal md-&gt;nr_zones, so dm_revalidate_zones()
returned without doing any work. This would make the zoned settings for
the device not match the new table. If the device had zone write plug
resources, it could run into errors like bdev_zone_is_seq() reading
invalid memory because disk-&gt;conv_zones_bitmap was the wrong size.

If the device doesn't have any zone write plug resources, calling
blk_revalidate_disk_zones() will always correctly update device.  If
blk_revalidate_disk_zones() fails, it can still overwrite or clear the
current disk-&gt;nr_zones value. In this case, DM must restore the previous
value of disk-&gt;nr_zones, so that the zoned settings will continue to
match the previous value that it fell back to.

If the device already has zone write plug resources,
blk_revalidate_disk_zones() will not correctly update them, if it is
called for arbitrary zoned device changes.  Since there is not much need
for this ability, the easiest solution is to disallow any table reloads
that change the zoned settings, for devices that already have zone plug
resources.  Specifically, if a device already has zone plug resources
allocated, it can only switch to another zoned table that also emulates
zone append.  Also, it cannot change the device size or the zone size. A
device can switch to an error target.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38140/">CVE-2025-38140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38140">CVE-2025-38140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245717">SUSE bug 1245717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38141</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38141" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38141" ref_url="https://www.suse.com/security/cve/CVE-2025-38141" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: fix dm_blk_report_zones

If dm_get_live_table() returned NULL, dm_put_live_table() was never
called. Also, it is possible that md-&gt;zone_revalidate_map will change
while calling this function. Only read it once, so that we are always
using the same value. Otherwise we might miss a call to
dm_put_live_table().

Finally, while md-&gt;zone_revalidate_map is set and a process is calling
blk_revalidate_disk_zones() to set up the zone append emulation
resources, it is possible that another process, perhaps triggered by
blkdev_report_zones_ioctl(), will call dm_blk_report_zones(). If
blk_revalidate_disk_zones() fails, these resources can be freed while
the other process is still using them, causing a use-after-free error.

blk_revalidate_disk_zones() will only ever be called when initially
setting up the zone append emulation resources, such as when setting up
a zoned dm-crypt table for the first time. Further table swaps will not
set md-&gt;zone_revalidate_map or call blk_revalidate_disk_zones().
However it must be called using the new table (referenced by
md-&gt;zone_revalidate_map) and the new queue limits while the DM device is
suspended. dm_blk_report_zones() needs some way to distinguish between a
call from blk_revalidate_disk_zones(), which must be allowed to use
md-&gt;zone_revalidate_map to access this not yet activated table, and all
other calls to dm_blk_report_zones(), which should not be allowed while
the device is suspended and cannot use md-&gt;zone_revalidate_map, since
the zone resources might be freed by the process currently calling
blk_revalidate_disk_zones().

Solve this by tracking the process that sets md-&gt;zone_revalidate_map in
dm_revalidate_zones() and only allowing that process to make use of it
in dm_blk_report_zones().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38141/">CVE-2025-38141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38141">CVE-2025-38141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245715">SUSE bug 1245715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245716">SUSE bug 1245716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38142</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38142" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38142" ref_url="https://www.suse.com/security/cve/CVE-2025-38142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (asus-ec-sensors) check sensor index in read_string()

Prevent a potential invalid memory access when the requested sensor
is not found.

find_ec_sensor_index() may return a negative value (e.g. -ENOENT),
but its result was used without checking, which could lead to
undefined behavior when passed to get_sensor_info().

Add a proper check to return -EINVAL if sensor_index is negative.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

[groeck: Return error code returned from find_ec_sensor_index]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38142/">CVE-2025-38142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38142">CVE-2025-38142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245713">SUSE bug 1245713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38143</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38143" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38143" ref_url="https://www.suse.com/security/cve/CVE-2025-38143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

backlight: pm8941: Add NULL check in wled_configure()

devm_kasprintf() returns NULL when memory allocation fails. Currently,
wled_configure() does not check for this case, which results in a NULL
pointer dereference.

Add NULL check after devm_kasprintf() to prevent this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38143/">CVE-2025-38143 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38143">CVE-2025-38143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245714">SUSE bug 1245714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38145</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38145" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38145" ref_url="https://www.suse.com/security/cve/CVE-2025-38145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: aspeed: Add NULL check in aspeed_lpc_enable_snoop()

devm_kasprintf() returns NULL when memory allocation fails. Currently,
aspeed_lpc_enable_snoop() does not check for this case, which results in a
NULL pointer dereference.

Add NULL check after devm_kasprintf() to prevent this issue.

[arj: Fix Fixes: tag to use subject from 3772e5da4454]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38145/">CVE-2025-38145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38145">CVE-2025-38145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245765">SUSE bug 1245765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38146</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38146" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38146" ref_url="https://www.suse.com/security/cve/CVE-2025-38146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: Fix the dead loop of MPLS parse

The unexpected MPLS packet may not end with the bottom label stack.
When there are many stacks, The label count value has wrapped around.
A dead loop occurs, soft lockup/CPU stuck finally.

stack backtrace:
UBSAN: array-index-out-of-bounds in /build/linux-0Pa0xK/linux-5.15.0/net/openvswitch/flow.c:662:26
index -1 is out of range for type '__be32 [3]'
CPU: 34 PID: 0 Comm: swapper/34 Kdump: loaded Tainted: G           OE   5.15.0-121-generic #131-Ubuntu
Hardware name: Dell Inc. PowerEdge C6420/0JP9TF, BIOS 2.12.2 07/14/2021
Call Trace:
 &lt;IRQ&gt;
 show_stack+0x52/0x5c
 dump_stack_lvl+0x4a/0x63
 dump_stack+0x10/0x16
 ubsan_epilogue+0x9/0x36
 __ubsan_handle_out_of_bounds.cold+0x44/0x49
 key_extract_l3l4+0x82a/0x840 [openvswitch]
 ? kfree_skbmem+0x52/0xa0
 key_extract+0x9c/0x2b0 [openvswitch]
 ovs_flow_key_extract+0x124/0x350 [openvswitch]
 ovs_vport_receive+0x61/0xd0 [openvswitch]
 ? kernel_init_free_pages.part.0+0x4a/0x70
 ? get_page_from_freelist+0x353/0x540
 netdev_port_receive+0xc4/0x180 [openvswitch]
 ? netdev_port_receive+0x180/0x180 [openvswitch]
 netdev_frame_hook+0x1f/0x40 [openvswitch]
 __netif_receive_skb_core.constprop.0+0x23a/0xf00
 __netif_receive_skb_list_core+0xfa/0x240
 netif_receive_skb_list_internal+0x18e/0x2a0
 napi_complete_done+0x7a/0x1c0
 bnxt_poll+0x155/0x1c0 [bnxt_en]
 __napi_poll+0x30/0x180
 net_rx_action+0x126/0x280
 ? bnxt_msix+0x67/0x80 [bnxt_en]
 handle_softirqs+0xda/0x2d0
 irq_exit_rcu+0x96/0xc0
 common_interrupt+0x8e/0xa0
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38146/">CVE-2025-38146 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38146">CVE-2025-38146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245767">SUSE bug 1245767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38148</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38148" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38148" ref_url="https://www.suse.com/security/cve/CVE-2025-38148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: mscc: Fix memory leak when using one step timestamping

Fix memory leak when running one-step timestamping. When running
one-step sync timestamping, the HW is configured to insert the TX time
into the frame, so there is no reason to keep the skb anymore. As in
this case the HW will never generate an interrupt to say that the frame
was timestamped, then the frame will never released.
Fix this by freeing the frame in case of one-step timestamping.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38148/">CVE-2025-38148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38148">CVE-2025-38148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245735">SUSE bug 1245735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38149</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38149" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38149" ref_url="https://www.suse.com/security/cve/CVE-2025-38149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: clear phydev-&gt;devlink when the link is deleted

There is a potential crash issue when disabling and re-enabling the
network port. When disabling the network port, phy_detach() calls
device_link_del() to remove the device link, but it does not clear
phydev-&gt;devlink, so phydev-&gt;devlink is not a NULL pointer. Then the
network port is re-enabled, but if phy_attach_direct() fails before
calling device_link_add(), the code jumps to the "error" label and
calls phy_detach(). Since phydev-&gt;devlink retains the old value from
the previous attach/detach cycle, device_link_del() uses the old value,
which accesses a NULL pointer and causes a crash. The simplified crash
log is as follows.

[   24.702421] Call trace:
[   24.704856]  device_link_put_kref+0x20/0x120
[   24.709124]  device_link_del+0x30/0x48
[   24.712864]  phy_detach+0x24/0x168
[   24.716261]  phy_attach_direct+0x168/0x3a4
[   24.720352]  phylink_fwnode_phy_connect+0xc8/0x14c
[   24.725140]  phylink_of_phy_connect+0x1c/0x34

Therefore, phydev-&gt;devlink needs to be cleared when the device link is
deleted.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38149/">CVE-2025-38149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38149">CVE-2025-38149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245737">SUSE bug 1245737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38151</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38151" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38151" ref_url="https://www.suse.com/security/cve/CVE-2025-38151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work

The cited commit fixed a crash when cma_netevent_callback was called for
a cma_id while work on that id from a previous call had not yet started.
The work item was re-initialized in the second call, which corrupted the
work item currently in the work queue.

However, it left a problem when queue_work fails (because the item is
still pending in the work queue from a previous call). In this case,
cma_id_put (which is called in the work handler) is therefore not
called. This results in a userspace process hang (zombie process).

Fix this by calling cma_id_put() if queue_work fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38151/">CVE-2025-38151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38151">CVE-2025-38151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245745">SUSE bug 1245745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38153</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38153" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38153" ref_url="https://www.suse.com/security/cve/CVE-2025-38153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: aqc111: fix error handling of usbnet read calls

Syzkaller, courtesy of syzbot, identified an error (see report [1]) in
aqc111 driver, caused by incomplete sanitation of usb read calls'
results. This problem is quite similar to the one fixed in commit
920a9fa27e78 ("net: asix: add proper error handling of usb read errors").

For instance, usbnet_read_cmd() may read fewer than 'size' bytes,
even if the caller expected the full amount, and aqc111_read_cmd()
will not check its result properly. As [1] shows, this may lead
to MAC address in aqc111_bind() being only partly initialized,
triggering KMSAN warnings.

Fix the issue by verifying that the number of bytes read is
as expected and not less.

[1] Partial syzbot report:
BUG: KMSAN: uninit-value in is_valid_ether_addr include/linux/etherdevice.h:208 [inline]
BUG: KMSAN: uninit-value in usbnet_probe+0x2e57/0x4390 drivers/net/usb/usbnet.c:1830
 is_valid_ether_addr include/linux/etherdevice.h:208 [inline]
 usbnet_probe+0x2e57/0x4390 drivers/net/usb/usbnet.c:1830
 usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396
 call_driver_probe drivers/base/dd.c:-1 [inline]
 really_probe+0x4d1/0xd90 drivers/base/dd.c:658
 __driver_probe_device+0x268/0x380 drivers/base/dd.c:800
...

Uninit was stored to memory at:
 dev_addr_mod+0xb0/0x550 net/core/dev_addr_lists.c:582
 __dev_addr_set include/linux/netdevice.h:4874 [inline]
 eth_hw_addr_set include/linux/etherdevice.h:325 [inline]
 aqc111_bind+0x35f/0x1150 drivers/net/usb/aqc111.c:717
 usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772
 usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396
...

Uninit was stored to memory at:
 ether_addr_copy include/linux/etherdevice.h:305 [inline]
 aqc111_read_perm_mac drivers/net/usb/aqc111.c:663 [inline]
 aqc111_bind+0x794/0x1150 drivers/net/usb/aqc111.c:713
 usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772
 usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396
 call_driver_probe drivers/base/dd.c:-1 [inline]
...

Local variable buf.i created at:
 aqc111_read_perm_mac drivers/net/usb/aqc111.c:656 [inline]
 aqc111_bind+0x221/0x1150 drivers/net/usb/aqc111.c:713
 usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38153/">CVE-2025-38153 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38153">CVE-2025-38153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245744">SUSE bug 1245744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38154</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38154" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38154" ref_url="https://www.suse.com/security/cve/CVE-2025-38154" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3520" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Avoid using sk_socket after free when sending

The sk-&gt;sk_socket is not locked or referenced in backlog thread, and
during the call to skb_send_sock(), there is a race condition with
the release of sk_socket. All types of sockets(tcp/udp/unix/vsock)
will be affected.

Race conditions:
'''
CPU0                               CPU1

backlog::skb_send_sock
  sendmsg_unlocked
    sock_sendmsg
      sock_sendmsg_nosec
                                   close(fd):
                                     ...
                                     ops-&gt;release() -&gt; sock_map_close()
                                     sk_socket-&gt;ops = NULL
                                     free(socket)
      sock-&gt;ops-&gt;sendmsg
            ^
            panic here
'''

The ref of psock become 0 after sock_map_close() executed.
'''
void sock_map_close()
{
    ...
    if (likely(psock)) {
    ...
    // !! here we remove psock and the ref of psock become 0
    sock_map_remove_links(sk, psock)
    psock = sk_psock_get(sk);
    if (unlikely(!psock))
        goto no_psock; &lt;=== Control jumps here via goto
        ...
        cancel_delayed_work_sync(&amp;psock-&gt;work); &lt;=== not executed
        sk_psock_put(sk, psock);
        ...
}
'''

Based on the fact that we already wait for the workqueue to finish in
sock_map_close() if psock is held, we simply increase the psock
reference count to avoid race conditions.

With this patch, if the backlog thread is running, sock_map_close() will
wait for the backlog thread to complete and cancel all pending work.

If no backlog running, any pending work that hasn't started by then will
fail when invoked by sk_psock_get(), as the psock reference count have
been zeroed, and sk_psock_drop() will cancel all jobs via
cancel_delayed_work_sync().

In summary, we require synchronization to coordinate the backlog thread
and close() thread.

The panic I catched:
'''
Workqueue: events sk_psock_backlog
RIP: 0010:sock_sendmsg+0x21d/0x440
RAX: 0000000000000000 RBX: ffffc9000521fad8 RCX: 0000000000000001
...
Call Trace:
 &lt;TASK&gt;
 ? die_addr+0x40/0xa0
 ? exc_general_protection+0x14c/0x230
 ? asm_exc_general_protection+0x26/0x30
 ? sock_sendmsg+0x21d/0x440
 ? sock_sendmsg+0x3e0/0x440
 ? __pfx_sock_sendmsg+0x10/0x10
 __skb_send_sock+0x543/0xb70
 sk_psock_backlog+0x247/0xb80
...
'''
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38154/">CVE-2025-38154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38154">CVE-2025-38154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245749">SUSE bug 1245749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38155</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38155" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38155" ref_url="https://www.suse.com/security/cve/CVE-2025-38155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7915: Fix null-ptr-deref in mt7915_mmio_wed_init()

devm_ioremap() returns NULL on error. Currently, mt7915_mmio_wed_init()
does not check for this case, which results in a NULL pointer
dereference.

Prevent null pointer dereference in mt7915_mmio_wed_init().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38155/">CVE-2025-38155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38155">CVE-2025-38155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245748">SUSE bug 1245748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38156</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38156" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38156" ref_url="https://www.suse.com/security/cve/CVE-2025-38156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7996: Fix null-ptr-deref in mt7996_mmio_wed_init()

devm_ioremap() returns NULL on error. Currently, mt7996_mmio_wed_init()
does not check for this case, which results in a NULL pointer
dereference.

Prevent null pointer dereference in mt7996_mmio_wed_init()
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38156/">CVE-2025-38156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38156">CVE-2025-38156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246034">SUSE bug 1246034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38157</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38157" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38157" ref_url="https://www.suse.com/security/cve/CVE-2025-38157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k_htc: Abort software beacon handling if disabled

A malicious USB device can send a WMI_SWBA_EVENTID event from an
ath9k_htc-managed device before beaconing has been enabled. This causes
a device-by-zero error in the driver, leading to either a crash or an
out of bounds read.

Prevent this by aborting the handling in ath9k_htc_swba() if beacons are
not enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38157/">CVE-2025-38157 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38157">CVE-2025-38157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245747">SUSE bug 1245747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38159</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38159" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38159" ref_url="https://www.suse.com/security/cve/CVE-2025-38159" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001909.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20891-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20893-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045161.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds

Set the size to 6 instead of 2, since 'para' array is passed to
'rtw_fw_bt_wifi_control(rtwdev, para[0], &amp;para[1])', which reads
5 bytes:

void rtw_fw_bt_wifi_control(struct rtw_dev *rtwdev, u8 op_code, u8 *data)
{
    ...
    SET_BT_WIFI_CONTROL_DATA1(h2c_pkt, *data);
    SET_BT_WIFI_CONTROL_DATA2(h2c_pkt, *(data + 1));
    ...
    SET_BT_WIFI_CONTROL_DATA5(h2c_pkt, *(data + 4));

Detected using the static analysis tool - Svace.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38159/">CVE-2025-38159 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38159">CVE-2025-38159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245751">SUSE bug 1245751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257629">SUSE bug 1257629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38160</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38160" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38160" ref_url="https://www.suse.com/security/cve/CVE-2025-38160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: bcm: rpi: Add NULL check in raspberrypi_clk_register()

devm_kasprintf() returns NULL when memory allocation fails. Currently,
raspberrypi_clk_register() does not check for this case, which results
in a NULL pointer dereference.

Add NULL check after devm_kasprintf() to prevent this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38160/">CVE-2025-38160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38160">CVE-2025-38160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245780">SUSE bug 1245780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38161</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38161" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38161" ref_url="https://www.suse.com/security/cve/CVE-2025-38161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction

Upon RQ destruction if the firmware command fails which is the
last resource to be destroyed some SW resources were already cleaned
regardless of the failure.

Now properly rollback the object to its original state upon such failure.

In order to avoid a use-after free in case someone tries to destroy the
object again, which results in the following kernel trace:
refcount_t: underflow; use-after-free.
WARNING: CPU: 0 PID: 37589 at lib/refcount.c:28 refcount_warn_saturate+0xf4/0x148
Modules linked in: rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) rfkill mlx5_core(OE) mlxdevm(OE) ib_uverbs(OE) ib_core(OE) psample mlxfw(OE) mlx_compat(OE) macsec tls pci_hyperv_intf sunrpc vfat fat virtio_net net_failover failover fuse loop nfnetlink vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vmw_vmci vsock xfs crct10dif_ce ghash_ce sha2_ce sha256_arm64 sha1_ce virtio_console virtio_gpu virtio_blk virtio_dma_buf virtio_mmio dm_mirror dm_region_hash dm_log dm_mod xpmem(OE)
CPU: 0 UID: 0 PID: 37589 Comm: python3 Kdump: loaded Tainted: G           OE     -------  ---  6.12.0-54.el10.aarch64 #1
Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : refcount_warn_saturate+0xf4/0x148
lr : refcount_warn_saturate+0xf4/0x148
sp : ffff80008b81b7e0
x29: ffff80008b81b7e0 x28: ffff000133d51600 x27: 0000000000000001
x26: 0000000000000000 x25: 00000000ffffffea x24: ffff00010ae80f00
x23: ffff00010ae80f80 x22: ffff0000c66e5d08 x21: 0000000000000000
x20: ffff0000c66e0000 x19: ffff00010ae80340 x18: 0000000000000006
x17: 0000000000000000 x16: 0000000000000020 x15: ffff80008b81b37f
x14: 0000000000000000 x13: 2e656572662d7265 x12: ffff80008283ef78
x11: ffff80008257efd0 x10: ffff80008283efd0 x9 : ffff80008021ed90
x8 : 0000000000000001 x7 : 00000000000bffe8 x6 : c0000000ffff7fff
x5 : ffff0001fb8e3408 x4 : 0000000000000000 x3 : ffff800179993000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000133d51600
Call trace:
 refcount_warn_saturate+0xf4/0x148
 mlx5_core_put_rsc+0x88/0xa0 [mlx5_ib]
 mlx5_core_destroy_rq_tracked+0x64/0x98 [mlx5_ib]
 mlx5_ib_destroy_wq+0x34/0x80 [mlx5_ib]
 ib_destroy_wq_user+0x30/0xc0 [ib_core]
 uverbs_free_wq+0x28/0x58 [ib_uverbs]
 destroy_hw_idr_uobject+0x34/0x78 [ib_uverbs]
 uverbs_destroy_uobject+0x48/0x240 [ib_uverbs]
 __uverbs_cleanup_ufile+0xd4/0x1a8 [ib_uverbs]
 uverbs_destroy_ufile_hw+0x48/0x120 [ib_uverbs]
 ib_uverbs_close+0x2c/0x100 [ib_uverbs]
 __fput+0xd8/0x2f0
 __fput_sync+0x50/0x70
 __arm64_sys_close+0x40/0x90
 invoke_syscall.constprop.0+0x74/0xd0
 do_el0_svc+0x48/0xe8
 el0_svc+0x44/0x1d0
 el0t_64_sync_handler+0x120/0x130
 el0t_64_sync+0x1a4/0x1a8
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38161/">CVE-2025-38161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38161">CVE-2025-38161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245777">SUSE bug 1245777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38165</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38165" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38165" ref_url="https://www.suse.com/security/cve/CVE-2025-38165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Fix panic when calling skb_linearize

The panic can be reproduced by executing the command:
./bench sockmap -c 2 -p 1 -a --rx-verdict-ingress --rx-strp 100000

Then a kernel panic was captured:
'''
[  657.460555] kernel BUG at net/core/skbuff.c:2178!
[  657.462680] Tainted: [W]=WARN
[  657.463287] Workqueue: events sk_psock_backlog
...
[  657.469610]  &lt;TASK&gt;
[  657.469738]  ? die+0x36/0x90
[  657.469916]  ? do_trap+0x1d0/0x270
[  657.470118]  ? pskb_expand_head+0x612/0xf40
[  657.470376]  ? pskb_expand_head+0x612/0xf40
[  657.470620]  ? do_error_trap+0xa3/0x170
[  657.470846]  ? pskb_expand_head+0x612/0xf40
[  657.471092]  ? handle_invalid_op+0x2c/0x40
[  657.471335]  ? pskb_expand_head+0x612/0xf40
[  657.471579]  ? exc_invalid_op+0x2d/0x40
[  657.471805]  ? asm_exc_invalid_op+0x1a/0x20
[  657.472052]  ? pskb_expand_head+0xd1/0xf40
[  657.472292]  ? pskb_expand_head+0x612/0xf40
[  657.472540]  ? lock_acquire+0x18f/0x4e0
[  657.472766]  ? find_held_lock+0x2d/0x110
[  657.472999]  ? __pfx_pskb_expand_head+0x10/0x10
[  657.473263]  ? __kmalloc_cache_noprof+0x5b/0x470
[  657.473537]  ? __pfx___lock_release.isra.0+0x10/0x10
[  657.473826]  __pskb_pull_tail+0xfd/0x1d20
[  657.474062]  ? __kasan_slab_alloc+0x4e/0x90
[  657.474707]  sk_psock_skb_ingress_enqueue+0x3bf/0x510
[  657.475392]  ? __kasan_kmalloc+0xaa/0xb0
[  657.476010]  sk_psock_backlog+0x5cf/0xd70
[  657.476637]  process_one_work+0x858/0x1a20
'''

The panic originates from the assertion BUG_ON(skb_shared(skb)) in
skb_linearize(). A previous commit(see Fixes tag) introduced skb_get()
to avoid race conditions between skb operations in the backlog and skb
release in the recvmsg path. However, this caused the panic to always
occur when skb_linearize is executed.

The "--rx-strp 100000" parameter forces the RX path to use the strparser
module which aggregates data until it reaches 100KB before calling sockmap
logic. The 100KB payload exceeds MAX_MSG_FRAGS, triggering skb_linearize.

To fix this issue, just move skb_get into sk_psock_skb_ingress_enqueue.

'''
sk_psock_backlog:
    sk_psock_handle_skb
       skb_get(skb) &lt;== we move it into 'sk_psock_skb_ingress_enqueue'
       sk_psock_skb_ingress____________
                                       v
                                       |
                                       | -&gt; sk_psock_skb_ingress_self
                                       |      sk_psock_skb_ingress_enqueue
sk_psock_verdict_apply_________________^          skb_linearize
'''

Note that for verdict_apply path, the skb_get operation is unnecessary so
we add 'take_ref' param to control it's behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38165/">CVE-2025-38165 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38165">CVE-2025-38165 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245757">SUSE bug 1245757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38168</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38168" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38168" ref_url="https://www.suse.com/security/cve/CVE-2025-38168" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: arm-ni: Unregister PMUs on probe failure

When a resource allocation fails in one clock domain of an NI device,
we need to properly roll back all previously registered perf PMUs in
other clock domains of the same device.

Otherwise, it can lead to kernel panics.

Calling arm_ni_init+0x0/0xff8 [arm_ni] @ 2374
arm-ni ARMHCB70:00: Failed to request PMU region 0x1f3c13000
arm-ni ARMHCB70:00: probe with driver arm-ni failed with error -16
list_add corruption: next-&gt;prev should be prev (fffffd01e9698a18),
but was 0000000000000000. (next=ffff10001a0decc8).
pstate: 6340009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
pc : list_add_valid_or_report+0x7c/0xb8
lr : list_add_valid_or_report+0x7c/0xb8
Call trace:
 __list_add_valid_or_report+0x7c/0xb8
 perf_pmu_register+0x22c/0x3a0
 arm_ni_probe+0x554/0x70c [arm_ni]
 platform_probe+0x70/0xe8
 really_probe+0xc6/0x4d8
 driver_probe_device+0x48/0x170
 __driver_attach+0x8e/0x1c0
 bus_for_each_dev+0x64/0xf0
 driver_add+0x138/0x260
 bus_add_driver+0x68/0x138
 __platform_driver_register+0x2c/0x40
 arm_ni_init+0x14/0x2a [arm_ni]
 do_init_module+0x36/0x298
---[ end trace 0000000000000000 ]---
Kernel panic - not syncing: Oops - BUG: Fatal exception
SMP: stopping secondary CPUs
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38168/">CVE-2025-38168 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38168">CVE-2025-38168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245763">SUSE bug 1245763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38169</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38169" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38169" ref_url="https://www.suse.com/security/cve/CVE-2025-38169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64/fpsimd: Avoid clobbering kernel FPSIMD state with SMSTOP

On system with SME, a thread's kernel FPSIMD state may be erroneously
clobbered during a context switch immediately after that state is
restored. Systems without SME are unaffected.

If the CPU happens to be in streaming SVE mode before a context switch
to a thread with kernel FPSIMD state, fpsimd_thread_switch() will
restore the kernel FPSIMD state using fpsimd_load_kernel_state() while
the CPU is still in streaming SVE mode. When fpsimd_thread_switch()
subsequently calls fpsimd_flush_cpu_state(), this will execute an
SMSTOP, causing an exit from streaming SVE mode. The exit from
streaming SVE mode will cause the hardware to reset a number of
FPSIMD/SVE/SME registers, clobbering the FPSIMD state.

Fix this by calling fpsimd_flush_cpu_state() before restoring the kernel
FPSIMD state.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38169/">CVE-2025-38169 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38169">CVE-2025-38169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245784">SUSE bug 1245784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38170</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38170" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38170" ref_url="https://www.suse.com/security/cve/CVE-2025-38170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64/fpsimd: Discard stale CPU state when handling SME traps

The logic for handling SME traps manipulates saved FPSIMD/SVE/SME state
incorrectly, and a race with preemption can result in a task having
TIF_SME set and TIF_FOREIGN_FPSTATE clear even though the live CPU state
is stale (e.g. with SME traps enabled). This can result in warnings from
do_sme_acc() where SME traps are not expected while TIF_SME is set:

|        /* With TIF_SME userspace shouldn't generate any traps */
|        if (test_and_set_thread_flag(TIF_SME))
|                WARN_ON(1);

This is very similar to the SVE issue we fixed in commit:

  751ecf6afd6568ad ("arm64/sve: Discard stale CPU state when handling SVE traps")

The race can occur when the SME trap handler is preempted before and
after manipulating the saved FPSIMD/SVE/SME state, starting and ending on
the same CPU, e.g.

| void do_sme_acc(unsigned long esr, struct pt_regs *regs)
| {
|         // Trap on CPU 0 with TIF_SME clear, SME traps enabled
|         // task-&gt;fpsimd_cpu is 0.
|         // per_cpu_ptr(&amp;fpsimd_last_state, 0) is task.
|
|         ...
|
|         // Preempted; migrated from CPU 0 to CPU 1.
|         // TIF_FOREIGN_FPSTATE is set.
|
|         get_cpu_fpsimd_context();
|
|         /* With TIF_SME userspace shouldn't generate any traps */
|         if (test_and_set_thread_flag(TIF_SME))
|                 WARN_ON(1);
|
|         if (!test_thread_flag(TIF_FOREIGN_FPSTATE)) {
|                 unsigned long vq_minus_one =
|                         sve_vq_from_vl(task_get_sme_vl(current)) - 1;
|                 sme_set_vq(vq_minus_one);
|
|                 fpsimd_bind_task_to_cpu();
|         }
|
|         put_cpu_fpsimd_context();
|
|         // Preempted; migrated from CPU 1 to CPU 0.
|         // task-&gt;fpsimd_cpu is still 0
|         // If per_cpu_ptr(&amp;fpsimd_last_state, 0) is still task then:
|         // - Stale HW state is reused (with SME traps enabled)
|         // - TIF_FOREIGN_FPSTATE is cleared
|         // - A return to userspace skips HW state restore
| }

Fix the case where the state is not live and TIF_FOREIGN_FPSTATE is set
by calling fpsimd_flush_task_state() to detach from the saved CPU
state. This ensures that a subsequent context switch will not reuse the
stale CPU state, and will instead set TIF_FOREIGN_FPSTATE, forcing the
new state to be reloaded from memory prior to a return to userspace.

Note: this was originallly posted as [1].

[ Rutland: rewrite commit message ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38170/">CVE-2025-38170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38170">CVE-2025-38170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245785">SUSE bug 1245785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38172</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38172" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38172" ref_url="https://www.suse.com/security/cve/CVE-2025-38172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: avoid using multiple devices with different type

For multiple devices, both primary and extra devices should be the
same type. `erofs_init_device` has already guaranteed that if the
primary is a file-backed device, extra devices should also be
regular files.

However, if the primary is a block device while the extra device
is a file-backed device, `erofs_init_device` will get an ENOTBLK,
which is not treated as an error in `erofs_fc_get_tree`, and that
leads to an UAF:

  erofs_fc_get_tree
    get_tree_bdev_flags(erofs_fc_fill_super)
      erofs_read_superblock
        erofs_init_device  // sbi-&gt;dif0 is not inited yet,
                           // return -ENOTBLK
      deactivate_locked_super
        free(sbi)
    if (err is -ENOTBLK)
      sbi-&gt;dif0.file = filp_open()  // sbi UAF

So if -ENOTBLK is hitted in `erofs_init_device`, it means the
primary device must be a block device, and the extra device
is not a block device. The error can be converted to -EINVAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38172/">CVE-2025-38172 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38172">CVE-2025-38172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245787">SUSE bug 1245787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38173</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38173" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38173" ref_url="https://www.suse.com/security/cve/CVE-2025-38173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: marvell/cesa - Handle zero-length skcipher requests

Do not access random memory for zero-length skcipher requests.
Just return 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38173/">CVE-2025-38173 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38173">CVE-2025-38173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245769">SUSE bug 1245769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38174</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38174" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38174" ref_url="https://www.suse.com/security/cve/CVE-2025-38174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thunderbolt: Do not double dequeue a configuration request

Some of our devices crash in tb_cfg_request_dequeue():

 general protection fault, probably for non-canonical address 0xdead000000000122

 CPU: 6 PID: 91007 Comm: kworker/6:2 Tainted: G U W 6.6.65
 RIP: 0010:tb_cfg_request_dequeue+0x2d/0xa0
 Call Trace:
 &lt;TASK&gt;
 ? tb_cfg_request_dequeue+0x2d/0xa0
 tb_cfg_request_work+0x33/0x80
 worker_thread+0x386/0x8f0
 kthread+0xed/0x110
 ret_from_fork+0x38/0x50
 ret_from_fork_asm+0x1b/0x30

The circumstances are unclear, however, the theory is that
tb_cfg_request_work() can be scheduled twice for a request:
first time via frame.callback from ring_work() and second
time from tb_cfg_request().  Both times kworkers will execute
tb_cfg_request_dequeue(), which results in double list_del()
from the ctl-&gt;request_queue (the list poison deference hints
at it: 0xdead000000000122).

Do not dequeue requests that don't have TB_CFG_REQUEST_ACTIVE
bit set.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38174/">CVE-2025-38174 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38174">CVE-2025-38174 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245781">SUSE bug 1245781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38177</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38177" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38177" ref_url="https://www.suse.com/security/cve/CVE-2025-38177" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03317-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03336-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03370-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03387-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03397-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03414-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03418-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20723-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20728-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20737-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20785-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20787-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sch_hfsc: make hfsc_qlen_notify() idempotent

hfsc_qlen_notify() is not idempotent either and not friendly
to its callers, like fq_codel_dequeue(). Let's make it idempotent
to ease qdisc_tree_reduce_backlog() callers' life:

1. update_vf() decreases cl-&gt;cl_nactive, so we can check whether it is
non-zero before calling it.

2. eltree_remove() always removes RB node cl-&gt;el_node, but we can use
   RB_EMPTY_NODE() + RB_CLEAR_NODE() to make it safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38177/">CVE-2025-38177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38177">CVE-2025-38177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237312">SUSE bug 1237312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245986">SUSE bug 1245986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246356">SUSE bug 1246356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38180</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38180" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38180" ref_url="https://www.suse.com/security/cve/CVE-2025-38180" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002632.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: atm: fix /proc/net/atm/lec handling

/proc/net/atm/lec must ensure safety against dev_lec[] changes.

It appears it had dev_put() calls without prior dev_hold(),
leading to imbalance and UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38180/">CVE-2025-38180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38180">CVE-2025-38180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245970">SUSE bug 1245970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245971">SUSE bug 1245971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38181</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38181" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38181" ref_url="https://www.suse.com/security/cve/CVE-2025-38181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03317-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03336-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03370-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03387-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03396-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03397-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03412-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03414-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03418-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20723-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20728-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20737-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20785-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20787-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20790-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

calipso: Fix null-ptr-deref in calipso_req_{set,del}attr().

syzkaller reported a null-ptr-deref in sock_omalloc() while allocating
a CALIPSO option.  [0]

The NULL is of struct sock, which was fetched by sk_to_full_sk() in
calipso_req_setattr().

Since commit a1a5344ddbe8 ("tcp: avoid two atomic ops for syncookies"),
reqsk-&gt;rsk_listener could be NULL when SYN Cookie is returned to its
client, as hinted by the leading SYN Cookie log.

Here are 3 options to fix the bug:

  1) Return 0 in calipso_req_setattr()
  2) Return an error in calipso_req_setattr()
  3) Alaways set rsk_listener

1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie
for CALIPSO.  3) is also no go as there have been many efforts to reduce
atomic ops and make TCP robust against DDoS.  See also commit 3b24d854cb35
("tcp/dccp: do not touch listener sk_refcnt under synflood").

As of the blamed commit, SYN Cookie already did not need refcounting,
and no one has stumbled on the bug for 9 years, so no CALIPSO user will
care about SYN Cookie.

Let's return an error in calipso_req_setattr() and calipso_req_delattr()
in the SYN Cookie case.

This can be reproduced by [1] on Fedora and now connect() of nc times out.

[0]:
TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
CPU: 3 UID: 0 PID: 12262 Comm: syz.1.2611 Not tainted 6.14.0 #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
RIP: 0010:read_pnet include/net/net_namespace.h:406 [inline]
RIP: 0010:sock_net include/net/sock.h:655 [inline]
RIP: 0010:sock_kmalloc+0x35/0x170 net/core/sock.c:2806
Code: 89 d5 41 54 55 89 f5 53 48 89 fb e8 25 e3 c6 fd e8 f0 91 e3 00 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 26 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b
RSP: 0018:ffff88811af89038 EFLAGS: 00010216
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff888105266400
RDX: 0000000000000006 RSI: ffff88800c890000 RDI: 0000000000000030
RBP: 0000000000000050 R08: 0000000000000000 R09: ffff88810526640e
R10: ffffed1020a4cc81 R11: ffff88810526640f R12: 0000000000000000
R13: 0000000000000820 R14: ffff888105266400 R15: 0000000000000050
FS:  00007f0653a07640(0000) GS:ffff88811af80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f863ba096f4 CR3: 00000000163c0005 CR4: 0000000000770ef0
PKRU: 80000000
Call Trace:
 &lt;IRQ&gt;
 ipv6_renew_options+0x279/0x950 net/ipv6/exthdrs.c:1288
 calipso_req_setattr+0x181/0x340 net/ipv6/calipso.c:1204
 calipso_req_setattr+0x56/0x80 net/netlabel/netlabel_calipso.c:597
 netlbl_req_setattr+0x18a/0x440 net/netlabel/netlabel_kapi.c:1249
 selinux_netlbl_inet_conn_request+0x1fb/0x320 security/selinux/netlabel.c:342
 selinux_inet_conn_request+0x1eb/0x2c0 security/selinux/hooks.c:5551
 security_inet_conn_request+0x50/0xa0 security/security.c:4945
 tcp_v6_route_req+0x22c/0x550 net/ipv6/tcp_ipv6.c:825
 tcp_conn_request+0xec8/0x2b70 net/ipv4/tcp_input.c:7275
 tcp_v6_conn_request+0x1e3/0x440 net/ipv6/tcp_ipv6.c:1328
 tcp_rcv_state_process+0xafa/0x52b0 net/ipv4/tcp_input.c:6781
 tcp_v6_do_rcv+0x8a6/0x1a40 net/ipv6/tcp_ipv6.c:1667
 tcp_v6_rcv+0x505e/0x5b50 net/ipv6/tcp_ipv6.c:1904
 ip6_protocol_deliver_rcu+0x17c/0x1da0 net/ipv6/ip6_input.c:436
 ip6_input_finish+0x103/0x180 net/ipv6/ip6_input.c:480
 NF_HOOK include/linux/netfilter.h:314 [inline]
 NF_HOOK include/linux/netfilter.h:308 [inline]
 ip6_input+0x13c/0x6b0 net/ipv6/ip6_input.c:491
 dst_input include/net/dst.h:469 [inline]
 ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]
 ip6_rcv_finish+0xb6/0x490 net/ipv6/ip6_input.c:69
 NF_HOOK include/linux/netfilter.h:314 [inline]
 NF_HOOK include/linux/netf
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38181/">CVE-2025-38181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38181">CVE-2025-38181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246000">SUSE bug 1246000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246001">SUSE bug 1246001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38182</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38182" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38182" ref_url="https://www.suse.com/security/cve/CVE-2025-38182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ublk: santizize the arguments from userspace when adding a device

Sanity check the values for queue depth and number of queues
we get from userspace when adding a device.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38182/">CVE-2025-38182 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38182">CVE-2025-38182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245937">SUSE bug 1245937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38184</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38184" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38184" ref_url="https://www.suse.com/security/cve/CVE-2025-38184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer

The reproduction steps:
1. create a tun interface
2. enable l2 bearer
3. TIPC_NL_UDP_GET_REMOTEIP with media name set to tun

tipc: Started in network mode
tipc: Node identity 8af312d38a21, cluster identity 4711
tipc: Enabled bearer &lt;eth:syz_tun&gt;, priority 1
Oops: general protection fault
KASAN: null-ptr-deref in range
CPU: 1 UID: 1000 PID: 559 Comm: poc Not tainted 6.16.0-rc1+ #117 PREEMPT
Hardware name: QEMU Ubuntu 24.04 PC
RIP: 0010:tipc_udp_nl_dump_remoteip+0x4a4/0x8f0

the ub was in fact a struct dev.

when bid != 0 &amp;&amp; skip_cnt != 0, bearer_list[bid] may be NULL or
other media when other thread changes it.

fix this by checking media_id.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38184/">CVE-2025-38184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38184">CVE-2025-38184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245956">SUSE bug 1245956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38185</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38185" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38185" ref_url="https://www.suse.com/security/cve/CVE-2025-38185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: atmtcp: Free invalid length skb in atmtcp_c_send().

syzbot reported the splat below. [0]

vcc_sendmsg() copies data passed from userspace to skb and passes
it to vcc-&gt;dev-&gt;ops-&gt;send().

atmtcp_c_send() accesses skb-&gt;data as struct atmtcp_hdr after
checking if skb-&gt;len is 0, but it's not enough.

Also, when skb-&gt;len == 0, skb and sk (vcc) were leaked because
dev_kfree_skb() is not called and sk_wmem_alloc adjustment is missing
to revert atm_account_tx() in vcc_sendmsg(), which is expected
to be done in atm_pop_raw().

Let's properly free skb with an invalid length in atmtcp_c_send().

[0]:
BUG: KMSAN: uninit-value in atmtcp_c_send+0x255/0xed0 drivers/atm/atmtcp.c:294
 atmtcp_c_send+0x255/0xed0 drivers/atm/atmtcp.c:294
 vcc_sendmsg+0xd7c/0xff0 net/atm/common.c:644
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg+0x330/0x3d0 net/socket.c:727
 ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2566
 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620
 __sys_sendmsg net/socket.c:2652 [inline]
 __do_sys_sendmsg net/socket.c:2657 [inline]
 __se_sys_sendmsg net/socket.c:2655 [inline]
 __x64_sys_sendmsg+0x211/0x3e0 net/socket.c:2655
 x64_sys_call+0x32fb/0x3db0 arch/x86/include/generated/asm/syscalls_64.h:47
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
 slab_post_alloc_hook mm/slub.c:4154 [inline]
 slab_alloc_node mm/slub.c:4197 [inline]
 kmem_cache_alloc_node_noprof+0x818/0xf00 mm/slub.c:4249
 kmalloc_reserve+0x13c/0x4b0 net/core/skbuff.c:579
 __alloc_skb+0x347/0x7d0 net/core/skbuff.c:670
 alloc_skb include/linux/skbuff.h:1336 [inline]
 vcc_sendmsg+0xb40/0xff0 net/atm/common.c:628
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg+0x330/0x3d0 net/socket.c:727
 ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2566
 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620
 __sys_sendmsg net/socket.c:2652 [inline]
 __do_sys_sendmsg net/socket.c:2657 [inline]
 __se_sys_sendmsg net/socket.c:2655 [inline]
 __x64_sys_sendmsg+0x211/0x3e0 net/socket.c:2655
 x64_sys_call+0x32fb/0x3db0 arch/x86/include/generated/asm/syscalls_64.h:47
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

CPU: 1 UID: 0 PID: 5798 Comm: syz-executor192 Not tainted 6.16.0-rc1-syzkaller-00010-g2c4a1f3fe03e #0 PREEMPT(undef)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38185/">CVE-2025-38185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38185">CVE-2025-38185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246012">SUSE bug 1246012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38186</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38186" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38186" ref_url="https://www.suse.com/security/cve/CVE-2025-38186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Fix double invocation of bnxt_ulp_stop()/bnxt_ulp_start()

Before the commit under the Fixes tag below, bnxt_ulp_stop() and
bnxt_ulp_start() were always invoked in pairs.  After that commit,
the new bnxt_ulp_restart() can be invoked after bnxt_ulp_stop()
has been called.  This may result in the RoCE driver's aux driver
.suspend() method being invoked twice.  The 2nd bnxt_re_suspend()
call will crash when it dereferences a NULL pointer:

(NULL ib_device): Handle device suspend call
BUG: kernel NULL pointer dereference, address: 0000000000000b78
PGD 0 P4D 0
Oops: Oops: 0000 [#1] SMP PTI
CPU: 20 UID: 0 PID: 181 Comm: kworker/u96:5 Tainted: G S                  6.15.0-rc1 #4 PREEMPT(voluntary)
Tainted: [S]=CPU_OUT_OF_SPEC
Hardware name: Dell Inc. PowerEdge R730/072T6D, BIOS 2.4.3 01/17/2017
Workqueue: bnxt_pf_wq bnxt_sp_task [bnxt_en]
RIP: 0010:bnxt_re_suspend+0x45/0x1f0 [bnxt_re]
Code: 8b 05 a7 3c 5b f5 48 89 44 24 18 31 c0 49 8b 5c 24 08 4d 8b 2c 24 e8 ea 06 0a f4 48 c7 c6 04 60 52 c0 48 89 df e8 1b ce f9 ff &lt;48&gt; 8b 83 78 0b 00 00 48 8b 80 38 03 00 00 a8 40 0f 85 b5 00 00 00
RSP: 0018:ffffa2e84084fd88 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: ffffffffb4b6b934 RDI: 00000000ffffffff
RBP: ffffa1760954c9c0 R08: 0000000000000000 R09: c0000000ffffdfff
R10: 0000000000000001 R11: ffffa2e84084fb50 R12: ffffa176031ef070
R13: ffffa17609775000 R14: ffffa17603adc180 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffffa17daa397000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000b78 CR3: 00000004aaa30003 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;TASK&gt;
bnxt_ulp_stop+0x69/0x90 [bnxt_en]
bnxt_sp_task+0x678/0x920 [bnxt_en]
? __schedule+0x514/0xf50
process_scheduled_works+0x9d/0x400
worker_thread+0x11c/0x260
? __pfx_worker_thread+0x10/0x10
kthread+0xfe/0x1e0
? __pfx_kthread+0x10/0x10
ret_from_fork+0x2b/0x40
? __pfx_kthread+0x10/0x10
ret_from_fork_asm+0x1a/0x30

Check the BNXT_EN_FLAG_ULP_STOPPED flag and do not proceed if the flag
is already set.  This will preserve the original symmetrical
bnxt_ulp_stop() and bnxt_ulp_start().

Also, inside bnxt_ulp_start(), clear the BNXT_EN_FLAG_ULP_STOPPED
flag after taking the mutex to avoid any race condition.  And for
symmetry, only proceed in bnxt_ulp_start() if the
BNXT_EN_FLAG_ULP_STOPPED is set.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38186/">CVE-2025-38186 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38186">CVE-2025-38186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245955">SUSE bug 1245955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38188</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38188" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38188" ref_url="https://www.suse.com/security/cve/CVE-2025-38188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/a7xx: Call CP_RESET_CONTEXT_STATE

Calling this packet is necessary when we switch contexts because there
are various pieces of state used by userspace to synchronize between BR
and BV that are persistent across submits and we need to make sure that
they are in a "safe" state when switching contexts. Otherwise a
userspace submission in one context could cause another context to
function incorrectly and hang, effectively a denial of service (although
without leaking data). This was missed during initial a7xx bringup.

Patchwork: https://patchwork.freedesktop.org/patch/654924/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38188/">CVE-2025-38188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38188">CVE-2025-38188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246098">SUSE bug 1246098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38189</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38189" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38189" ref_url="https://www.suse.com/security/cve/CVE-2025-38189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/v3d: Avoid NULL pointer dereference in `v3d_job_update_stats()`

The following kernel Oops was recently reported by Mesa CI:

[  800.139824] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000588
[  800.148619] Mem abort info:
[  800.151402]   ESR = 0x0000000096000005
[  800.155141]   EC = 0x25: DABT (current EL), IL = 32 bits
[  800.160444]   SET = 0, FnV = 0
[  800.163488]   EA = 0, S1PTW = 0
[  800.166619]   FSC = 0x05: level 1 translation fault
[  800.171487] Data abort info:
[  800.174357]   ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000
[  800.179832]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[  800.184873]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[  800.190176] user pgtable: 4k pages, 39-bit VAs, pgdp=00000001014c2000
[  800.196607] [0000000000000588] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000
[  800.205305] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  800.211564] Modules linked in: vc4 snd_soc_hdmi_codec drm_display_helper v3d cec gpu_sched drm_dma_helper drm_shmem_helper drm_kms_helper drm drm_panel_orientation_quirks snd_soc_core snd_compress snd_pcm_dmaengine snd_pcm i2c_brcmstb snd_timer snd backlight
[  800.234448] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.25+rpt-rpi-v8 #1  Debian 1:6.12.25-1+rpt1
[  800.244182] Hardware name: Raspberry Pi 4 Model B Rev 1.4 (DT)
[  800.250005] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  800.256959] pc : v3d_job_update_stats+0x60/0x130 [v3d]
[  800.262112] lr : v3d_job_update_stats+0x48/0x130 [v3d]
[  800.267251] sp : ffffffc080003e60
[  800.270555] x29: ffffffc080003e60 x28: ffffffd842784980 x27: 0224012000000000
[  800.277687] x26: ffffffd84277f630 x25: ffffff81012fd800 x24: 0000000000000020
[  800.284818] x23: ffffff8040238b08 x22: 0000000000000570 x21: 0000000000000158
[  800.291948] x20: 0000000000000000 x19: ffffff8040238000 x18: 0000000000000000
[  800.299078] x17: ffffffa8c1bd2000 x16: ffffffc080000000 x15: 0000000000000000
[  800.306208] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  800.313338] x11: 0000000000000040 x10: 0000000000001a40 x9 : ffffffd83b39757c
[  800.320468] x8 : ffffffd842786420 x7 : 7fffffffffffffff x6 : 0000000000ef32b0
[  800.327598] x5 : 00ffffffffffffff x4 : 0000000000000015 x3 : ffffffd842784980
[  800.334728] x2 : 0000000000000004 x1 : 0000000000010002 x0 : 000000ba4c0ca382
[  800.341859] Call trace:
[  800.344294]  v3d_job_update_stats+0x60/0x130 [v3d]
[  800.349086]  v3d_irq+0x124/0x2e0 [v3d]
[  800.352835]  __handle_irq_event_percpu+0x58/0x218
[  800.357539]  handle_irq_event+0x54/0xb8
[  800.361369]  handle_fasteoi_irq+0xac/0x240
[  800.365458]  handle_irq_desc+0x48/0x68
[  800.369200]  generic_handle_domain_irq+0x24/0x38
[  800.373810]  gic_handle_irq+0x48/0xd8
[  800.377464]  call_on_irq_stack+0x24/0x58
[  800.381379]  do_interrupt_handler+0x88/0x98
[  800.385554]  el1_interrupt+0x34/0x68
[  800.389123]  el1h_64_irq_handler+0x18/0x28
[  800.393211]  el1h_64_irq+0x64/0x68
[  800.396603]  default_idle_call+0x3c/0x168
[  800.400606]  do_idle+0x1fc/0x230
[  800.403827]  cpu_startup_entry+0x40/0x50
[  800.407742]  rest_init+0xe4/0xf0
[  800.410962]  start_kernel+0x5e8/0x790
[  800.414616]  __primary_switched+0x80/0x90
[  800.418622] Code: 8b170277 8b160296 11000421 b9000861 (b9401ac1)
[  800.424707] ---[ end trace 0000000000000000 ]---
[  800.457313] ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---

This issue happens when the file descriptor is closed before the jobs
submitted by it are completed. When the job completes, we update the
global GPU stats and the per-fd GPU stats, which are exposed through
fdinfo. If the file descriptor was closed, then the struct `v3d_file_priv`
and its stats were already freed and we can't update the per-fd stats.

Therefore, if the file descriptor was already closed, don't u
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38189/">CVE-2025-38189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38189">CVE-2025-38189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245812">SUSE bug 1245812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38190</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38190" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38190" ref_url="https://www.suse.com/security/cve/CVE-2025-38190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: Revert atm_account_tx() if copy_from_iter_full() fails.

In vcc_sendmsg(), we account skb-&gt;truesize to sk-&gt;sk_wmem_alloc by
atm_account_tx().

It is expected to be reverted by atm_pop_raw() later called by
vcc-&gt;dev-&gt;ops-&gt;send(vcc, skb).

However, vcc_sendmsg() misses the same revert when copy_from_iter_full()
fails, and then we will leak a socket.

Let's factorise the revert part as atm_return_tx() and call it in
the failure path.

Note that the corresponding sk_wmem_alloc operation can be found in
alloc_tx() as of the blamed commit.

  $ git blame -L:alloc_tx net/atm/common.c c55fa3cccbc2c~
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38190/">CVE-2025-38190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38190">CVE-2025-38190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245973">SUSE bug 1245973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38193</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38193" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38193" ref_url="https://www.suse.com/security/cve/CVE-2025-38193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net_sched: sch_sfq: reject invalid perturb period

Gerrard Tai reported that SFQ perturb_period has no range check yet,
and this can be used to trigger a race condition fixed in a separate patch.

We want to make sure ctl-&gt;perturb_period * HZ will not overflow
and is positive.


tc qd add dev lo root sfq perturb -10   # negative value : error
Error: sch_sfq: invalid perturb period.

tc qd add dev lo root sfq perturb 1000000000 # too big : error
Error: sch_sfq: invalid perturb period.

tc qd add dev lo root sfq perturb 2000000 # acceptable value
tc -s -d qd sh dev lo
qdisc sfq 8005: root refcnt 2 limit 127p quantum 64Kb depth 127 flows 128 divisor 1024 perturb 2000000sec
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
 backlog 0b 0p requeues 0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38193/">CVE-2025-38193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38193">CVE-2025-38193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245945">SUSE bug 1245945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38197</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38197" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38197" ref_url="https://www.suse.com/security/cve/CVE-2025-38197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: dell_rbu: Fix list usage

Pass the correct list head to list_for_each_entry*() when looping through
the packet list.

Without this patch, reading the packet data via sysfs will show the data
incorrectly (because it starts at the wrong packet), and clearing the
packet list will result in a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38197/">CVE-2025-38197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38197">CVE-2025-38197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246047">SUSE bug 1246047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38198</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38198" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38198" ref_url="https://www.suse.com/security/cve/CVE-2025-38198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbcon: Make sure modelist not set on unregistered console

It looks like attempting to write to the "store_modes" sysfs node will
run afoul of unregistered consoles:

UBSAN: array-index-out-of-bounds in drivers/video/fbdev/core/fbcon.c:122:28
index -1 is out of range for type 'fb_info *[32]'
...
 fbcon_info_from_console+0x192/0x1a0 drivers/video/fbdev/core/fbcon.c:122
 fbcon_new_modelist+0xbf/0x2d0 drivers/video/fbdev/core/fbcon.c:3048
 fb_new_modelist+0x328/0x440 drivers/video/fbdev/core/fbmem.c:673
 store_modes+0x1c9/0x3e0 drivers/video/fbdev/core/fbsysfs.c:113
 dev_attr_store+0x55/0x80 drivers/base/core.c:2439

static struct fb_info *fbcon_registered_fb[FB_MAX];
...
static signed char con2fb_map[MAX_NR_CONSOLES];
...
static struct fb_info *fbcon_info_from_console(int console)
...
        return fbcon_registered_fb[con2fb_map[console]];

If con2fb_map contains a -1 things go wrong here. Instead, return NULL,
as callers of fbcon_info_from_console() are trying to compare against
existing "info" pointers, so error handling should kick in correctly.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38198/">CVE-2025-38198 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38198">CVE-2025-38198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245952">SUSE bug 1245952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38201</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38201" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38201" ref_url="https://www.suse.com/security/cve/CVE-2025-38201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX

Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof()
when resizing hashtable because __GFP_NOWARN is unset.

Similar to:

  b541ba7d1f5a ("netfilter: conntrack: clamp maximum hashtable size to INT_MAX")
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38201/">CVE-2025-38201 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38201">CVE-2025-38201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245977">SUSE bug 1245977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38205</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38205" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38205" ref_url="https://www.suse.com/security/cve/CVE-2025-38205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1

[Why]
If the dummy values in `populate_dummy_dml_surface_cfg()` aren't updated
then they can lead to a divide by zero in downstream callers like
CalculateVMAndRowBytes()

[How]
Initialize dummy value to a value to avoid divide by zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38205/">CVE-2025-38205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38205">CVE-2025-38205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246005">SUSE bug 1246005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38208</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38208" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38208" ref_url="https://www.suse.com/security/cve/CVE-2025-38208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: add NULL check in automount_fullpath

page is checked for null in __build_path_from_dentry_optional_prefix
when tcon-&gt;origin_fullpath is not set. However, the check is missing when
it is set.
Add a check to prevent a potential NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38208/">CVE-2025-38208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38208">CVE-2025-38208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245815">SUSE bug 1245815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38209</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38209" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38209" ref_url="https://www.suse.com/security/cve/CVE-2025-38209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: remove tag set when second admin queue config fails

Commit 104d0e2f6222 ("nvme-fabrics: reset admin connection for secure
concatenation") modified nvme_tcp_setup_ctrl() to call
nvme_tcp_configure_admin_queue() twice. The first call prepares for
DH-CHAP negotitation, and the second call is required for secure
concatenation. However, this change triggered BUG KASAN slab-use-after-
free in blk_mq_queue_tag_busy_iter(). This BUG can be recreated by
repeating the blktests test case nvme/063 a few times [1].

When the BUG happens, nvme_tcp_create_ctrl() fails in the call chain
below:

nvme_tcp_create_ctrl()
 nvme_tcp_alloc_ctrl() new=true             ... Alloc nvme_tcp_ctrl and admin_tag_set
 nvme_tcp_setup_ctrl() new=true
  nvme_tcp_configure_admin_queue() new=true ... Succeed
   nvme_alloc_admin_tag_set()               ... Alloc the tag set for admin_tag_set
  nvme_stop_keep_alive()
  nvme_tcp_teardown_admin_queue() remove=false
  nvme_tcp_configure_admin_queue() new=false
   nvme_tcp_alloc_admin_queue()             ... Fail, but do not call nvme_remove_admin_tag_set()
 nvme_uninit_ctrl()
 nvme_put_ctrl()                            ... Free up the nvme_tcp_ctrl and admin_tag_set

The first call of nvme_tcp_configure_admin_queue() succeeds with
new=true argument. The second call fails with new=false argument. This
second call does not call nvme_remove_admin_tag_set() on failure, due to
the new=false argument. Then the admin tag set is not removed. However,
nvme_tcp_create_ctrl() assumes that nvme_tcp_setup_ctrl() would call
nvme_remove_admin_tag_set(). Then it frees up struct nvme_tcp_ctrl which
has admin_tag_set field. Later on, the timeout handler accesses the
admin_tag_set field and causes the BUG KASAN slab-use-after-free.

To not leave the admin tag set, call nvme_remove_admin_tag_set() when
the second nvme_tcp_configure_admin_queue() call fails. Do not return
from nvme_tcp_setup_ctrl() on failure. Instead, jump to "destroy_admin"
go-to label to call nvme_tcp_teardown_admin_queue() which calls
nvme_remove_admin_tag_set().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38209/">CVE-2025-38209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38209">CVE-2025-38209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246022">SUSE bug 1246022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38211</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38211" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38211" ref_url="https://www.suse.com/security/cve/CVE-2025-38211" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15008" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001974.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction

The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last
deref") simplified cm_id resource management by freeing cm_id once all
references to the cm_id were removed. The references are removed either
upon completion of iw_cm event handlers or when the application destroys
the cm_id. This commit introduced the use-after-free condition where
cm_id_private object could still be in use by event handler works during
the destruction of cm_id. The commit aee2424246f9 ("RDMA/iwcm: Fix a
use-after-free related to destroying CM IDs") addressed this use-after-
free by flushing all pending works at the cm_id destruction.

However, still another use-after-free possibility remained. It happens
with the work objects allocated for each cm_id_priv within
alloc_work_entries() during cm_id creation, and subsequently freed in
dealloc_work_entries() once all references to the cm_id are removed.
If the cm_id's last reference is decremented in the event handler work,
the work object for the work itself gets removed, and causes the use-
after-free BUG below:

  BUG: KASAN: slab-use-after-free in __pwq_activate_work+0x1ff/0x250
  Read of size 8 at addr ffff88811f9cf800 by task kworker/u16:1/147091

  CPU: 2 UID: 0 PID: 147091 Comm: kworker/u16:1 Not tainted 6.15.0-rc2+ #27 PREEMPT(voluntary)
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014
  Workqueue:  0x0 (iw_cm_wq)
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x6a/0x90
   print_report+0x174/0x554
   ? __virt_addr_valid+0x208/0x430
   ? __pwq_activate_work+0x1ff/0x250
   kasan_report+0xae/0x170
   ? __pwq_activate_work+0x1ff/0x250
   __pwq_activate_work+0x1ff/0x250
   pwq_dec_nr_in_flight+0x8c5/0xfb0
   process_one_work+0xc11/0x1460
   ? __pfx_process_one_work+0x10/0x10
   ? assign_work+0x16c/0x240
   worker_thread+0x5ef/0xfd0
   ? __pfx_worker_thread+0x10/0x10
   kthread+0x3b0/0x770
   ? __pfx_kthread+0x10/0x10
   ? rcu_is_watching+0x11/0xb0
   ? _raw_spin_unlock_irq+0x24/0x50
   ? rcu_is_watching+0x11/0xb0
   ? __pfx_kthread+0x10/0x10
   ret_from_fork+0x30/0x70
   ? __pfx_kthread+0x10/0x10
   ret_from_fork_asm+0x1a/0x30
   &lt;/TASK&gt;

  Allocated by task 147416:
   kasan_save_stack+0x2c/0x50
   kasan_save_track+0x10/0x30
   __kasan_kmalloc+0xa6/0xb0
   alloc_work_entries+0xa9/0x260 [iw_cm]
   iw_cm_connect+0x23/0x4a0 [iw_cm]
   rdma_connect_locked+0xbfd/0x1920 [rdma_cm]
   nvme_rdma_cm_handler+0x8e5/0x1b60 [nvme_rdma]
   cma_cm_event_handler+0xae/0x320 [rdma_cm]
   cma_work_handler+0x106/0x1b0 [rdma_cm]
   process_one_work+0x84f/0x1460
   worker_thread+0x5ef/0xfd0
   kthread+0x3b0/0x770
   ret_from_fork+0x30/0x70
   ret_from_fork_asm+0x1a/0x30

  Freed by task 147091:
   kasan_save_stack+0x2c/0x50
   kasan_save_track+0x10/0x30
   kasan_save_free_info+0x37/0x60
   __kasan_slab_free+0x4b/0x70
   kfree+0x13a/0x4b0
   dealloc_work_entries+0x125/0x1f0 [iw_cm]
   iwcm_deref_id+0x6f/0xa0 [iw_cm]
   cm_work_handler+0x136/0x1ba0 [iw_cm]
   process_one_work+0x84f/0x1460
   worker_thread+0x5ef/0xfd0
   kthread+0x3b0/0x770
   ret_from_fork+0x30/0x70
   ret_from_fork_asm+0x1a/0x30

  Last potentially related work creation:
   kasan_save_stack+0x2c/0x50
   kasan_record_aux_stack+0xa3/0xb0
   __queue_work+0x2ff/0x1390
   queue_work_on+0x67/0xc0
   cm_event_handler+0x46a/0x820 [iw_cm]
   siw_cm_upcall+0x330/0x650 [siw]
   siw_cm_work_handler+0x6b9/0x2b20 [siw]
   process_one_work+0x84f/0x1460
   worker_thread+0x5ef/0xfd0
   kthread+0x3b0/0x770
   ret_from_fork+0x30/0x70
   ret_from_fork_asm+0x1a/0x30

This BUG is reproducible by repeating the blktests test case nvme/061
for the rdma transport and the siw driver.

To avoid the use-after-free of cm_id_private work objects, ensure that
the last reference to the cm_id is decremented not in the event handler
works, but in the cm_id destruction context. For that purpose, mo
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38211/">CVE-2025-38211 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38211">CVE-2025-38211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246008">SUSE bug 1246008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38213</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38213" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38213" ref_url="https://www.suse.com/security/cve/CVE-2025-38213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38213/">CVE-2025-38213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38213">CVE-2025-38213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246037">SUSE bug 1246037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246039">SUSE bug 1246039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38214</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38214" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38214" ref_url="https://www.suse.com/security/cve/CVE-2025-38214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var

If fb_add_videomode() in fb_set_var() fails to allocate memory for
fb_videomode, later it may lead to a null-ptr dereference in
fb_videomode_to_var(), as the fb_info is registered while not having the
mode in modelist that is expected to be there, i.e. the one that is
described in fb_info-&gt;var.

================================================================
general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 1 PID: 30371 Comm: syz-executor.1 Not tainted 5.10.226-syzkaller #0
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:fb_videomode_to_var+0x24/0x610 drivers/video/fbdev/core/modedb.c:901
Call Trace:
 display_to_var+0x3a/0x7c0 drivers/video/fbdev/core/fbcon.c:929
 fbcon_resize+0x3e2/0x8f0 drivers/video/fbdev/core/fbcon.c:2071
 resize_screen drivers/tty/vt/vt.c:1176 [inline]
 vc_do_resize+0x53a/0x1170 drivers/tty/vt/vt.c:1263
 fbcon_modechanged+0x3ac/0x6e0 drivers/video/fbdev/core/fbcon.c:2720
 fbcon_update_vcs+0x43/0x60 drivers/video/fbdev/core/fbcon.c:2776
 do_fb_ioctl+0x6d2/0x740 drivers/video/fbdev/core/fbmem.c:1128
 fb_ioctl+0xe7/0x150 drivers/video/fbdev/core/fbmem.c:1203
 vfs_ioctl fs/ioctl.c:48 [inline]
 __do_sys_ioctl fs/ioctl.c:753 [inline]
 __se_sys_ioctl fs/ioctl.c:739 [inline]
 __x64_sys_ioctl+0x19a/0x210 fs/ioctl.c:739
 do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x67/0xd1
================================================================

The reason is that fb_info-&gt;var is being modified in fb_set_var(), and
then fb_videomode_to_var() is called. If it fails to add the mode to
fb_info-&gt;modelist, fb_set_var() returns error, but does not restore the
old value of fb_info-&gt;var. Restore fb_info-&gt;var on failure the same way
it is done earlier in the function.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38214/">CVE-2025-38214 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38214">CVE-2025-38214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246042">SUSE bug 1246042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38215</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38215" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38215" ref_url="https://www.suse.com/security/cve/CVE-2025-38215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var

If fb_add_videomode() in do_register_framebuffer() fails to allocate
memory for fb_videomode, it will later lead to a null-ptr dereference in
fb_videomode_to_var(), as the fb_info is registered while not having the
mode in modelist that is expected to be there, i.e. the one that is
described in fb_info-&gt;var.

================================================================
general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 1 PID: 30371 Comm: syz-executor.1 Not tainted 5.10.226-syzkaller #0
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:fb_videomode_to_var+0x24/0x610 drivers/video/fbdev/core/modedb.c:901
Call Trace:
 display_to_var+0x3a/0x7c0 drivers/video/fbdev/core/fbcon.c:929
 fbcon_resize+0x3e2/0x8f0 drivers/video/fbdev/core/fbcon.c:2071
 resize_screen drivers/tty/vt/vt.c:1176 [inline]
 vc_do_resize+0x53a/0x1170 drivers/tty/vt/vt.c:1263
 fbcon_modechanged+0x3ac/0x6e0 drivers/video/fbdev/core/fbcon.c:2720
 fbcon_update_vcs+0x43/0x60 drivers/video/fbdev/core/fbcon.c:2776
 do_fb_ioctl+0x6d2/0x740 drivers/video/fbdev/core/fbmem.c:1128
 fb_ioctl+0xe7/0x150 drivers/video/fbdev/core/fbmem.c:1203
 vfs_ioctl fs/ioctl.c:48 [inline]
 __do_sys_ioctl fs/ioctl.c:753 [inline]
 __se_sys_ioctl fs/ioctl.c:739 [inline]
 __x64_sys_ioctl+0x19a/0x210 fs/ioctl.c:739
 do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x67/0xd1
================================================================

Even though fbcon_init() checks beforehand if fb_match_mode() in
var_to_display() fails, it can not prevent the panic because fbcon_init()
does not return error code. Considering this and the comment in the code
about fb_match_mode() returning NULL - "This should not happen" - it is
better to prevent registering the fb_info if its mode was not set
successfully. Also move fb_add_videomode() closer to the beginning of
do_register_framebuffer() to avoid having to do the cleanup on fail.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38215/">CVE-2025-38215 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38215">CVE-2025-38215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246109">SUSE bug 1246109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38216</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38216" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38216" ref_url="https://www.suse.com/security/cve/CVE-2025-38216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Restore context entry setup order for aliased devices

Commit 2031c469f816 ("iommu/vt-d: Add support for static identity domain")
changed the context entry setup during domain attachment from a
set-and-check policy to a clear-and-reset approach. This inadvertently
introduced a regression affecting PCI aliased devices behind PCIe-to-PCI
bridges.

Specifically, keyboard and touchpad stopped working on several Apple
Macbooks with below messages:

 kernel: platform pxa2xx-spi.3: Adding to iommu group 20
 kernel: input: Apple SPI Keyboard as
 /devices/pci0000:00/0000:00:1e.3/pxa2xx-spi.3/spi_master/spi2/spi-APP000D:00/input/input0
 kernel: DMAR: DRHD: handling fault status reg 3
 kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr
 0xffffa000 [fault reason 0x06] PTE Read access is not set
 kernel: DMAR: DRHD: handling fault status reg 3
 kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr
 0xffffa000 [fault reason 0x06] PTE Read access is not set
 kernel: applespi spi-APP000D:00: Error writing to device: 01 0e 00 00
 kernel: DMAR: DRHD: handling fault status reg 3
 kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr
 0xffffa000 [fault reason 0x06] PTE Read access is not set
 kernel: DMAR: DRHD: handling fault status reg 3
 kernel: applespi spi-APP000D:00: Error writing to device: 01 0e 00 00

Fix this by restoring the previous context setup order.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38216/">CVE-2025-38216 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38216">CVE-2025-38216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245963">SUSE bug 1245963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38217</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38217" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38217" ref_url="https://www.suse.com/security/cve/CVE-2025-38217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (ftsteutates) Fix TOCTOU race in fts_read()

In the fts_read() function, when handling hwmon_pwm_auto_channels_temp,
the code accesses the shared variable data-&gt;fan_source[channel] twice
without holding any locks. It is first checked against
FTS_FAN_SOURCE_INVALID, and if the check passes, it is read again
when used as an argument to the BIT() macro.

This creates a Time-of-Check to Time-of-Use (TOCTOU) race condition.
Another thread executing fts_update_device() can modify the value of
data-&gt;fan_source[channel] between the check and its use. If the value
is changed to FTS_FAN_SOURCE_INVALID (0xff) during this window, the
BIT() macro will be called with a large shift value (BIT(255)).
A bit shift by a value greater than or equal to the type width is
undefined behavior and can lead to a crash or incorrect values being
returned to userspace.

Fix this by reading data-&gt;fan_source[channel] into a local variable
once, eliminating the race condition. Additionally, add a bounds check
to ensure the value is less than BITS_PER_LONG before passing it to
the BIT() macro, making the code more robust against undefined behavior.

This possible bug was found by an experimental static analysis tool
developed by our team.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38217/">CVE-2025-38217 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38217">CVE-2025-38217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246002">SUSE bug 1246002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38220</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38220" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38220" ref_url="https://www.suse.com/security/cve/CVE-2025-38220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: only dirty folios when data journaling regular files

fstest generic/388 occasionally reproduces a crash that looks as
follows:

BUG: kernel NULL pointer dereference, address: 0000000000000000
...
Call Trace:
 &lt;TASK&gt;
 ext4_block_zero_page_range+0x30c/0x380 [ext4]
 ext4_truncate+0x436/0x440 [ext4]
 ext4_process_orphan+0x5d/0x110 [ext4]
 ext4_orphan_cleanup+0x124/0x4f0 [ext4]
 ext4_fill_super+0x262d/0x3110 [ext4]
 get_tree_bdev_flags+0x132/0x1d0
 vfs_get_tree+0x26/0xd0
 vfs_cmd_create+0x59/0xe0
 __do_sys_fsconfig+0x4ed/0x6b0
 do_syscall_64+0x82/0x170
 ...

This occurs when processing a symlink inode from the orphan list. The
partial block zeroing code in the truncate path calls
ext4_dirty_journalled_data() -&gt; folio_mark_dirty(). The latter calls
mapping-&gt;a_ops-&gt;dirty_folio(), but symlink inodes are not assigned an
a_ops vector in ext4, hence the crash.

To avoid this problem, update the ext4_dirty_journalled_data() helper to
only mark the folio dirty on regular files (for which a_ops is
assigned). This also matches the journaling logic in the ext4_symlink()
creation path, where ext4_handle_dirty_metadata() is called directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38220/">CVE-2025-38220 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38220">CVE-2025-38220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245966">SUSE bug 1245966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38222</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38222" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38222" ref_url="https://www.suse.com/security/cve/CVE-2025-38222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: inline: fix len overflow in ext4_prepare_inline_data

When running the following code on an ext4 filesystem with inline_data
feature enabled, it will lead to the bug below.

        fd = open("file1", O_RDWR | O_CREAT | O_TRUNC, 0666);
        ftruncate(fd, 30);
        pwrite(fd, "a", 1, (1UL &lt;&lt; 40) + 5UL);

That happens because write_begin will succeed as when
ext4_generic_write_inline_data calls ext4_prepare_inline_data, pos + len
will be truncated, leading to ext4_prepare_inline_data parameter to be 6
instead of 0x10000000006.

Then, later when write_end is called, we hit:

        BUG_ON(pos + len &gt; EXT4_I(inode)-&gt;i_inline_size);

at ext4_write_inline_data.

Fix it by using a loff_t type for the len parameter in
ext4_prepare_inline_data instead of an unsigned int.

[   44.545164] ------------[ cut here ]------------
[   44.545530] kernel BUG at fs/ext4/inline.c:240!
[   44.545834] Oops: invalid opcode: 0000 [#1] SMP NOPTI
[   44.546172] CPU: 3 UID: 0 PID: 343 Comm: test Not tainted 6.15.0-rc2-00003-g9080916f4863 #45 PREEMPT(full)  112853fcebfdb93254270a7959841d2c6aa2c8bb
[   44.546523] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.546523] RIP: 0010:ext4_write_inline_data+0xfe/0x100
[   44.546523] Code: 3c 0e 48 83 c7 48 48 89 de 5b 41 5c 41 5d 41 5e 41 5f 5d e9 e4 fa 43 01 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc 0f 0b &lt;0f&gt; 0b 0f 1f 44 00 00 55 41 57 41 56 41 55 41 54 53 48 83 ec 20 49
[   44.546523] RSP: 0018:ffffb342008b79a8 EFLAGS: 00010216
[   44.546523] RAX: 0000000000000001 RBX: ffff9329c579c000 RCX: 0000010000000006
[   44.546523] RDX: 000000000000003c RSI: ffffb342008b79f0 RDI: ffff9329c158e738
[   44.546523] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000
[   44.546523] R10: 00007ffffffff000 R11: ffffffff9bd0d910 R12: 0000006210000000
[   44.546523] R13: fffffc7e4015e700 R14: 0000010000000005 R15: ffff9329c158e738
[   44.546523] FS:  00007f4299934740(0000) GS:ffff932a60179000(0000) knlGS:0000000000000000
[   44.546523] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   44.546523] CR2: 00007f4299a1ec90 CR3: 0000000002886002 CR4: 0000000000770eb0
[   44.546523] PKRU: 55555554
[   44.546523] Call Trace:
[   44.546523]  &lt;TASK&gt;
[   44.546523]  ext4_write_inline_data_end+0x126/0x2d0
[   44.546523]  generic_perform_write+0x17e/0x270
[   44.546523]  ext4_buffered_write_iter+0xc8/0x170
[   44.546523]  vfs_write+0x2be/0x3e0
[   44.546523]  __x64_sys_pwrite64+0x6d/0xc0
[   44.546523]  do_syscall_64+0x6a/0xf0
[   44.546523]  ? __wake_up+0x89/0xb0
[   44.546523]  ? xas_find+0x72/0x1c0
[   44.546523]  ? next_uptodate_folio+0x317/0x330
[   44.546523]  ? set_pte_range+0x1a6/0x270
[   44.546523]  ? filemap_map_pages+0x6ee/0x840
[   44.546523]  ? ext4_setattr+0x2fa/0x750
[   44.546523]  ? do_pte_missing+0x128/0xf70
[   44.546523]  ? security_inode_post_setattr+0x3e/0xd0
[   44.546523]  ? ___pte_offset_map+0x19/0x100
[   44.546523]  ? handle_mm_fault+0x721/0xa10
[   44.546523]  ? do_user_addr_fault+0x197/0x730
[   44.546523]  ? do_syscall_64+0x76/0xf0
[   44.546523]  ? arch_exit_to_user_mode_prepare+0x1e/0x60
[   44.546523]  ? irqentry_exit_to_user_mode+0x79/0x90
[   44.546523]  entry_SYSCALL_64_after_hwframe+0x55/0x5d
[   44.546523] RIP: 0033:0x7f42999c6687
[   44.546523] Code: 48 89 fa 4c 89 df e8 58 b3 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 &lt;5b&gt; c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff
[   44.546523] RSP: 002b:00007ffeae4a7930 EFLAGS: 00000202 ORIG_RAX: 0000000000000012
[   44.546523] RAX: ffffffffffffffda RBX: 00007f4299934740 RCX: 00007f42999c6687
[   44.546523] RDX: 0000000000000001 RSI: 000055ea6149200f RDI: 0000000000000003
[   44.546523] RBP: 00007ffeae4a79a0 R08: 0000000000000000 R09: 0000000000000000
[   44.546523] R10: 0000010000000005 R11: 0000000000000202 R12: 0000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38222/">CVE-2025-38222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38222">CVE-2025-38222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245976">SUSE bug 1245976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38224</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38224" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38224" ref_url="https://www.suse.com/security/cve/CVE-2025-38224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: kvaser_pciefd: refine error prone echo_skb_max handling logic

echo_skb_max should define the supported upper limit of echo_skb[]
allocated inside the netdevice's priv. The corresponding size value
provided by this driver to alloc_candev() is KVASER_PCIEFD_CAN_TX_MAX_COUNT
which is 17.

But later echo_skb_max is rounded up to the nearest power of two (for the
max case, that would be 32) and the tx/ack indices calculated further
during tx/rx may exceed the upper array boundary. Kasan reported this for
the ack case inside kvaser_pciefd_handle_ack_packet(), though the xmit
function has actually caught the same thing earlier.

 BUG: KASAN: slab-out-of-bounds in kvaser_pciefd_handle_ack_packet+0x2d7/0x92a drivers/net/can/kvaser_pciefd.c:1528
 Read of size 8 at addr ffff888105e4f078 by task swapper/4/0

 CPU: 4 UID: 0 PID: 0 Comm: swapper/4 Not tainted 6.15.0 #12 PREEMPT(voluntary)
 Call Trace:
  &lt;IRQ&gt;
 dump_stack_lvl lib/dump_stack.c:122
 print_report mm/kasan/report.c:521
 kasan_report mm/kasan/report.c:634
 kvaser_pciefd_handle_ack_packet drivers/net/can/kvaser_pciefd.c:1528
 kvaser_pciefd_read_packet drivers/net/can/kvaser_pciefd.c:1605
 kvaser_pciefd_read_buffer drivers/net/can/kvaser_pciefd.c:1656
 kvaser_pciefd_receive_irq drivers/net/can/kvaser_pciefd.c:1684
 kvaser_pciefd_irq_handler drivers/net/can/kvaser_pciefd.c:1733
 __handle_irq_event_percpu kernel/irq/handle.c:158
 handle_irq_event kernel/irq/handle.c:210
 handle_edge_irq kernel/irq/chip.c:833
 __common_interrupt arch/x86/kernel/irq.c:296
 common_interrupt arch/x86/kernel/irq.c:286
  &lt;/IRQ&gt;

Tx max count definitely matters for kvaser_pciefd_tx_avail(), but for seq
numbers' generation that's not the case - we're free to calculate them as
would be more convenient, not taking tx max count into account. The only
downside is that the size of echo_skb[] should correspond to the max seq
number (not tx max count), so in some situations a bit more memory would
be consumed than could be.

Thus make the size of the underlying echo_skb[] sufficient for the rounded
max tx value.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38224/">CVE-2025-38224 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38224">CVE-2025-38224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246166">SUSE bug 1246166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38225</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38225" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38225" ref_url="https://www.suse.com/security/cve/CVE-2025-38225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: imx-jpeg: Cleanup after an allocation error

When allocation failures are not cleaned up by the driver, further
allocation errors will be false-positives, which will cause buffers to
remain uninitialized and cause NULL pointer dereferences.
Ensure proper cleanup of failed allocations to prevent these issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38225/">CVE-2025-38225 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38225">CVE-2025-38225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246041">SUSE bug 1246041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38226</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38226" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38226" ref_url="https://www.suse.com/security/cve/CVE-2025-38226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: vivid: Change the siize of the composing

syzkaller found a bug:

BUG: KASAN: vmalloc-out-of-bounds in tpg_fill_plane_pattern drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2608 [inline]
BUG: KASAN: vmalloc-out-of-bounds in tpg_fill_plane_buffer+0x1a9c/0x5af0 drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2705
Write of size 1440 at addr ffffc9000d0ffda0 by task vivid-000-vid-c/5304

CPU: 0 UID: 0 PID: 5304 Comm: vivid-000-vid-c Not tainted 6.14.0-rc2-syzkaller-00039-g09fbf3d50205 #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014

Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:489
 kasan_report+0x143/0x180 mm/kasan/report.c:602
 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189
 __asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106
 tpg_fill_plane_pattern drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2608 [inline]
 tpg_fill_plane_buffer+0x1a9c/0x5af0 drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2705
 vivid_fillbuff drivers/media/test-drivers/vivid/vivid-kthread-cap.c:470 [inline]
 vivid_thread_vid_cap_tick+0xf8e/0x60d0 drivers/media/test-drivers/vivid/vivid-kthread-cap.c:629
 vivid_thread_vid_cap+0x8aa/0xf30 drivers/media/test-drivers/vivid/vivid-kthread-cap.c:767
 kthread+0x7a9/0x920 kernel/kthread.c:464
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 &lt;/TASK&gt;

The composition size cannot be larger than the size of fmt_cap_rect.
So execute v4l2_rect_map_inside() even if has_compose_cap == 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38226/">CVE-2025-38226 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38226">CVE-2025-38226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246050">SUSE bug 1246050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246051">SUSE bug 1246051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38227</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38227" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38227" ref_url="https://www.suse.com/security/cve/CVE-2025-38227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: vidtv: Terminating the subsequent process of initialization failure

syzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]

After PSI initialization fails, the si member is accessed again, resulting
in this uaf.

After si initialization fails, the subsequent process needs to be exited.

[1]
BUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline]
BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524
Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059

CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0
Hardware name: Google Compute Engine, BIOS Google 02/12/2025
Call Trace:
&lt;TASK&gt;
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:408 [inline]
print_report+0xc3/0x670 mm/kasan/report.c:521
kasan_report+0xd9/0x110 mm/kasan/report.c:634
vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78
vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524
vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194
vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239
dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973
dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]
dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537
dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564
dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]
dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246
__fput+0x3ff/0xb70 fs/file_table.c:464
task_work_run+0x14e/0x250 kernel/task_work.c:227
exit_task_work include/linux/task_work.h:40 [inline]
do_exit+0xad8/0x2d70 kernel/exit.c:938
do_group_exit+0xd3/0x2a0 kernel/exit.c:1087
__do_sys_exit_group kernel/exit.c:1098 [inline]
__se_sys_exit_group kernel/exit.c:1096 [inline]
__x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096
x64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f871d58d169
Code: Unable to access opcode bytes at 0x7f871d58d13f.
RSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169
RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0
R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003
R13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840
 &lt;/TASK&gt;

Allocated by task 6059:
 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
 kasan_save_track+0x14/0x30 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394
 kmalloc_noprof include/linux/slab.h:901 [inline]
 kzalloc_noprof include/linux/slab.h:1037 [inline]
 vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970
 vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423
 vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519
 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194
 vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239
 dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973
 dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]
 dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537
 dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564
 dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]
 dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246
 __fput+0x3ff/0xb70 fs/file_tabl
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38227/">CVE-2025-38227 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38227">CVE-2025-38227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246031">SUSE bug 1246031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246032">SUSE bug 1246032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38228</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38228" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38228" ref_url="https://www.suse.com/security/cve/CVE-2025-38228" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: imagination: fix a potential memory leak in e5010_probe()

Add video_device_release() to release the memory allocated by
video_device_alloc() if something goes wrong.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38228/">CVE-2025-38228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38228">CVE-2025-38228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245814">SUSE bug 1245814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38229</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38229" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38229" ref_url="https://www.suse.com/security/cve/CVE-2025-38229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: cxusb: no longer judge rbuf when the write fails

syzbot reported a uninit-value in cxusb_i2c_xfer. [1]

Only when the write operation of usb_bulk_msg() in dvb_usb_generic_rw()
succeeds and rlen is greater than 0, the read operation of usb_bulk_msg()
will be executed to read rlen bytes of data from the dvb device into the
rbuf.

In this case, although rlen is 1, the write operation failed which resulted
in the dvb read operation not being executed, and ultimately variable i was
not initialized.

[1]
BUG: KMSAN: uninit-value in cxusb_gpio_tuner drivers/media/usb/dvb-usb/cxusb.c:124 [inline]
BUG: KMSAN: uninit-value in cxusb_i2c_xfer+0x153a/0x1a60 drivers/media/usb/dvb-usb/cxusb.c:196
 cxusb_gpio_tuner drivers/media/usb/dvb-usb/cxusb.c:124 [inline]
 cxusb_i2c_xfer+0x153a/0x1a60 drivers/media/usb/dvb-usb/cxusb.c:196
 __i2c_transfer+0xe25/0x3150 drivers/i2c/i2c-core-base.c:-1
 i2c_transfer+0x317/0x4a0 drivers/i2c/i2c-core-base.c:2315
 i2c_transfer_buffer_flags+0x125/0x1e0 drivers/i2c/i2c-core-base.c:2343
 i2c_master_send include/linux/i2c.h:109 [inline]
 i2cdev_write+0x210/0x280 drivers/i2c/i2c-dev.c:183
 do_loop_readv_writev fs/read_write.c:848 [inline]
 vfs_writev+0x963/0x14e0 fs/read_write.c:1057
 do_writev+0x247/0x5c0 fs/read_write.c:1101
 __do_sys_writev fs/read_write.c:1169 [inline]
 __se_sys_writev fs/read_write.c:1166 [inline]
 __x64_sys_writev+0x98/0xe0 fs/read_write.c:1166
 x64_sys_call+0x2229/0x3c80 arch/x86/include/generated/asm/syscalls_64.h:21
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0x1e0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38229/">CVE-2025-38229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38229">CVE-2025-38229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246049">SUSE bug 1246049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38231</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38231" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38231" ref_url="https://www.suse.com/security/cve/CVE-2025-38231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: Initialize ssc before laundromat_work to prevent NULL dereference

In nfs4_state_start_net(), laundromat_work may access nfsd_ssc through
nfs4_laundromat -&gt; nfsd4_ssc_expire_umount. If nfsd_ssc isn't initialized,
this can cause NULL pointer dereference.

Normally the delayed start of laundromat_work allows sufficient time for
nfsd_ssc initialization to complete. However, when the kernel waits too
long for userspace responses (e.g. in nfs4_state_start_net -&gt;
nfsd4_end_grace -&gt; nfsd4_record_grace_done -&gt; nfsd4_cld_grace_done -&gt;
cld_pipe_upcall -&gt; __cld_pipe_upcall -&gt; wait_for_completion path), the
delayed work may start before nfsd_ssc initialization finishes.

Fix this by moving nfsd_ssc initialization before starting laundromat_work.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38231/">CVE-2025-38231 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38231">CVE-2025-38231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246055">SUSE bug 1246055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38232</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38232" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38232" ref_url="https://www.suse.com/security/cve/CVE-2025-38232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: fix race between nfsd registration and exports_proc

As of now nfsd calls create_proc_exports_entry() at start of init_nfsd
and cleanup by remove_proc_entry() at last of exit_nfsd.

Which causes kernel OOPs if there is race between below 2 operations:
(i) exportfs -r
(ii) mount -t nfsd none /proc/fs/nfsd

for 5.4 kernel ARM64:

CPU 1:
el1_irq+0xbc/0x180
arch_counter_get_cntvct+0x14/0x18
running_clock+0xc/0x18
preempt_count_add+0x88/0x110
prep_new_page+0xb0/0x220
get_page_from_freelist+0x2d8/0x1778
__alloc_pages_nodemask+0x15c/0xef0
__vmalloc_node_range+0x28c/0x478
__vmalloc_node_flags_caller+0x8c/0xb0
kvmalloc_node+0x88/0xe0
nfsd_init_net+0x6c/0x108 [nfsd]
ops_init+0x44/0x170
register_pernet_operations+0x114/0x270
register_pernet_subsys+0x34/0x50
init_nfsd+0xa8/0x718 [nfsd]
do_one_initcall+0x54/0x2e0

CPU 2 :
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010

PC is at : exports_net_open+0x50/0x68 [nfsd]

Call trace:
exports_net_open+0x50/0x68 [nfsd]
exports_proc_open+0x2c/0x38 [nfsd]
proc_reg_open+0xb8/0x198
do_dentry_open+0x1c4/0x418
vfs_open+0x38/0x48
path_openat+0x28c/0xf18
do_filp_open+0x70/0xe8
do_sys_open+0x154/0x248

Sometimes it crashes at exports_net_open() and sometimes cache_seq_next_rcu().

and same is happening on latest 6.14 kernel as well:

[    0.000000] Linux version 6.14.0-rc5-next-20250304-dirty
...
[  285.455918] Unable to handle kernel paging request at virtual address 00001f4800001f48
...
[  285.464902] pc : cache_seq_next_rcu+0x78/0xa4
...
[  285.469695] Call trace:
[  285.470083]  cache_seq_next_rcu+0x78/0xa4 (P)
[  285.470488]  seq_read+0xe0/0x11c
[  285.470675]  proc_reg_read+0x9c/0xf0
[  285.470874]  vfs_read+0xc4/0x2fc
[  285.471057]  ksys_read+0x6c/0xf4
[  285.471231]  __arm64_sys_read+0x1c/0x28
[  285.471428]  invoke_syscall+0x44/0x100
[  285.471633]  el0_svc_common.constprop.0+0x40/0xe0
[  285.471870]  do_el0_svc_compat+0x1c/0x34
[  285.472073]  el0_svc_compat+0x2c/0x80
[  285.472265]  el0t_32_sync_handler+0x90/0x140
[  285.472473]  el0t_32_sync+0x19c/0x1a0
[  285.472887] Code: f9400885 93407c23 937d7c27 11000421 (f86378a3)
[  285.473422] ---[ end trace 0000000000000000 ]---

It reproduced simply with below script:
while [ 1 ]
do
/exportfs -r
done &amp;

while [ 1 ]
do
insmod /nfsd.ko
mount -t nfsd none /proc/fs/nfsd
umount /proc/fs/nfsd
rmmod nfsd
done &amp;

So exporting interfaces to user space shall be done at last and
cleanup at first place.

With change there is no Kernel OOPs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38232/">CVE-2025-38232 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38232">CVE-2025-38232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246054">SUSE bug 1246054</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38233</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38233" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38233" ref_url="https://www.suse.com/security/cve/CVE-2025-38233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc64/ftrace: fix clobbered r15 during livepatching

While r15 is clobbered always with PPC_FTRACE_OUT_OF_LINE, it is
not restored in livepatch sequence leading to not so obvious fails
like below:

  BUG: Unable to handle kernel data access on write at 0xc0000000000f9078
  Faulting instruction address: 0xc0000000018ff958
  Oops: Kernel access of bad area, sig: 11 [#1]
  ...
  NIP:  c0000000018ff958 LR: c0000000018ff930 CTR: c0000000009c0790
  REGS: c00000005f2e7790 TRAP: 0300   Tainted: G              K      (6.14.0+)
  MSR:  8000000000009033 &lt;SF,EE,ME,IR,DR,RI,LE&gt;  CR: 2822880b  XER: 20040000
  CFAR: c0000000008addc0 DAR: c0000000000f9078 DSISR: 0a000000 IRQMASK: 1
  GPR00: c0000000018f2584 c00000005f2e7a30 c00000000280a900 c000000017ffa488
  GPR04: 0000000000000008 0000000000000000 c0000000018f24fc 000000000000000d
  GPR08: fffffffffffe0000 000000000000000d 0000000000000000 0000000000008000
  GPR12: c0000000009c0790 c000000017ffa480 c00000005f2e7c78 c0000000000f9070
  GPR16: c00000005f2e7c90 0000000000000000 0000000000000000 0000000000000000
  GPR20: 0000000000000000 c00000005f3efa80 c00000005f2e7c60 c00000005f2e7c88
  GPR24: c00000005f2e7c60 0000000000000001 c0000000000f9078 0000000000000000
  GPR28: 00007fff97960000 c000000017ffa480 0000000000000000 c0000000000f9078
  ...
  Call Trace:
    check_heap_object+0x34/0x390 (unreliable)
  __mutex_unlock_slowpath.isra.0+0xe4/0x230
  seq_read_iter+0x430/0xa90
  proc_reg_read_iter+0xa4/0x200
  vfs_read+0x41c/0x510
  ksys_read+0xa4/0x190
  system_call_exception+0x1d0/0x440
  system_call_vectored_common+0x15c/0x2ec

Fix it by restoring r15 always.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38233/">CVE-2025-38233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38233">CVE-2025-38233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246053">SUSE bug 1246053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38234</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38234" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38234" ref_url="https://www.suse.com/security/cve/CVE-2025-38234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/rt: Fix race in push_rt_task

Overview
========
When a CPU chooses to call push_rt_task and picks a task to push to
another CPU's runqueue then it will call find_lock_lowest_rq method
which would take a double lock on both CPUs' runqueues. If one of the
locks aren't readily available, it may lead to dropping the current
runqueue lock and reacquiring both the locks at once. During this window
it is possible that the task is already migrated and is running on some
other CPU. These cases are already handled. However, if the task is
migrated and has already been executed and another CPU is now trying to
wake it up (ttwu) such that it is queued again on the runqeue
(on_rq is 1) and also if the task was run by the same CPU, then the
current checks will pass even though the task was migrated out and is no
longer in the pushable tasks list.

Crashes
=======
This bug resulted in quite a few flavors of crashes triggering kernel
panics with various crash signatures such as assert failures, page
faults, null pointer dereferences, and queue corruption errors all
coming from scheduler itself.

Some of the crashes:
-&gt; kernel BUG at kernel/sched/rt.c:1616! BUG_ON(idx &gt;= MAX_RT_PRIO)
   Call Trace:
   ? __die_body+0x1a/0x60
   ? die+0x2a/0x50
   ? do_trap+0x85/0x100
   ? pick_next_task_rt+0x6e/0x1d0
   ? do_error_trap+0x64/0xa0
   ? pick_next_task_rt+0x6e/0x1d0
   ? exc_invalid_op+0x4c/0x60
   ? pick_next_task_rt+0x6e/0x1d0
   ? asm_exc_invalid_op+0x12/0x20
   ? pick_next_task_rt+0x6e/0x1d0
   __schedule+0x5cb/0x790
   ? update_ts_time_stats+0x55/0x70
   schedule_idle+0x1e/0x40
   do_idle+0x15e/0x200
   cpu_startup_entry+0x19/0x20
   start_secondary+0x117/0x160
   secondary_startup_64_no_verify+0xb0/0xbb

-&gt; BUG: kernel NULL pointer dereference, address: 00000000000000c0
   Call Trace:
   ? __die_body+0x1a/0x60
   ? no_context+0x183/0x350
   ? __warn+0x8a/0xe0
   ? exc_page_fault+0x3d6/0x520
   ? asm_exc_page_fault+0x1e/0x30
   ? pick_next_task_rt+0xb5/0x1d0
   ? pick_next_task_rt+0x8c/0x1d0
   __schedule+0x583/0x7e0
   ? update_ts_time_stats+0x55/0x70
   schedule_idle+0x1e/0x40
   do_idle+0x15e/0x200
   cpu_startup_entry+0x19/0x20
   start_secondary+0x117/0x160
   secondary_startup_64_no_verify+0xb0/0xbb

-&gt; BUG: unable to handle page fault for address: ffff9464daea5900
   kernel BUG at kernel/sched/rt.c:1861! BUG_ON(rq-&gt;cpu != task_cpu(p))

-&gt; kernel BUG at kernel/sched/rt.c:1055! BUG_ON(!rq-&gt;nr_running)
   Call Trace:
   ? __die_body+0x1a/0x60
   ? die+0x2a/0x50
   ? do_trap+0x85/0x100
   ? dequeue_top_rt_rq+0xa2/0xb0
   ? do_error_trap+0x64/0xa0
   ? dequeue_top_rt_rq+0xa2/0xb0
   ? exc_invalid_op+0x4c/0x60
   ? dequeue_top_rt_rq+0xa2/0xb0
   ? asm_exc_invalid_op+0x12/0x20
   ? dequeue_top_rt_rq+0xa2/0xb0
   dequeue_rt_entity+0x1f/0x70
   dequeue_task_rt+0x2d/0x70
   __schedule+0x1a8/0x7e0
   ? blk_finish_plug+0x25/0x40
   schedule+0x3c/0xb0
   futex_wait_queue_me+0xb6/0x120
   futex_wait+0xd9/0x240
   do_futex+0x344/0xa90
   ? get_mm_exe_file+0x30/0x60
   ? audit_exe_compare+0x58/0x70
   ? audit_filter_rules.constprop.26+0x65e/0x1220
   __x64_sys_futex+0x148/0x1f0
   do_syscall_64+0x30/0x80
   entry_SYSCALL_64_after_hwframe+0x62/0xc7

-&gt; BUG: unable to handle page fault for address: ffff8cf3608bc2c0
   Call Trace:
   ? __die_body+0x1a/0x60
   ? no_context+0x183/0x350
   ? spurious_kernel_fault+0x171/0x1c0
   ? exc_page_fault+0x3b6/0x520
   ? plist_check_list+0x15/0x40
   ? plist_check_list+0x2e/0x40
   ? asm_exc_page_fault+0x1e/0x30
   ? _cond_resched+0x15/0x30
   ? futex_wait_queue_me+0xc8/0x120
   ? futex_wait+0xd9/0x240
   ? try_to_wake_up+0x1b8/0x490
   ? futex_wake+0x78/0x160
   ? do_futex+0xcd/0xa90
   ? plist_check_list+0x15/0x40
   ? plist_check_list+0x2e/0x40
   ? plist_del+0x6a/0xd0
   ? plist_check_list+0x15/0x40
   ? plist_check_list+0x2e/0x40
   ? dequeue_pushable_task+0x20/0x70
   ? __schedule+0x382/0x7e0
   ? asm_sysvec_reschedule_i
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38234/">CVE-2025-38234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38234">CVE-2025-38234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246057">SUSE bug 1246057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38242</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38242" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38242" ref_url="https://www.suse.com/security/cve/CVE-2025-38242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: userfaultfd: fix race of userfaultfd_move and swap cache

This commit fixes two kinds of races, they may have different results:

Barry reported a BUG_ON in commit c50f8e6053b0, we may see the same
BUG_ON if the filemap lookup returned NULL and folio is added to swap
cache after that.

If another kind of race is triggered (folio changed after lookup) we
may see RSS counter is corrupted:

[  406.893936] BUG: Bad rss-counter state mm:ffff0000c5a9ddc0
type:MM_ANONPAGES val:-1
[  406.894071] BUG: Bad rss-counter state mm:ffff0000c5a9ddc0
type:MM_SHMEMPAGES val:1

Because the folio is being accounted to the wrong VMA.

I'm not sure if there will be any data corruption though, seems no. 
The issues above are critical already.


On seeing a swap entry PTE, userfaultfd_move does a lockless swap cache
lookup, and tries to move the found folio to the faulting vma.  Currently,
it relies on checking the PTE value to ensure that the moved folio still
belongs to the src swap entry and that no new folio has been added to the
swap cache, which turns out to be unreliable.

While working and reviewing the swap table series with Barry, following
existing races are observed and reproduced [1]:

In the example below, move_pages_pte is moving src_pte to dst_pte, where
src_pte is a swap entry PTE holding swap entry S1, and S1 is not in the
swap cache:

CPU1                               CPU2
userfaultfd_move
  move_pages_pte()
    entry = pte_to_swp_entry(orig_src_pte);
    // Here it got entry = S1
    ... &lt; interrupted&gt; ...
                                   &lt;swapin src_pte, alloc and use folio A&gt;
                                   // folio A is a new allocated folio
                                   // and get installed into src_pte
                                   &lt;frees swap entry S1&gt;
                                   // src_pte now points to folio A, S1
                                   // has swap count == 0, it can be freed
                                   // by folio_swap_swap or swap
                                   // allocator's reclaim.
                                   &lt;try to swap out another folio B&gt;
                                   // folio B is a folio in another VMA.
                                   &lt;put folio B to swap cache using S1 &gt;
                                   // S1 is freed, folio B can use it
                                   // for swap out with no problem.
                                   ...
    folio = filemap_get_folio(S1)
    // Got folio B here !!!
    ... &lt; interrupted again&gt; ...
                                   &lt;swapin folio B and free S1&gt;
                                   // Now S1 is free to be used again.
                                   &lt;swapout src_pte &amp; folio A using S1&gt;
                                   // Now src_pte is a swap entry PTE
                                   // holding S1 again.
    folio_trylock(folio)
    move_swap_pte
      double_pt_lock
      is_pte_pages_stable
      // Check passed because src_pte == S1
      folio_move_anon_rmap(...)
      // Moved invalid folio B here !!!

The race window is very short and requires multiple collisions of multiple
rare events, so it's very unlikely to happen, but with a deliberately
constructed reproducer and increased time window, it can be reproduced
easily.

This can be fixed by checking if the folio returned by filemap is the
valid swap cache folio after acquiring the folio lock.

Another similar race is possible: filemap_get_folio may return NULL, but
folio (A) could be swapped in and then swapped out again using the same
swap entry after the lookup.  In such a case, folio (A) may remain in the
swap cache, so it must be moved too:

CPU1                               CPU2
userfaultfd_move
  move_pages_pte()
    entry = pte_to_swp_entry(orig_src_pte);
    // Here it got entry = S1, and S1 is not in swap cache
    folio = filemap_get
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38242/">CVE-2025-38242 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38242">CVE-2025-38242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246176">SUSE bug 1246176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38243</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38243" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38243" ref_url="https://www.suse.com/security/cve/CVE-2025-38243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix invalid inode pointer dereferences during log replay

In a few places where we call read_one_inode(), if we get a NULL pointer
we end up jumping into an error path, or fallthrough in case of
__add_inode_ref(), where we then do something like this:

   iput(&amp;inode-&gt;vfs_inode);

which results in an invalid inode pointer that triggers an invalid memory
access, resulting in a crash.

Fix this by making sure we don't do such dereferences.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38243/">CVE-2025-38243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38243">CVE-2025-38243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246184">SUSE bug 1246184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38244</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38244" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38244" ref_url="https://www.suse.com/security/cve/CVE-2025-38244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential deadlock when reconnecting channels

Fix cifs_signal_cifsd_for_reconnect() to take the correct lock order
and prevent the following deadlock from happening

======================================================
WARNING: possible circular locking dependency detected
6.16.0-rc3-build2+ #1301 Tainted: G S      W
------------------------------------------------------
cifsd/6055 is trying to acquire lock:
ffff88810ad56038 (&amp;tcp_ses-&gt;srv_lock){+.+.}-{3:3}, at: cifs_signal_cifsd_for_reconnect+0x134/0x200

but task is already holding lock:
ffff888119c64330 (&amp;ret_buf-&gt;chan_lock){+.+.}-{3:3}, at: cifs_signal_cifsd_for_reconnect+0xcf/0x200

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:

-&gt; #2 (&amp;ret_buf-&gt;chan_lock){+.+.}-{3:3}:
       validate_chain+0x1cf/0x270
       __lock_acquire+0x60e/0x780
       lock_acquire.part.0+0xb4/0x1f0
       _raw_spin_lock+0x2f/0x40
       cifs_setup_session+0x81/0x4b0
       cifs_get_smb_ses+0x771/0x900
       cifs_mount_get_session+0x7e/0x170
       cifs_mount+0x92/0x2d0
       cifs_smb3_do_mount+0x161/0x460
       smb3_get_tree+0x55/0x90
       vfs_get_tree+0x46/0x180
       do_new_mount+0x1b0/0x2e0
       path_mount+0x6ee/0x740
       do_mount+0x98/0xe0
       __do_sys_mount+0x148/0x180
       do_syscall_64+0xa4/0x260
       entry_SYSCALL_64_after_hwframe+0x76/0x7e

-&gt; #1 (&amp;ret_buf-&gt;ses_lock){+.+.}-{3:3}:
       validate_chain+0x1cf/0x270
       __lock_acquire+0x60e/0x780
       lock_acquire.part.0+0xb4/0x1f0
       _raw_spin_lock+0x2f/0x40
       cifs_match_super+0x101/0x320
       sget+0xab/0x270
       cifs_smb3_do_mount+0x1e0/0x460
       smb3_get_tree+0x55/0x90
       vfs_get_tree+0x46/0x180
       do_new_mount+0x1b0/0x2e0
       path_mount+0x6ee/0x740
       do_mount+0x98/0xe0
       __do_sys_mount+0x148/0x180
       do_syscall_64+0xa4/0x260
       entry_SYSCALL_64_after_hwframe+0x76/0x7e

-&gt; #0 (&amp;tcp_ses-&gt;srv_lock){+.+.}-{3:3}:
       check_noncircular+0x95/0xc0
       check_prev_add+0x115/0x2f0
       validate_chain+0x1cf/0x270
       __lock_acquire+0x60e/0x780
       lock_acquire.part.0+0xb4/0x1f0
       _raw_spin_lock+0x2f/0x40
       cifs_signal_cifsd_for_reconnect+0x134/0x200
       __cifs_reconnect+0x8f/0x500
       cifs_handle_standard+0x112/0x280
       cifs_demultiplex_thread+0x64d/0xbc0
       kthread+0x2f7/0x310
       ret_from_fork+0x2a/0x230
       ret_from_fork_asm+0x1a/0x30

other info that might help us debug this:

Chain exists of:
  &amp;tcp_ses-&gt;srv_lock --&gt; &amp;ret_buf-&gt;ses_lock --&gt; &amp;ret_buf-&gt;chan_lock

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(&amp;ret_buf-&gt;chan_lock);
                               lock(&amp;ret_buf-&gt;ses_lock);
                               lock(&amp;ret_buf-&gt;chan_lock);
  lock(&amp;tcp_ses-&gt;srv_lock);

 *** DEADLOCK ***

3 locks held by cifsd/6055:
 #0: ffffffff857de398 (&amp;cifs_tcp_ses_lock){+.+.}-{3:3}, at: cifs_signal_cifsd_for_reconnect+0x7b/0x200
 #1: ffff888119c64060 (&amp;ret_buf-&gt;ses_lock){+.+.}-{3:3}, at: cifs_signal_cifsd_for_reconnect+0x9c/0x200
 #2: ffff888119c64330 (&amp;ret_buf-&gt;chan_lock){+.+.}-{3:3}, at: cifs_signal_cifsd_for_reconnect+0xcf/0x200
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38244/">CVE-2025-38244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38244">CVE-2025-38244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246183">SUSE bug 1246183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38245</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38245" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38245" ref_url="https://www.suse.com/security/cve/CVE-2025-38245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister().

syzbot reported a warning below during atm_dev_register(). [0]

Before creating a new device and procfs/sysfs for it, atm_dev_register()
looks up a duplicated device by __atm_dev_lookup().  These operations are
done under atm_dev_mutex.

However, when removing a device in atm_dev_deregister(), it releases the
mutex just after removing the device from the list that __atm_dev_lookup()
iterates over.

So, there will be a small race window where the device does not exist on
the device list but procfs/sysfs are still not removed, triggering the
splat.

Let's hold the mutex until procfs/sysfs are removed in
atm_dev_deregister().

[0]:
proc_dir_entry 'atm/atmtcp:0' already registered
WARNING: CPU: 0 PID: 5919 at fs/proc/generic.c:377 proc_register+0x455/0x5f0 fs/proc/generic.c:377
Modules linked in:
CPU: 0 UID: 0 PID: 5919 Comm: syz-executor284 Not tainted 6.16.0-rc2-syzkaller-00047-g52da431bf03b #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
RIP: 0010:proc_register+0x455/0x5f0 fs/proc/generic.c:377
Code: 48 89 f9 48 c1 e9 03 80 3c 01 00 0f 85 a2 01 00 00 48 8b 44 24 10 48 c7 c7 20 c0 c2 8b 48 8b b0 d8 00 00 00 e8 0c 02 1c ff 90 &lt;0f&gt; 0b 90 90 48 c7 c7 80 f2 82 8e e8 0b de 23 09 48 8b 4c 24 28 48
RSP: 0018:ffffc9000466fa30 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817ae248
RDX: ffff888026280000 RSI: ffffffff817ae255 RDI: 0000000000000001
RBP: ffff8880232bed48 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: ffff888076ed2140
R13: dffffc0000000000 R14: ffff888078a61340 R15: ffffed100edda444
FS:  00007f38b3b0c6c0(0000) GS:ffff888124753000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f38b3bdf953 CR3: 0000000076d58000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 proc_create_data+0xbe/0x110 fs/proc/generic.c:585
 atm_proc_dev_register+0x112/0x1e0 net/atm/proc.c:361
 atm_dev_register+0x46d/0x890 net/atm/resources.c:113
 atmtcp_create+0x77/0x210 drivers/atm/atmtcp.c:369
 atmtcp_attach drivers/atm/atmtcp.c:403 [inline]
 atmtcp_ioctl+0x2f9/0xd60 drivers/atm/atmtcp.c:464
 do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159
 sock_do_ioctl+0x115/0x280 net/socket.c:1190
 sock_ioctl+0x227/0x6b0 net/socket.c:1311
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl fs/ioctl.c:893 [inline]
 __x64_sys_ioctl+0x18b/0x210 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f38b3b74459
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f38b3b0c198 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f38b3bfe318 RCX: 00007f38b3b74459
RDX: 0000000000000000 RSI: 0000000000006180 RDI: 0000000000000005
RBP: 00007f38b3bfe310 R08: 65732f636f72702f R09: 65732f636f72702f
R10: 65732f636f72702f R11: 0000000000000246 R12: 00007f38b3bcb0ac
R13: 00007f38b3b0c1a0 R14: 0000200000000200 R15: 00007f38b3bcb03b
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38245/">CVE-2025-38245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38245">CVE-2025-38245 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246193">SUSE bug 1246193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38246</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38246" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38246" ref_url="https://www.suse.com/security/cve/CVE-2025-38246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt: properly flush XDP redirect lists

We encountered following crash when testing a XDP_REDIRECT feature
in production:

[56251.579676] list_add corruption. next-&gt;prev should be prev (ffff93120dd40f30), but was ffffb301ef3a6740. (next=ffff93120dd
40f30).
[56251.601413] ------------[ cut here ]------------
[56251.611357] kernel BUG at lib/list_debug.c:29!
[56251.621082] Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[56251.632073] CPU: 111 UID: 0 PID: 0 Comm: swapper/111 Kdump: loaded Tainted: P           O       6.12.33-cloudflare-2025.6.
3 #1
[56251.653155] Tainted: [P]=PROPRIETARY_MODULE, [O]=OOT_MODULE
[56251.663877] Hardware name: MiTAC GC68B-B8032-G11P6-GPU/S8032GM-HE-CFR, BIOS V7.020.B10-sig 01/22/2025
[56251.682626] RIP: 0010:__list_add_valid_or_report+0x4b/0xa0
[56251.693203] Code: 0e 48 c7 c7 68 e7 d9 97 e8 42 16 fe ff 0f 0b 48 8b 52 08 48 39 c2 74 14 48 89 f1 48 c7 c7 90 e7 d9 97 48
 89 c6 e8 25 16 fe ff &lt;0f&gt; 0b 4c 8b 02 49 39 f0 74 14 48 89 d1 48 c7 c7 e8 e7 d9 97 4c 89
[56251.725811] RSP: 0018:ffff93120dd40b80 EFLAGS: 00010246
[56251.736094] RAX: 0000000000000075 RBX: ffffb301e6bba9d8 RCX: 0000000000000000
[56251.748260] RDX: 0000000000000000 RSI: ffff9149afda0b80 RDI: ffff9149afda0b80
[56251.760349] RBP: ffff9131e49c8000 R08: 0000000000000000 R09: ffff93120dd40a18
[56251.772382] R10: ffff9159cf2ce1a8 R11: 0000000000000003 R12: ffff911a80850000
[56251.784364] R13: ffff93120fbc7000 R14: 0000000000000010 R15: ffff9139e7510e40
[56251.796278] FS:  0000000000000000(0000) GS:ffff9149afd80000(0000) knlGS:0000000000000000
[56251.809133] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[56251.819561] CR2: 00007f5e85e6f300 CR3: 00000038b85e2006 CR4: 0000000000770ef0
[56251.831365] PKRU: 55555554
[56251.838653] Call Trace:
[56251.845560]  &lt;IRQ&gt;
[56251.851943]  cpu_map_enqueue.cold+0x5/0xa
[56251.860243]  xdp_do_redirect+0x2d9/0x480
[56251.868388]  bnxt_rx_xdp+0x1d8/0x4c0 [bnxt_en]
[56251.877028]  bnxt_rx_pkt+0x5f7/0x19b0 [bnxt_en]
[56251.885665]  ? cpu_max_write+0x1e/0x100
[56251.893510]  ? srso_alias_return_thunk+0x5/0xfbef5
[56251.902276]  __bnxt_poll_work+0x190/0x340 [bnxt_en]
[56251.911058]  bnxt_poll+0xab/0x1b0 [bnxt_en]
[56251.919041]  ? srso_alias_return_thunk+0x5/0xfbef5
[56251.927568]  ? srso_alias_return_thunk+0x5/0xfbef5
[56251.935958]  ? srso_alias_return_thunk+0x5/0xfbef5
[56251.944250]  __napi_poll+0x2b/0x160
[56251.951155]  bpf_trampoline_6442548651+0x79/0x123
[56251.959262]  __napi_poll+0x5/0x160
[56251.966037]  net_rx_action+0x3d2/0x880
[56251.973133]  ? srso_alias_return_thunk+0x5/0xfbef5
[56251.981265]  ? srso_alias_return_thunk+0x5/0xfbef5
[56251.989262]  ? __hrtimer_run_queues+0x162/0x2a0
[56251.996967]  ? srso_alias_return_thunk+0x5/0xfbef5
[56252.004875]  ? srso_alias_return_thunk+0x5/0xfbef5
[56252.012673]  ? bnxt_msix+0x62/0x70 [bnxt_en]
[56252.019903]  handle_softirqs+0xcf/0x270
[56252.026650]  irq_exit_rcu+0x67/0x90
[56252.032933]  common_interrupt+0x85/0xa0
[56252.039498]  &lt;/IRQ&gt;
[56252.044246]  &lt;TASK&gt;
[56252.048935]  asm_common_interrupt+0x26/0x40
[56252.055727] RIP: 0010:cpuidle_enter_state+0xb8/0x420
[56252.063305] Code: dc 01 00 00 e8 f9 79 3b ff e8 64 f7 ff ff 49 89 c5 0f 1f 44 00 00 31 ff e8 a5 32 3a ff 45 84 ff 0f 85 ae
 01 00 00 fb 45 85 f6 &lt;0f&gt; 88 88 01 00 00 48 8b 04 24 49 63 ce 4c 89 ea 48 6b f1 68 48 29
[56252.088911] RSP: 0018:ffff93120c97fe98 EFLAGS: 00000202
[56252.096912] RAX: ffff9149afd80000 RBX: ffff9141d3a72800 RCX: 0000000000000000
[56252.106844] RDX: 00003329176c6b98 RSI: ffffffe36db3fdc7 RDI: 0000000000000000
[56252.116733] RBP: 0000000000000002 R08: 0000000000000002 R09: 000000000000004e
[56252.126652] R10: ffff9149afdb30c4 R11: 071c71c71c71c71c R12: ffffffff985ff860
[56252.136637] R13: 00003329176c6b98 R14: 0000000000000002 R15: 0000000000000000
[56252.146667]  ? cpuidle_enter_state+0xab/0x420
[56252.153909]  cpuidle_enter+0x2d/0x40
[56252.160360]  do_idle+0x176/0x1c0
[56252.166456
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38246/">CVE-2025-38246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38246">CVE-2025-38246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246195">SUSE bug 1246195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38249</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38249" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38249" ref_url="https://www.suse.com/security/cve/CVE-2025-38249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3()

In snd_usb_get_audioformat_uac3(), the length value returned from
snd_usb_ctl_msg() is used directly for memory allocation without
validation. This length is controlled by the USB device.

The allocated buffer is cast to a uac3_cluster_header_descriptor
and its fields are accessed without verifying that the buffer
is large enough. If the device returns a smaller than expected
length, this leads to an out-of-bounds read.

Add a length check to ensure the buffer is large enough for
uac3_cluster_header_descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38249/">CVE-2025-38249 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38249">CVE-2025-38249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246171">SUSE bug 1246171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38251</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38251" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38251" ref_url="https://www.suse.com/security/cve/CVE-2025-38251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: clip: prevent NULL deref in clip_push()

Blamed commit missed that vcc_destroy_socket() calls
clip_push() with a NULL skb.

If clip_devs is NULL, clip_push() then crashes when reading
skb-&gt;truesize.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38251/">CVE-2025-38251 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38251">CVE-2025-38251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246181">SUSE bug 1246181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38253</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38253" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38253" ref_url="https://www.suse.com/security/cve/CVE-2025-38253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: wacom: fix crash in wacom_aes_battery_handler()

Commit fd2a9b29dc9c ("HID: wacom: Remove AES power_supply after extended
inactivity") introduced wacom_aes_battery_handler() which is scheduled
as a delayed work (aes_battery_work).

In wacom_remove(), aes_battery_work is not canceled. Consequently, if
the device is removed while aes_battery_work is still pending, then hard
crashes or "Oops: general protection fault..." are experienced when
wacom_aes_battery_handler() is finally called. E.g., this happens with
built-in USB devices after resume from hibernate when aes_battery_work
was still pending at the time of hibernation.

So, take care to cancel aes_battery_work in wacom_remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38253/">CVE-2025-38253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38253">CVE-2025-38253 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246192">SUSE bug 1246192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38255</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38255" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38255" ref_url="https://www.suse.com/security/cve/CVE-2025-38255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib/group_cpus: fix NULL pointer dereference from group_cpus_evenly()

While testing null_blk with configfs, echo 0 &gt; poll_queues will trigger
following panic:

BUG: kernel NULL pointer dereference, address: 0000000000000010
Oops: Oops: 0000 [#1] SMP NOPTI
CPU: 27 UID: 0 PID: 920 Comm: bash Not tainted 6.15.0-02023-gadbdb95c8696-dirty #1238 PREEMPT(undef)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014
RIP: 0010:__bitmap_or+0x48/0x70
Call Trace:
 &lt;TASK&gt;
 __group_cpus_evenly+0x822/0x8c0
 group_cpus_evenly+0x2d9/0x490
 blk_mq_map_queues+0x1e/0x110
 null_map_queues+0xc9/0x170 [null_blk]
 blk_mq_update_queue_map+0xdb/0x160
 blk_mq_update_nr_hw_queues+0x22b/0x560
 nullb_update_nr_hw_queues+0x71/0xf0 [null_blk]
 nullb_device_poll_queues_store+0xa4/0x130 [null_blk]
 configfs_write_iter+0x109/0x1d0
 vfs_write+0x26e/0x6f0
 ksys_write+0x79/0x180
 __x64_sys_write+0x1d/0x30
 x64_sys_call+0x45c4/0x45f0
 do_syscall_64+0xa5/0x240
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Root cause is that numgrps is set to 0, and ZERO_SIZE_PTR is returned from
kcalloc(), and later ZERO_SIZE_PTR will be deferenced.

Fix the problem by checking numgrps first in group_cpus_evenly(), and
return NULL directly if numgrps is zero.

[yukuai3@huawei.com: also fix the non-SMP version]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38255/">CVE-2025-38255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38255">CVE-2025-38255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246190">SUSE bug 1246190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38256</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38256" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38256" ref_url="https://www.suse.com/security/cve/CVE-2025-38256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/rsrc: fix folio unpinning

syzbot complains about an unmapping failure:

[  108.070381][   T14] kernel BUG at mm/gup.c:71!
[  108.070502][   T14] Internal error: Oops - BUG: 00000000f2000800 [#1]  SMP
[  108.123672][   T14] Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20250221-8.fc42 02/21/2025
[  108.127458][   T14] Workqueue: iou_exit io_ring_exit_work
[  108.174205][   T14] Call trace:
[  108.175649][   T14]  sanity_check_pinned_pages+0x7cc/0x7d0 (P)
[  108.178138][   T14]  unpin_user_page+0x80/0x10c
[  108.180189][   T14]  io_release_ubuf+0x84/0xf8
[  108.182196][   T14]  io_free_rsrc_node+0x250/0x57c
[  108.184345][   T14]  io_rsrc_data_free+0x148/0x298
[  108.186493][   T14]  io_sqe_buffers_unregister+0x84/0xa0
[  108.188991][   T14]  io_ring_ctx_free+0x48/0x480
[  108.191057][   T14]  io_ring_exit_work+0x764/0x7d8
[  108.193207][   T14]  process_one_work+0x7e8/0x155c
[  108.195431][   T14]  worker_thread+0x958/0xed8
[  108.197561][   T14]  kthread+0x5fc/0x75c
[  108.199362][   T14]  ret_from_fork+0x10/0x20

We can pin a tail page of a folio, but then io_uring will try to unpin
the head page of the folio. While it should be fine in terms of keeping
the page actually alive, mm folks say it's wrong and triggers a debug
warning. Use unpin_user_folio() instead of unpin_user_page*.

[axboe: adapt to current tree, massage commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38256/">CVE-2025-38256 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38256">CVE-2025-38256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246188">SUSE bug 1246188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38257</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38257" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38257" ref_url="https://www.suse.com/security/cve/CVE-2025-38257" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/pkey: Prevent overflow in size calculation for memdup_user()

Number of apqn target list entries contained in 'nr_apqns' variable is
determined by userspace via an ioctl call so the result of the product in
calculation of size passed to memdup_user() may overflow.

In this case the actual size of the allocated area and the value
describing it won't be in sync leading to various types of unpredictable
behaviour later.

Use a proper memdup_array_user() helper which returns an error if an
overflow is detected. Note that it is different from when nr_apqns is
initially zero - that case is considered valid and should be handled in
subsequent pkey_handler implementations.

Found by Linux Verification Center (linuxtesting.org).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38257/">CVE-2025-38257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38257">CVE-2025-38257 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246186">SUSE bug 1246186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246189">SUSE bug 1246189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38258</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38258" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38258" ref_url="https://www.suse.com/security/cve/CVE-2025-38258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/sysfs-schemes: free old damon_sysfs_scheme_filter-&gt;memcg_path on write

memcg_path_store() assigns a newly allocated memory buffer to
filter-&gt;memcg_path, without deallocating the previously allocated and
assigned memory buffer.  As a result, users can leak kernel memory by
continuously writing a data to memcg_path DAMOS sysfs file.  Fix the leak
by deallocating the previously set memory buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38258/">CVE-2025-38258 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38258">CVE-2025-38258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246185">SUSE bug 1246185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38259</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38259" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38259" ref_url="https://www.suse.com/security/cve/CVE-2025-38259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: codecs: wcd9335: Fix missing free of regulator supplies

Driver gets and enables all regulator supplies in probe path
(wcd9335_parse_dt() and wcd9335_power_on_reset()), but does not cleanup
in final error paths and in unbind (missing remove() callback).  This
leads to leaked memory and unbalanced regulator enable count during
probe errors or unbind.

Fix this by converting entire code into devm_regulator_bulk_get_enable()
which also greatly simplifies the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38259/">CVE-2025-38259 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38259">CVE-2025-38259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246220">SUSE bug 1246220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38262</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38262" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38262" ref_url="https://www.suse.com/security/cve/CVE-2025-38262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: serial: uartlite: register uart driver in init

When two instances of uart devices are probing, a concurrency race can
occur. If one thread calls uart_register_driver function, which first
allocates and assigns memory to 'uart_state' member of uart_driver
structure, the other instance can bypass uart driver registration and
call ulite_assign. This calls uart_add_one_port, which expects the uart
driver to be fully initialized. This leads to a kernel panic due to a
null pointer dereference:

[    8.143581] BUG: kernel NULL pointer dereference, address: 00000000000002b8
[    8.156982] #PF: supervisor write access in kernel mode
[    8.156984] #PF: error_code(0x0002) - not-present page
[    8.156986] PGD 0 P4D 0
...
[    8.180668] RIP: 0010:mutex_lock+0x19/0x30
[    8.188624] Call Trace:
[    8.188629]  ? __die_body.cold+0x1a/0x1f
[    8.195260]  ? page_fault_oops+0x15c/0x290
[    8.209183]  ? __irq_resolve_mapping+0x47/0x80
[    8.209187]  ? exc_page_fault+0x64/0x140
[    8.209190]  ? asm_exc_page_fault+0x22/0x30
[    8.209196]  ? mutex_lock+0x19/0x30
[    8.223116]  uart_add_one_port+0x60/0x440
[    8.223122]  ? proc_tty_register_driver+0x43/0x50
[    8.223126]  ? tty_register_driver+0x1ca/0x1e0
[    8.246250]  ulite_probe+0x357/0x4b0 [uartlite]

To prevent it, move uart driver registration in to init function. This
will ensure that uart_driver is always registered when probe function
is called.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38262/">CVE-2025-38262 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38262">CVE-2025-38262 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246282">SUSE bug 1246282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38263</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38263" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38263" ref_url="https://www.suse.com/security/cve/CVE-2025-38263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bcache: fix NULL pointer in cache_set_flush()

1. LINE#1794 - LINE#1887 is some codes about function of
   bch_cache_set_alloc().
2. LINE#2078 - LINE#2142 is some codes about function of
   register_cache_set().
3. register_cache_set() will call bch_cache_set_alloc() in LINE#2098.

 1794 struct cache_set *bch_cache_set_alloc(struct cache_sb *sb)
 1795 {
 ...
 1860         if (!(c-&gt;devices = kcalloc(c-&gt;nr_uuids, sizeof(void *), GFP_KERNEL)) ||
 1861             mempool_init_slab_pool(&amp;c-&gt;search, 32, bch_search_cache) ||
 1862             mempool_init_kmalloc_pool(&amp;c-&gt;bio_meta, 2,
 1863                                 sizeof(struct bbio) + sizeof(struct bio_vec) *
 1864                                 bucket_pages(c)) ||
 1865             mempool_init_kmalloc_pool(&amp;c-&gt;fill_iter, 1, iter_size) ||
 1866             bioset_init(&amp;c-&gt;bio_split, 4, offsetof(struct bbio, bio),
 1867                         BIOSET_NEED_BVECS|BIOSET_NEED_RESCUER) ||
 1868             !(c-&gt;uuids = alloc_bucket_pages(GFP_KERNEL, c)) ||
 1869             !(c-&gt;moving_gc_wq = alloc_workqueue("bcache_gc",
 1870                                                 WQ_MEM_RECLAIM, 0)) ||
 1871             bch_journal_alloc(c) ||
 1872             bch_btree_cache_alloc(c) ||
 1873             bch_open_buckets_alloc(c) ||
 1874             bch_bset_sort_state_init(&amp;c-&gt;sort, ilog2(c-&gt;btree_pages)))
 1875                 goto err;
                      ^^^^^^^^
 1876
 ...
 1883         return c;
 1884 err:
 1885         bch_cache_set_unregister(c);
              ^^^^^^^^^^^^^^^^^^^^^^^^^^^
 1886         return NULL;
 1887 }
 ...
 2078 static const char *register_cache_set(struct cache *ca)
 2079 {
 ...
 2098         c = bch_cache_set_alloc(&amp;ca-&gt;sb);
 2099         if (!c)
 2100                 return err;
                      ^^^^^^^^^^
 ...
 2128         ca-&gt;set = c;
 2129         ca-&gt;set-&gt;cache[ca-&gt;sb.nr_this_dev] = ca;
              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
 ...
 2138         return NULL;
 2139 err:
 2140         bch_cache_set_unregister(c);
 2141         return err;
 2142 }

(1) If LINE#1860 - LINE#1874 is true, then do 'goto err'(LINE#1875) and
    call bch_cache_set_unregister()(LINE#1885).
(2) As (1) return NULL(LINE#1886), LINE#2098 - LINE#2100 would return.
(3) As (2) has returned, LINE#2128 - LINE#2129 would do *not* give the
    value to c-&gt;cache[], it means that c-&gt;cache[] is NULL.

LINE#1624 - LINE#1665 is some codes about function of cache_set_flush().
As (1), in LINE#1885 call
bch_cache_set_unregister()
---&gt; bch_cache_set_stop()
     ---&gt; closure_queue()
          -.-&gt; cache_set_flush() (as below LINE#1624)

 1624 static void cache_set_flush(struct closure *cl)
 1625 {
 ...
 1654         for_each_cache(ca, c, i)
 1655                 if (ca-&gt;alloc_thread)
                          ^^
 1656                         kthread_stop(ca-&gt;alloc_thread);
 ...
 1665 }

(4) In LINE#1655 ca is NULL(see (3)) in cache_set_flush() then the
    kernel crash occurred as below:
[  846.712887] bcache: register_cache() error drbd6: cannot allocate memory
[  846.713242] bcache: register_bcache() error : failed to register device
[  846.713336] bcache: cache_set_free() Cache set 2f84bdc1-498a-4f2f-98a7-01946bf54287 unregistered
[  846.713768] BUG: unable to handle kernel NULL pointer dereference at 00000000000009f8
[  846.714790] PGD 0 P4D 0
[  846.715129] Oops: 0000 [#1] SMP PTI
[  846.715472] CPU: 19 PID: 5057 Comm: kworker/19:16 Kdump: loaded Tainted: G           OE    --------- -  - 4.18.0-147.5.1.el8_1.5es.3.x86_64 #1
[  846.716082] Hardware name: ESPAN GI-25212/X11DPL-i, BIOS 2.1 06/15/2018
[  846.716451] Workqueue: events cache_set_flush [bcache]
[  846.716808] RIP: 0010:cache_set_flush+0xc9/0x1b0 [bcache]
[  846.717155] Code: 00 4c 89 a5 b0 03 00 00 48 8b 85 68 f6 ff ff a8 08 0f 84 88 00 00 00 31 db 66 83 bd 3c f7 ff ff 00 48 8b 85 48 ff ff ff 74 28 &lt;48&gt; 8b b8 f8 09 00 0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38263/">CVE-2025-38263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38263">CVE-2025-38263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246248">SUSE bug 1246248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38264</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38264" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38264" ref_url="https://www.suse.com/security/cve/CVE-2025-38264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: sanitize request list handling

Validate the request in nvme_tcp_handle_r2t() to ensure it's not part of
any list, otherwise a malicious R2T PDU might inject a loop in request
list processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38264/">CVE-2025-38264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38264">CVE-2025-38264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246387">SUSE bug 1246387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38265</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38265" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38265" ref_url="https://www.suse.com/security/cve/CVE-2025-38265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: jsm: fix NPE during jsm_uart_port_init

No device was set which caused serial_base_ctrl_add to crash.

 BUG: kernel NULL pointer dereference, address: 0000000000000050
 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
 CPU: 16 UID: 0 PID: 368 Comm: (udev-worker) Not tainted 6.12.25-amd64 #1  Debian 6.12.25-1
 RIP: 0010:serial_base_ctrl_add+0x96/0x120
 Call Trace:
  &lt;TASK&gt;
  serial_core_register_port+0x1a0/0x580
  ? __setup_irq+0x39c/0x660
  ? __kmalloc_cache_noprof+0x111/0x310
  jsm_uart_port_init+0xe8/0x180 [jsm]
  jsm_probe_one+0x1f4/0x410 [jsm]
  local_pci_probe+0x42/0x90
  pci_device_probe+0x22f/0x270
  really_probe+0xdb/0x340
  ? pm_runtime_barrier+0x54/0x90
  ? __pfx___driver_attach+0x10/0x10
  __driver_probe_device+0x78/0x110
  driver_probe_device+0x1f/0xa0
  __driver_attach+0xba/0x1c0
  bus_for_each_dev+0x8c/0xe0
  bus_add_driver+0x112/0x1f0
  driver_register+0x72/0xd0
  jsm_init_module+0x36/0xff0 [jsm]
  ? __pfx_jsm_init_module+0x10/0x10 [jsm]
  do_one_initcall+0x58/0x310
  do_init_module+0x60/0x230

Tested with Digi Neo PCIe 8 port card.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38265/">CVE-2025-38265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38265">CVE-2025-38265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246244">SUSE bug 1246244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38267</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38267" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38267" ref_url="https://www.suse.com/security/cve/CVE-2025-38267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Do not trigger WARN_ON() due to a commit_overrun

When reading a memory mapped buffer the reader page is just swapped out
with the last page written in the write buffer. If the reader page is the
same as the commit buffer (the buffer that is currently being written to)
it was assumed that it should never have missed events. If it does, it
triggers a WARN_ON_ONCE().

But there just happens to be one scenario where this can legitimately
happen. That is on a commit_overrun. A commit overrun is when an interrupt
preempts an event being written to the buffer and then the interrupt adds
so many new events that it fills and wraps the buffer back to the commit.
Any new events would then be dropped and be reported as "missed_events".

In this case, the next page to read is the commit buffer and after the
swap of the reader page, the reader page will be the commit buffer, but
this time there will be missed events and this triggers the following
warning:

 ------------[ cut here ]------------
 WARNING: CPU: 2 PID: 1127 at kernel/trace/ring_buffer.c:7357 ring_buffer_map_get_reader+0x49a/0x780
 Modules linked in: kvm_intel kvm irqbypass
 CPU: 2 UID: 0 PID: 1127 Comm: trace-cmd Not tainted 6.15.0-rc7-test-00004-g478bc2824b45-dirty #564 PREEMPT
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
 RIP: 0010:ring_buffer_map_get_reader+0x49a/0x780
 Code: 00 00 00 48 89 fe 48 c1 ee 03 80 3c 2e 00 0f 85 ec 01 00 00 4d 3b a6 a8 00 00 00 0f 85 8a fd ff ff 48 85 c0 0f 84 55 fe ff ff &lt;0f&gt; 0b e9 4e fe ff ff be 08 00 00 00 4c 89 54 24 58 48 89 54 24 50
 RSP: 0018:ffff888121787dc0 EFLAGS: 00010002
 RAX: 00000000000006a2 RBX: ffff888100062800 RCX: ffffffff8190cb49
 RDX: ffff888126934c00 RSI: 1ffff11020200a15 RDI: ffff8881010050a8
 RBP: dffffc0000000000 R08: 0000000000000000 R09: ffffed1024d26982
 R10: ffff888126934c17 R11: ffff8881010050a8 R12: ffff888126934c00
 R13: ffff8881010050b8 R14: ffff888101005000 R15: ffff888126930008
 FS:  00007f95c8cd7540(0000) GS:ffff8882b576e000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007f95c8de4dc0 CR3: 0000000128452002 CR4: 0000000000172ef0
 Call Trace:
  &lt;TASK&gt;
  ? __pfx_ring_buffer_map_get_reader+0x10/0x10
  tracing_buffers_ioctl+0x283/0x370
  __x64_sys_ioctl+0x134/0x190
  do_syscall_64+0x79/0x1c0
  entry_SYSCALL_64_after_hwframe+0x76/0x7e
 RIP: 0033:0x7f95c8de48db
 Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 &lt;89&gt; c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00
 RSP: 002b:00007ffe037ba110 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
 RAX: ffffffffffffffda RBX: 00007ffe037bb2b0 RCX: 00007f95c8de48db
 RDX: 0000000000000000 RSI: 0000000000005220 RDI: 0000000000000006
 RBP: 00007ffe037ba180 R08: 0000000000000000 R09: 0000000000000000
 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
 R13: 00007ffe037bb6f8 R14: 00007f95c9065000 R15: 00005575c7492c90
  &lt;/TASK&gt;
 irq event stamp: 5080
 hardirqs last  enabled at (5079): [&lt;ffffffff83e0adb0&gt;] _raw_spin_unlock_irqrestore+0x50/0x70
 hardirqs last disabled at (5080): [&lt;ffffffff83e0aa83&gt;] _raw_spin_lock_irqsave+0x63/0x70
 softirqs last  enabled at (4182): [&lt;ffffffff81516122&gt;] handle_softirqs+0x552/0x710
 softirqs last disabled at (4159): [&lt;ffffffff815163f7&gt;] __irq_exit_rcu+0x107/0x210
 ---[ end trace 0000000000000000 ]---

The above was triggered by running on a kernel with both lockdep and KASAN
as well as kmemleak enabled and executing the following command:

 # perf record -o perf-test.dat -a -- trace-cmd record --nosplice  -e all -p function hackbench 50

With perf interjecting a lot of interrupts and trace-cmd enabling all
events as well as function tracing, with lockdep, KASAN and kmemleak
enabled, it could cause an interrupt preempting an event being written to
add enough event
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38267/">CVE-2025-38267 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38267">CVE-2025-38267 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246245">SUSE bug 1246245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38268</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38268" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38268" ref_url="https://www.suse.com/security/cve/CVE-2025-38268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tcpm: move tcpm_queue_vdm_unlocked to asynchronous work

A state check was previously added to tcpm_queue_vdm_unlocked to
prevent a deadlock where the DisplayPort Alt Mode driver would be
executing work and attempting to grab the tcpm_lock while the TCPM
was holding the lock and attempting to unregister the altmode, blocking
on the altmode driver's cancel_work_sync call.

Because the state check isn't protected, there is a small window
where the Alt Mode driver could determine that the TCPM is
in a ready state and attempt to grab the lock while the
TCPM grabs the lock and changes the TCPM state to one that
causes the deadlock. The callstack is provided below:

[110121.667392][    C7] Call trace:
[110121.667396][    C7]  __switch_to+0x174/0x338
[110121.667406][    C7]  __schedule+0x608/0x9f0
[110121.667414][    C7]  schedule+0x7c/0xe8
[110121.667423][    C7]  kernfs_drain+0xb0/0x114
[110121.667431][    C7]  __kernfs_remove+0x16c/0x20c
[110121.667436][    C7]  kernfs_remove_by_name_ns+0x74/0xe8
[110121.667442][    C7]  sysfs_remove_group+0x84/0xe8
[110121.667450][    C7]  sysfs_remove_groups+0x34/0x58
[110121.667458][    C7]  device_remove_groups+0x10/0x20
[110121.667464][    C7]  device_release_driver_internal+0x164/0x2e4
[110121.667475][    C7]  device_release_driver+0x18/0x28
[110121.667484][    C7]  bus_remove_device+0xec/0x118
[110121.667491][    C7]  device_del+0x1e8/0x4ac
[110121.667498][    C7]  device_unregister+0x18/0x38
[110121.667504][    C7]  typec_unregister_altmode+0x30/0x44
[110121.667515][    C7]  tcpm_reset_port+0xac/0x370
[110121.667523][    C7]  tcpm_snk_detach+0x84/0xb8
[110121.667529][    C7]  run_state_machine+0x4c0/0x1b68
[110121.667536][    C7]  tcpm_state_machine_work+0x94/0xe4
[110121.667544][    C7]  kthread_worker_fn+0x10c/0x244
[110121.667552][    C7]  kthread+0x104/0x1d4
[110121.667557][    C7]  ret_from_fork+0x10/0x20

[110121.667689][    C7] Workqueue: events dp_altmode_work
[110121.667697][    C7] Call trace:
[110121.667701][    C7]  __switch_to+0x174/0x338
[110121.667710][    C7]  __schedule+0x608/0x9f0
[110121.667717][    C7]  schedule+0x7c/0xe8
[110121.667725][    C7]  schedule_preempt_disabled+0x24/0x40
[110121.667733][    C7]  __mutex_lock+0x408/0xdac
[110121.667741][    C7]  __mutex_lock_slowpath+0x14/0x24
[110121.667748][    C7]  mutex_lock+0x40/0xec
[110121.667757][    C7]  tcpm_altmode_enter+0x78/0xb4
[110121.667764][    C7]  typec_altmode_enter+0xdc/0x10c
[110121.667769][    C7]  dp_altmode_work+0x68/0x164
[110121.667775][    C7]  process_one_work+0x1e4/0x43c
[110121.667783][    C7]  worker_thread+0x25c/0x430
[110121.667789][    C7]  kthread+0x104/0x1d4
[110121.667794][    C7]  ret_from_fork+0x10/0x20

Change tcpm_queue_vdm_unlocked to queue for tcpm_queue_vdm_work,
which can perform the state check while holding the TCPM lock
while the Alt Mode lock is no longer held. This requires a new
struct to hold the vdm data, altmode_vdm_event.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38268/">CVE-2025-38268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38268">CVE-2025-38268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246385">SUSE bug 1246385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38270</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38270" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38270" ref_url="https://www.suse.com/security/cve/CVE-2025-38270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: drv: netdevsim: don't napi_complete() from netpoll

netdevsim supports netpoll. Make sure we don't call napi_complete()
from it, since it may not be scheduled. Breno reports hitting a
warning in napi_complete_done():

WARNING: CPU: 14 PID: 104 at net/core/dev.c:6592 napi_complete_done+0x2cc/0x560
  __napi_poll+0x2d8/0x3a0
  handle_softirqs+0x1fe/0x710

This is presumably after netpoll stole the SCHED bit prematurely.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38270/">CVE-2025-38270 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38270">CVE-2025-38270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246252">SUSE bug 1246252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38272</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38272" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38272" ref_url="https://www.suse.com/security/cve/CVE-2025-38272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: b53: do not enable EEE on bcm63xx

BCM63xx internal switches do not support EEE, but provide multiple RGMII
ports where external PHYs may be connected. If one of these PHYs are EEE
capable, we may try to enable EEE for the MACs, which then hangs the
system on access of the (non-existent) EEE registers.

Fix this by checking if the switch actually supports EEE before
attempting to configure it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38272/">CVE-2025-38272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38272">CVE-2025-38272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246268">SUSE bug 1246268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38273</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38273" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38273" ref_url="https://www.suse.com/security/cve/CVE-2025-38273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: tipc: fix refcount warning in tipc_aead_encrypt

syzbot reported a refcount warning [1] caused by calling get_net() on
a network namespace that is being destroyed (refcount=0). This happens
when a TIPC discovery timer fires during network namespace cleanup.

The recently added get_net() call in commit e279024617134 ("net/tipc:
fix slab-use-after-free Read in tipc_aead_encrypt_done") attempts to
hold a reference to the network namespace. However, if the namespace
is already being destroyed, its refcount might be zero, leading to the
use-after-free warning.

Replace get_net() with maybe_get_net(), which safely checks if the
refcount is non-zero before incrementing it. If the namespace is being
destroyed, return -ENODEV early, after releasing the bearer reference.

[1]: https://lore.kernel.org/all/68342b55.a70a0220.253bc2.0091.GAE@google.com/T/#m12019cf9ae77e1954f666914640efa36d52704a2
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38273/">CVE-2025-38273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38273">CVE-2025-38273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246266">SUSE bug 1246266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38274</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38274" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38274" ref_url="https://www.suse.com/security/cve/CVE-2025-38274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fpga: fix potential null pointer deref in fpga_mgr_test_img_load_sgt()

fpga_mgr_test_img_load_sgt() allocates memory for sgt using
kunit_kzalloc() however it does not check if the allocation failed.
It then passes sgt to sg_alloc_table(), which passes it to
__sg_alloc_table(). This function calls memset() on sgt in an attempt to
zero it out. If the allocation fails then sgt will be NULL and the
memset will trigger a NULL pointer dereference.

Fix this by checking the allocation with KUNIT_ASSERT_NOT_ERR_OR_NULL().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38274/">CVE-2025-38274 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38274">CVE-2025-38274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246234">SUSE bug 1246234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38275</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38275" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38275" ref_url="https://www.suse.com/security/cve/CVE-2025-38275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: qcom-qmp-usb: Fix an NULL vs IS_ERR() bug

The qmp_usb_iomap() helper function currently returns the raw result of
devm_ioremap() for non-exclusive mappings. Since devm_ioremap() may return
a NULL pointer and the caller only checks error pointers with IS_ERR(),
NULL could bypass the check and lead to an invalid dereference.

Fix the issue by checking if devm_ioremap() returns NULL. When it does,
qmp_usb_iomap() now returns an error pointer via IOMEM_ERR_PTR(-ENOMEM),
ensuring safe and consistent error handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38275/">CVE-2025-38275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38275">CVE-2025-38275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246236">SUSE bug 1246236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38277</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38277" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38277" ref_url="https://www.suse.com/security/cve/CVE-2025-38277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: nand: ecc-mxic: Fix use of uninitialized variable ret

If ctx-&gt;steps is zero, the loop processing ECC steps is skipped,
and the variable ret remains uninitialized. It is later checked
and returned, which leads to undefined behavior and may cause
unpredictable results in user space or kernel crashes.

This scenario can be triggered in edge cases such as misconfigured
geometry, ECC engine misuse, or if ctx-&gt;steps is not validated
after initialization.

Initialize ret to zero before the loop to ensure correct and safe
behavior regardless of the ctx-&gt;steps value.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38277/">CVE-2025-38277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38277">CVE-2025-38277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246246">SUSE bug 1246246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38278</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38278" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38278" ref_url="https://www.suse.com/security/cve/CVE-2025-38278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: QOS: Refactor TC_HTB_LEAF_DEL_LAST callback

This patch addresses below issues,

1. Active traffic on the leaf node must be stopped before its send queue
   is reassigned to the parent. This patch resolves the issue by marking
   the node as 'Inner'.

2. During a system reboot, the interface receives TC_HTB_LEAF_DEL
   and TC_HTB_LEAF_DEL_LAST callbacks to delete its HTB queues.
   In the case of TC_HTB_LEAF_DEL_LAST, although the same send queue
   is reassigned to the parent, the current logic still attempts to update
   the real number of queues, leadning to below warnings

        New queues can't be registered after device unregistration.
        WARNING: CPU: 0 PID: 6475 at net/core/net-sysfs.c:1714
        netdev_queue_update_kobjects+0x1e4/0x200
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38278/">CVE-2025-38278 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38278">CVE-2025-38278 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246255">SUSE bug 1246255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38286</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38286" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38286" ref_url="https://www.suse.com/security/cve/CVE-2025-38286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: at91: Fix possible out-of-boundary access

at91_gpio_probe() doesn't check that given OF alias is not available or
something went wrong when trying to get it. This might have consequences
when accessing gpio_chips array with that value as an index. Note, that
BUG() can be compiled out and hence won't actually perform the required
checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38286/">CVE-2025-38286 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38286">CVE-2025-38286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246283">SUSE bug 1246283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246284">SUSE bug 1246284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38287</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38287" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38287" ref_url="https://www.suse.com/security/cve/CVE-2025-38287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/cm: Drop lockdep assert and WARN when freeing old msg

The send completion handler can run after cm_id has advanced to another
message.  The cm_id lock is not needed in this case, but a recent change
re-used cm_free_priv_msg(), which asserts that the lock is held and
WARNs if the cm_id's currently outstanding msg is different than the one
being freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38287/">CVE-2025-38287 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38287">CVE-2025-38287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246285">SUSE bug 1246285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38288</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38288" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38288" ref_url="https://www.suse.com/security/cve/CVE-2025-38288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: smartpqi: Fix smp_processor_id() call trace for preemptible kernels

Correct kernel call trace when calling smp_processor_id() when called in
preemptible kernels by using raw_smp_processor_id().

smp_processor_id() checks to see if preemption is disabled and if not,
issue an error message followed by a call to dump_stack().

Brief example of call trace:
kernel:  check_preemption_disabled: 436 callbacks suppressed
kernel:  BUG: using smp_processor_id() in preemptible [00000000]
         code: kworker/u1025:0/2354
kernel:  caller is pqi_scsi_queue_command+0x183/0x310 [smartpqi]
kernel:  CPU: 129 PID: 2354 Comm: kworker/u1025:0
kernel:  ...
kernel:  Workqueue: writeback wb_workfn (flush-253:0)
kernel:  Call Trace:
kernel:   &lt;TASK&gt;
kernel:   dump_stack_lvl+0x34/0x48
kernel:   check_preemption_disabled+0xdd/0xe0
kernel:   pqi_scsi_queue_command+0x183/0x310 [smartpqi]
kernel:  ...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38288/">CVE-2025-38288 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38288">CVE-2025-38288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246286">SUSE bug 1246286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38289</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38289" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38289" ref_url="https://www.suse.com/security/cve/CVE-2025-38289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk

Smatch detected a potential use-after-free of an ndlp oject in
dev_loss_tmo_callbk during driver unload or fatal error handling.

Fix by reordering code to avoid potential use-after-free if initial
nodelist reference has been previously removed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38289/">CVE-2025-38289 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38289">CVE-2025-38289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246287">SUSE bug 1246287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246288">SUSE bug 1246288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38290</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38290" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38290" ref_url="https://www.suse.com/security/cve/CVE-2025-38290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix node corruption in ar-&gt;arvifs list

In current WLAN recovery code flow, ath12k_core_halt() only reinitializes
the "arvifs" list head. This will cause the list node immediately following
the list head to become an invalid list node. Because the prev of that node
still points to the list head "arvifs", but the next of the list head
"arvifs" no longer points to that list node.

When a WLAN recovery occurs during the execution of a vif removal, and it
happens before the spin_lock_bh(&amp;ar-&gt;data_lock) in
ath12k_mac_vdev_delete(), list_del() will detect the previously mentioned
situation, thereby triggering a kernel panic.

The fix is to remove and reinitialize all vif list nodes from the list head
"arvifs" during WLAN halt. The reinitialization is to make the list nodes
valid, ensuring that the list_del() in ath12k_mac_vdev_delete() can execute
normally.

Call trace:
__list_del_entry_valid_or_report+0xd4/0x100 (P)
ath12k_mac_remove_link_interface.isra.0+0xf8/0x2e4 [ath12k]
ath12k_scan_vdev_clean_work+0x40/0x164 [ath12k]
cfg80211_wiphy_work+0xfc/0x100
process_one_work+0x164/0x2d0
worker_thread+0x254/0x380
kthread+0xfc/0x100
ret_from_fork+0x10/0x20

The change is mostly copied from the ath11k patch:
https://lore.kernel.org/all/20250320053145.3445187-1-quic_stonez@quicinc.com/

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38290/">CVE-2025-38290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38290">CVE-2025-38290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246293">SUSE bug 1246293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38291</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38291" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38291" ref_url="https://www.suse.com/security/cve/CVE-2025-38291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Prevent sending WMI commands to firmware during firmware crash

Currently, we encounter the following kernel call trace when a firmware
crash occurs. This happens because the host sends WMI commands to the
firmware while it is in recovery, causing the commands to fail and
resulting in the kernel call trace.

Set the ATH12K_FLAG_CRASH_FLUSH and ATH12K_FLAG_RECOVERY flags when the
host driver receives the firmware crash notification from MHI. This
prevents sending WMI commands to the firmware during recovery.

Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x75/0xc0
 register_lock_class+0x6be/0x7a0
 ? __lock_acquire+0x644/0x19a0
 __lock_acquire+0x95/0x19a0
 lock_acquire+0x265/0x310
 ? ath12k_ce_send+0xa2/0x210 [ath12k]
 ? find_held_lock+0x34/0xa0
 ? ath12k_ce_send+0x56/0x210 [ath12k]
 _raw_spin_lock_bh+0x33/0x70
 ? ath12k_ce_send+0xa2/0x210 [ath12k]
 ath12k_ce_send+0xa2/0x210 [ath12k]
 ath12k_htc_send+0x178/0x390 [ath12k]
 ath12k_wmi_cmd_send_nowait+0x76/0xa0 [ath12k]
 ath12k_wmi_cmd_send+0x62/0x190 [ath12k]
 ath12k_wmi_pdev_bss_chan_info_request+0x62/0xc0 [ath1
 ath12k_mac_op_get_survey+0x2be/0x310 [ath12k]
 ieee80211_dump_survey+0x99/0x240 [mac80211]
 nl80211_dump_survey+0xe7/0x470 [cfg80211]
 ? kmalloc_reserve+0x59/0xf0
 genl_dumpit+0x24/0x70
 netlink_dump+0x177/0x360
 __netlink_dump_start+0x206/0x280
 genl_family_rcv_msg_dumpit.isra.22+0x8a/0xe0
 ? genl_family_rcv_msg_attrs_parse.isra.23+0xe0/0xe0
 ? genl_op_lock.part.12+0x10/0x10
 ? genl_dumpit+0x70/0x70
 genl_rcv_msg+0x1d0/0x290
 ? nl80211_del_station+0x330/0x330 [cfg80211]
 ? genl_get_cmd_both+0x50/0x50
 netlink_rcv_skb+0x4f/0x100
 genl_rcv+0x1f/0x30
 netlink_unicast+0x1b6/0x260
 netlink_sendmsg+0x31a/0x450
 __sock_sendmsg+0xa8/0xb0
 ____sys_sendmsg+0x1e4/0x260
 ___sys_sendmsg+0x89/0xe0
 ? local_clock_noinstr+0xb/0xc0
 ? rcu_is_watching+0xd/0x40
 ? kfree+0x1de/0x370
 ? __sys_sendmsg+0x7a/0xc0

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38291/">CVE-2025-38291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38291">CVE-2025-38291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246297">SUSE bug 1246297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38292</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38292" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38292" ref_url="https://www.suse.com/security/cve/CVE-2025-38292" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13602" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix invalid access to memory

In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean
is_continuation is part of rxcb.
Currently, after freeing the skb, the rxcb-&gt;is_continuation accessed
again which is wrong since the memory is already freed.
This might lead use-after-free error.

Hence, fix by locally defining bool is_continuation from rxcb,
so that after freeing skb, is_continuation can be used.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38292/">CVE-2025-38292 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38292">CVE-2025-38292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246295">SUSE bug 1246295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38293</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38293" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38293" ref_url="https://www.suse.com/security/cve/CVE-2025-38293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix node corruption in ar-&gt;arvifs list

In current WLAN recovery code flow, ath11k_core_halt() only
reinitializes the "arvifs" list head. This will cause the
list node immediately following the list head to become an
invalid list node. Because the prev of that node still points
to the list head "arvifs", but the next of the list head "arvifs"
no longer points to that list node.

When a WLAN recovery occurs during the execution of a vif
removal, and it happens before the spin_lock_bh(&amp;ar-&gt;data_lock)
in ath11k_mac_op_remove_interface(), list_del() will detect the
previously mentioned situation, thereby triggering a kernel panic.

The fix is to remove and reinitialize all vif list nodes from the
list head "arvifs" during WLAN halt. The reinitialization is to make
the list nodes valid, ensuring that the list_del() in
ath11k_mac_op_remove_interface() can execute normally.

Call trace:
__list_del_entry_valid_or_report+0xb8/0xd0
ath11k_mac_op_remove_interface+0xb0/0x27c [ath11k]
drv_remove_interface+0x48/0x194 [mac80211]
ieee80211_do_stop+0x6e0/0x844 [mac80211]
ieee80211_stop+0x44/0x17c [mac80211]
__dev_close_many+0xac/0x150
__dev_change_flags+0x194/0x234
dev_change_flags+0x24/0x6c
devinet_ioctl+0x3a0/0x670
inet_ioctl+0x200/0x248
sock_do_ioctl+0x60/0x118
sock_ioctl+0x274/0x35c
__arm64_sys_ioctl+0xac/0xf0
invoke_syscall+0x48/0x114
...

Tested-on: QCA6698AQ hw2.1 PCI WLAN.HSP.1.1-04591-QCAHSPSWPL_V1_V2_SILICONZ_IOE-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38293/">CVE-2025-38293 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38293">CVE-2025-38293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246292">SUSE bug 1246292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38297</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38297" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38297" ref_url="https://www.suse.com/security/cve/CVE-2025-38297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM: EM: Fix potential division-by-zero error in em_compute_costs()

When the device is of a non-CPU type, table[i].performance won't be
initialized in the previous em_init_performance(), resulting in division
by zero when calculating costs in em_compute_costs().

Since the 'cost' algorithm is only used for EAS energy efficiency
calculations and is currently not utilized by other device drivers, we
should add the _is_cpu_device(dev) check to prevent this division-by-zero
issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-38297/">CVE-2025-38297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38297">CVE-2025-38297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253078">SUSE bug 1253078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38298</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38298" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38298" ref_url="https://www.suse.com/security/cve/CVE-2025-38298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

EDAC/skx_common: Fix general protection fault

After loading i10nm_edac (which automatically loads skx_edac_common), if
unload only i10nm_edac, then reload it and perform error injection testing,
a general protection fault may occur:

  mce: [Hardware Error]: Machine check events logged
  Oops: general protection fault ...
  ...
  Workqueue: events mce_gen_pool_process
  RIP: 0010:string+0x53/0xe0
  ...
  Call Trace:
  &lt;TASK&gt;
  ? die_addr+0x37/0x90
  ? exc_general_protection+0x1e7/0x3f0
  ? asm_exc_general_protection+0x26/0x30
  ? string+0x53/0xe0
  vsnprintf+0x23e/0x4c0
  snprintf+0x4d/0x70
  skx_adxl_decode+0x16a/0x330 [skx_edac_common]
  skx_mce_check_error.part.0+0xf8/0x220 [skx_edac_common]
  skx_mce_check_error+0x17/0x20 [skx_edac_common]
  ...

The issue arose was because the variable 'adxl_component_count' (inside
skx_edac_common), which counts the ADXL components, was not reset. During
the reloading of i10nm_edac, the count was incremented by the actual number
of ADXL components again, resulting in a count that was double the real
number of ADXL components. This led to an out-of-bounds reference to the
ADXL component array, causing the general protection fault above.

Fix this issue by resetting the 'adxl_component_count' in adxl_put(),
which is called during the unloading of {skx,i10nm}_edac.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-38298/">CVE-2025-38298 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38298">CVE-2025-38298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253079">SUSE bug 1253079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38299</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38299" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38299" ref_url="https://www.suse.com/security/cve/CVE-2025-38299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: mediatek: mt8195: Set ETDM1/2 IN/OUT to COMP_DUMMY()

ETDM2_IN_BE and ETDM1_OUT_BE are defined as COMP_EMPTY(),
in the case the codec dai_name will be null.

Avoid a crash if the device tree is not assigning a codec
to these links.

[    1.179936] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
[    1.181065] Mem abort info:
[    1.181420]   ESR = 0x0000000096000004
[    1.181892]   EC = 0x25: DABT (current EL), IL = 32 bits
[    1.182576]   SET = 0, FnV = 0
[    1.182964]   EA = 0, S1PTW = 0
[    1.183367]   FSC = 0x04: level 0 translation fault
[    1.183983] Data abort info:
[    1.184406]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[    1.185097]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[    1.185766]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[    1.186439] [0000000000000000] user address but active_mm is swapper
[    1.187239] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    1.188029] Modules linked in:
[    1.188420] CPU: 7 UID: 0 PID: 70 Comm: kworker/u32:1 Not tainted 6.14.0-rc4-next-20250226+ #85
[    1.189515] Hardware name: Radxa NIO 12L (DT)
[    1.190065] Workqueue: events_unbound deferred_probe_work_func
[    1.190808] pstate: 40400009 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    1.191683] pc : __pi_strcmp+0x24/0x140
[    1.192170] lr : mt8195_mt6359_soc_card_probe+0x224/0x7b0
[    1.192854] sp : ffff800083473970
[    1.193271] x29: ffff800083473a10 x28: 0000000000001008 x27: 0000000000000002
[    1.194168] x26: ffff800082408960 x25: ffff800082417db0 x24: ffff800082417d88
[    1.195065] x23: 000000000000001e x22: ffff800082dbf480 x21: ffff800082dc07b8
[    1.195961] x20: 0000000000000000 x19: 0000000000000013 x18: 00000000ffffffff
[    1.196858] x17: 000000040044ffff x16: 005000f2b5503510 x15: 0000000000000006
[    1.197755] x14: ffff800082407af0 x13: 6e6f69737265766e x12: 692d6b636f6c6374
[    1.198651] x11: 0000000000000002 x10: ffff80008240b920 x9 : 0000000000000018
[    1.199547] x8 : 0101010101010101 x7 : 0000000000000000 x6 : 0000000000000000
[    1.200443] x5 : 0000000000000000 x4 : 8080808080000000 x3 : 303933383978616d
[    1.201339] x2 : 0000000000000000 x1 : ffff80008240b920 x0 : 0000000000000000
[    1.202236] Call trace:
[    1.202545]  __pi_strcmp+0x24/0x140 (P)
[    1.203029]  mtk_soundcard_common_probe+0x3bc/0x5b8
[    1.203644]  platform_probe+0x70/0xe8
[    1.204106]  really_probe+0xc8/0x3a0
[    1.204556]  __driver_probe_device+0x84/0x160
[    1.205104]  driver_probe_device+0x44/0x130
[    1.205630]  __device_attach_driver+0xc4/0x170
[    1.206189]  bus_for_each_drv+0x8c/0xf8
[    1.206672]  __device_attach+0xa8/0x1c8
[    1.207155]  device_initial_probe+0x1c/0x30
[    1.207681]  bus_probe_device+0xb0/0xc0
[    1.208165]  deferred_probe_work_func+0xa4/0x100
[    1.208747]  process_one_work+0x158/0x3e0
[    1.209254]  worker_thread+0x2c4/0x3e8
[    1.209727]  kthread+0x134/0x1f0
[    1.210136]  ret_from_fork+0x10/0x20
[    1.210589] Code: 54000401 b50002c6 d503201f f86a6803 (f8408402)
[    1.211355] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38299/">CVE-2025-38299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38299">CVE-2025-38299 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246290">SUSE bug 1246290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38300</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38300" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38300" ref_url="https://www.suse.com/security/cve/CVE-2025-38300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: sun8i-ce-cipher - fix error handling in sun8i_ce_cipher_prepare()

Fix two DMA cleanup issues on the error path in sun8i_ce_cipher_prepare():

1] If dma_map_sg() fails for areq-&gt;dst, the device driver would try to free
   DMA memory it has not allocated in the first place. To fix this, on the
   "theend_sgs" error path, call dma unmap only if the corresponding dma
   map was successful.

2] If the dma_map_single() call for the IV fails, the device driver would
   try to free an invalid DMA memory address on the "theend_iv" path:
   ------------[ cut here ]------------
   DMA-API: sun8i-ce 1904000.crypto: device driver tries to free an invalid DMA memory address
   WARNING: CPU: 2 PID: 69 at kernel/dma/debug.c:968 check_unmap+0x123c/0x1b90
   Modules linked in: skcipher_example(O+)
   CPU: 2 UID: 0 PID: 69 Comm: 1904000.crypto- Tainted: G           O        6.15.0-rc3+ #24 PREEMPT
   Tainted: [O]=OOT_MODULE
   Hardware name: OrangePi Zero2 (DT)
   pc : check_unmap+0x123c/0x1b90
   lr : check_unmap+0x123c/0x1b90
   ...
   Call trace:
    check_unmap+0x123c/0x1b90 (P)
    debug_dma_unmap_page+0xac/0xc0
    dma_unmap_page_attrs+0x1f4/0x5fc
    sun8i_ce_cipher_do_one+0x1bd4/0x1f40
    crypto_pump_work+0x334/0x6e0
    kthread_worker_fn+0x21c/0x438
    kthread+0x374/0x664
    ret_from_fork+0x10/0x20
   ---[ end trace 0000000000000000 ]---

To fix this, check for !dma_mapping_error() before calling
dma_unmap_single() on the "theend_iv" path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38300/">CVE-2025-38300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38300">CVE-2025-38300 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246349">SUSE bug 1246349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38301</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38301" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38301" ref_url="https://www.suse.com/security/cve/CVE-2025-38301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmem: zynqmp_nvmem: unbreak driver after cleanup

Commit 29be47fcd6a0 ("nvmem: zynqmp_nvmem: zynqmp_nvmem_probe cleanup")
changed the driver to expect the device pointer to be passed as the
"context", but in nvmem the context parameter comes from nvmem_config.priv
which is never set - Leading to null pointer exceptions when the device is
accessed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38301/">CVE-2025-38301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38301">CVE-2025-38301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246351">SUSE bug 1246351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38302</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38302" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38302" ref_url="https://www.suse.com/security/cve/CVE-2025-38302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: don't use submit_bio_noacct_nocheck in blk_zone_wplug_bio_work

Bios queued up in the zone write plug have already gone through all all
preparation in the submit_bio path, including the freeze protection.

Submitting them through submit_bio_noacct_nocheck duplicates the work
and can can cause deadlocks when freezing a queue with pending bio
write plugs.

Go straight to -&gt;submit_bio or blk_mq_submit_bio to bypass the
superfluous extra freeze protection and checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38302/">CVE-2025-38302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38302">CVE-2025-38302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246353">SUSE bug 1246353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38303</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38303" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38303" ref_url="https://www.suse.com/security/cve/CVE-2025-38303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: eir: Fix possible crashes on eir_create_adv_data

eir_create_adv_data may attempt to add EIR_FLAGS and EIR_TX_POWER
without checking if that would fit.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38303/">CVE-2025-38303 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38303">CVE-2025-38303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246354">SUSE bug 1246354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38304</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38304" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38304" ref_url="https://www.suse.com/security/cve/CVE-2025-38304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix NULL pointer deference on eir_get_service_data

The len parameter is considered optional so it can be NULL so it cannot
be used for skipping to next entry of EIR_SERVICE_DATA.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38304/">CVE-2025-38304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38304">CVE-2025-38304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246240">SUSE bug 1246240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38305</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38305" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38305" ref_url="https://www.suse.com/security/cve/CVE-2025-38305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ptp: remove ptp-&gt;n_vclocks check logic in ptp_vclock_in_use()

There is no disagreement that we should check both ptp-&gt;is_virtual_clock
and ptp-&gt;n_vclocks to check if the ptp virtual clock is in use.

However, when we acquire ptp-&gt;n_vclocks_mux to read ptp-&gt;n_vclocks in
ptp_vclock_in_use(), we observe a recursive lock in the call trace
starting from n_vclocks_store().

============================================
WARNING: possible recursive locking detected
6.15.0-rc6 #1 Not tainted
--------------------------------------------
syz.0.1540/13807 is trying to acquire lock:
ffff888035a24868 (&amp;ptp-&gt;n_vclocks_mux){+.+.}-{4:4}, at:
 ptp_vclock_in_use drivers/ptp/ptp_private.h:103 [inline]
ffff888035a24868 (&amp;ptp-&gt;n_vclocks_mux){+.+.}-{4:4}, at:
 ptp_clock_unregister+0x21/0x250 drivers/ptp/ptp_clock.c:415

but task is already holding lock:
ffff888030704868 (&amp;ptp-&gt;n_vclocks_mux){+.+.}-{4:4}, at:
 n_vclocks_store+0xf1/0x6d0 drivers/ptp/ptp_sysfs.c:215

other info that might help us debug this:
 Possible unsafe locking scenario:

       CPU0
       ----
  lock(&amp;ptp-&gt;n_vclocks_mux);
  lock(&amp;ptp-&gt;n_vclocks_mux);

 *** DEADLOCK ***
....
============================================

The best way to solve this is to remove the logic that checks
ptp-&gt;n_vclocks in ptp_vclock_in_use().

The reason why this is appropriate is that any path that uses
ptp-&gt;n_vclocks must unconditionally check if ptp-&gt;n_vclocks is greater
than 0 before unregistering vclocks, and all functions are already
written this way. And in the function that uses ptp-&gt;n_vclocks, we
already get ptp-&gt;n_vclocks_mux before unregistering vclocks.

Therefore, we need to remove the redundant check for ptp-&gt;n_vclocks in
ptp_vclock_in_use() to prevent recursive locking.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38305/">CVE-2025-38305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38305">CVE-2025-38305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246358">SUSE bug 1246358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38306</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38306" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38306" ref_url="https://www.suse.com/security/cve/CVE-2025-38306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/fhandle.c: fix a race in call of has_locked_children()

may_decode_fh() is calling has_locked_children() while holding no locks.
That's an oopsable race...

The rest of the callers are safe since they are holding namespace_sem and
are guaranteed a positive refcount on the mount in question.

Rename the current has_locked_children() to __has_locked_children(), make
it static and switch the fs/namespace.c users to it.

Make has_locked_children() a wrapper for __has_locked_children(), calling
the latter under read_seqlock_excl(&amp;mount_lock).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38306/">CVE-2025-38306 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38306">CVE-2025-38306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246366">SUSE bug 1246366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38307</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38307" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38307" ref_url="https://www.suse.com/security/cve/CVE-2025-38307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: avs: Verify content returned by parse_int_array()

The first element of the returned array stores its length. If it is 0,
any manipulation beyond the element at index 0 ends with null-ptr-deref.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38307/">CVE-2025-38307 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38307">CVE-2025-38307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246364">SUSE bug 1246364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38311</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38311" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38311" ref_url="https://www.suse.com/security/cve/CVE-2025-38311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: get rid of the crit lock

Get rid of the crit lock.
That frees us from the error prone logic of try_locks.

Thanks to netdev_lock() by Jakub it is now easy, and in most cases we were
protected by it already - replace crit lock by netdev lock when it was not
the case.

Lockdep reports that we should cancel the work under crit_lock [splat1],
and that was the scheme we have mostly followed since [1] by Slawomir.
But when that is done we still got into deadlocks [splat2]. So instead
we should look at the bigger problem, namely "weird locking/scheduling"
of the iavf. The first step to fix that is to remove the crit lock.
I will followup with a -next series that simplifies scheduling/tasks.

Cancel the work without netdev lock (weird unlock+lock scheme),
to fix the [splat2] (which would be totally ugly if we would kept
the crit lock).

Extend protected part of iavf_watchdog_task() to include scheduling
more work.

Note that the removed comment in iavf_reset_task() was misplaced,
it belonged to inside of the removed if condition, so it's gone now.

[splat1] - w/o this patch - The deadlock during VF removal:
     WARNING: possible circular locking dependency detected
     sh/3825 is trying to acquire lock:
      ((work_completion)(&amp;(&amp;adapter-&gt;watchdog_task)-&gt;work)){+.+.}-{0:0}, at: start_flush_work+0x1a1/0x470
          but task is already holding lock:
      (&amp;adapter-&gt;crit_lock){+.+.}-{4:4}, at: iavf_remove+0xd1/0x690 [iavf]
          which lock already depends on the new lock.

[splat2] - when cancelling work under crit lock, w/o this series,
	   see [2] for the band aid attempt
    WARNING: possible circular locking dependency detected
    sh/3550 is trying to acquire lock:
    ((wq_completion)iavf){+.+.}-{0:0}, at: touch_wq_lockdep_map+0x26/0x90
        but task is already holding lock:
    (&amp;dev-&gt;lock){+.+.}-{4:4}, at: iavf_remove+0xa6/0x6e0 [iavf]
        which lock already depends on the new lock.

[1] fc2e6b3b132a ("iavf: Rework mutexes for better synchronisation")
[2] https://github.com/pkitszel/linux/commit/52dddbfc2bb60294083f5711a158a
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38311/">CVE-2025-38311 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38311">CVE-2025-38311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246376">SUSE bug 1246376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38312</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38312" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38312" ref_url="https://www.suse.com/security/cve/CVE-2025-38312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod()

In fb_find_mode_cvt(), iff mode-&gt;refresh somehow happens to be 0x80000000,
cvt.f_refresh will become 0 when multiplying it by 2 due to overflow. It's
then passed to fb_cvt_hperiod(), where it's used as a divider -- division
by 0 will result in kernel oops. Add a sanity check for cvt.f_refresh to
avoid such overflow...

Found by Linux Verification Center (linuxtesting.org) with the Svace static
analysis tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38312/">CVE-2025-38312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38312">CVE-2025-38312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246386">SUSE bug 1246386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38313</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38313" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38313" ref_url="https://www.suse.com/security/cve/CVE-2025-38313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: fsl-mc: fix double-free on mc_dev

The blamed commit tried to simplify how the deallocations are done but,
in the process, introduced a double-free on the mc_dev variable.

In case the MC device is a DPRC, a new mc_bus is allocated and the
mc_dev variable is just a reference to one of its fields. In this
circumstance, on the error path only the mc_bus should be freed.

This commit introduces back the following checkpatch warning which is a
false-positive.

WARNING: kfree(NULL) is safe and this check is probably not required
+       if (mc_bus)
+               kfree(mc_bus);
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38313/">CVE-2025-38313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38313">CVE-2025-38313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246342">SUSE bug 1246342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38315</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38315" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38315" ref_url="https://www.suse.com/security/cve/CVE-2025-38315" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btintel: Check dsbr size from EFI variable

Since the size of struct btintel_dsbr is already known, we can just
start there instead of querying the EFI variable size. If the final
result doesn't match what we expect also fail. This fixes a stack buffer
overflow when the EFI variable is larger than struct btintel_dsbr.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38315/">CVE-2025-38315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38315">CVE-2025-38315 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246333">SUSE bug 1246333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38317</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38317" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38317" ref_url="https://www.suse.com/security/cve/CVE-2025-38317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Fix buffer overflow in debugfs

If the user tries to write more than 32 bytes then it results in memory
corruption.  Fortunately, this is debugfs so it's limited to root users.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38317/">CVE-2025-38317 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38317">CVE-2025-38317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246443">SUSE bug 1246443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38318</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38318" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38318" ref_url="https://www.suse.com/security/cve/CVE-2025-38318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: arm-ni: Fix missing platform_set_drvdata()

Add missing platform_set_drvdata in arm_ni_probe(), otherwise
calling platform_get_drvdata() in remove returns NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38318/">CVE-2025-38318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38318">CVE-2025-38318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246444">SUSE bug 1246444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38319</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38319" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38319" ref_url="https://www.suse.com/security/cve/CVE-2025-38319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table

The function atomctrl_initialize_mc_reg_table() and
atomctrl_initialize_mc_reg_table_v2_2() does not check the return
value of smu_atom_get_data_table(). If smu_atom_get_data_table()
fails to retrieve vram_info, it returns NULL which is later
dereferenced.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38319/">CVE-2025-38319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38319">CVE-2025-38319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246243">SUSE bug 1246243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38321</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38321" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38321" ref_url="https://www.suse.com/security/cve/CVE-2025-38321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: Log an error when close_all_cached_dirs fails

Under low-memory conditions, close_all_cached_dirs() can't move the
dentries to a separate list to dput() them once the locks are dropped.
This will result in a "Dentry still in use" error, so add an error
message that makes it clear this is what happened:

[  495.281119] CIFS: VFS: \\otters.example.com\share Out of memory while dropping dentries
[  495.281595] ------------[ cut here ]------------
[  495.281887] BUG: Dentry ffff888115531138{i=78,n=/}  still in use (2) [unmount of cifs cifs]
[  495.282391] WARNING: CPU: 1 PID: 2329 at fs/dcache.c:1536 umount_check+0xc8/0xf0

Also, bail out of looping through all tcons as soon as a single
allocation fails, since we're already in trouble, and kmalloc() attempts
for subseqeuent tcons are likely to fail just like the first one did.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38321/">CVE-2025-38321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38321">CVE-2025-38321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246328">SUSE bug 1246328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38322</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38322" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38322" ref_url="https://www.suse.com/security/cve/CVE-2025-38322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel: Fix crash in icl_update_topdown_event()

The perf_fuzzer found a hard-lockup crash on a RaptorLake machine:

  Oops: general protection fault, maybe for address 0xffff89aeceab400: 0000
  CPU: 23 UID: 0 PID: 0 Comm: swapper/23
  Tainted: [W]=WARN
  Hardware name: Dell Inc. Precision 9660/0VJ762
  RIP: 0010:native_read_pmc+0x7/0x40
  Code: cc e8 8d a9 01 00 48 89 03 5b cd cc cc cc cc 0f 1f ...
  RSP: 000:fffb03100273de8 EFLAGS: 00010046
  ....
  Call Trace:
    &lt;TASK&gt;
    icl_update_topdown_event+0x165/0x190
    ? ktime_get+0x38/0xd0
    intel_pmu_read_event+0xf9/0x210
    __perf_event_read+0xf9/0x210

CPUs 16-23 are E-core CPUs that don't support the perf metrics feature.
The icl_update_topdown_event() should not be invoked on these CPUs.

It's a regression of commit:

  f9bdf1f95339 ("perf/x86/intel: Avoid disable PMU if !cpuc-&gt;enabled in sample read")

The bug introduced by that commit is that the is_topdown_event() function
is mistakenly used to replace the is_topdown_count() call to check if the
topdown functions for the perf metrics feature should be invoked.

Fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38322/">CVE-2025-38322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38322">CVE-2025-38322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246447">SUSE bug 1246447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38323</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38323" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38323" ref_url="https://www.suse.com/security/cve/CVE-2025-38323" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: atm: add lec_mutex

syzbot found its way in net/atm/lec.c, and found an error path
in lecd_attach() could leave a dangling pointer in dev_lec[].

Add a mutex to protect dev_lecp[] uses from lecd_attach(),
lec_vcc_attach() and lec_mcast_attach().

Following patch will use this mutex for /proc/net/atm/lec.

BUG: KASAN: slab-use-after-free in lecd_attach net/atm/lec.c:751 [inline]
BUG: KASAN: slab-use-after-free in lane_ioctl+0x2224/0x23e0 net/atm/lec.c:1008
Read of size 8 at addr ffff88807c7b8e68 by task syz.1.17/6142

CPU: 1 UID: 0 PID: 6142 Comm: syz.1.17 Not tainted 6.16.0-rc1-syzkaller-00239-g08215f5486ec #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:94 [inline]
  dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
  print_address_description mm/kasan/report.c:408 [inline]
  print_report+0xcd/0x680 mm/kasan/report.c:521
  kasan_report+0xe0/0x110 mm/kasan/report.c:634
  lecd_attach net/atm/lec.c:751 [inline]
  lane_ioctl+0x2224/0x23e0 net/atm/lec.c:1008
  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159
  sock_do_ioctl+0x118/0x280 net/socket.c:1190
  sock_ioctl+0x227/0x6b0 net/socket.c:1311
  vfs_ioctl fs/ioctl.c:51 [inline]
  __do_sys_ioctl fs/ioctl.c:907 [inline]
  __se_sys_ioctl fs/ioctl.c:893 [inline]
  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
 &lt;/TASK&gt;

Allocated by task 6132:
  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
  kasan_save_track+0x14/0x30 mm/kasan/common.c:68
  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394
  kasan_kmalloc include/linux/kasan.h:260 [inline]
  __do_kmalloc_node mm/slub.c:4328 [inline]
  __kvmalloc_node_noprof+0x27b/0x620 mm/slub.c:5015
  alloc_netdev_mqs+0xd2/0x1570 net/core/dev.c:11711
  lecd_attach net/atm/lec.c:737 [inline]
  lane_ioctl+0x17db/0x23e0 net/atm/lec.c:1008
  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159
  sock_do_ioctl+0x118/0x280 net/socket.c:1190
  sock_ioctl+0x227/0x6b0 net/socket.c:1311
  vfs_ioctl fs/ioctl.c:51 [inline]
  __do_sys_ioctl fs/ioctl.c:907 [inline]
  __se_sys_ioctl fs/ioctl.c:893 [inline]
  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 6132:
  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
  kasan_save_track+0x14/0x30 mm/kasan/common.c:68
  kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:576
  poison_slab_object mm/kasan/common.c:247 [inline]
  __kasan_slab_free+0x51/0x70 mm/kasan/common.c:264
  kasan_slab_free include/linux/kasan.h:233 [inline]
  slab_free_hook mm/slub.c:2381 [inline]
  slab_free mm/slub.c:4643 [inline]
  kfree+0x2b4/0x4d0 mm/slub.c:4842
  free_netdev+0x6c5/0x910 net/core/dev.c:11892
  lecd_attach net/atm/lec.c:744 [inline]
  lane_ioctl+0x1ce8/0x23e0 net/atm/lec.c:1008
  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159
  sock_do_ioctl+0x118/0x280 net/socket.c:1190
  sock_ioctl+0x227/0x6b0 net/socket.c:1311
  vfs_ioctl fs/ioctl.c:51 [inline]
  __do_sys_ioctl fs/ioctl.c:907 [inline]
  __se_sys_ioctl fs/ioctl.c:893 [inline]
  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38323/">CVE-2025-38323 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38323">CVE-2025-38323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246473">SUSE bug 1246473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246525">SUSE bug 1246525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38326</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38326" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38326" ref_url="https://www.suse.com/security/cve/CVE-2025-38326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

aoe: clean device rq_list in aoedev_downdev()

An aoe device's rq_list contains accepted block requests that are
waiting to be transmitted to the aoe target. This queue was added as
part of the conversion to blk_mq. However, the queue was not cleaned out
when an aoe device is downed which caused blk_mq_freeze_queue() to sleep
indefinitely waiting for those requests to complete, causing a hang. This
fix cleans out the queue before calling blk_mq_freeze_queue().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38326/">CVE-2025-38326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38326">CVE-2025-38326 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246490">SUSE bug 1246490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38332</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38332" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38332" ref_url="https://www.suse.com/security/cve/CVE-2025-38332" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:3453" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002049.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15008" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001974.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15648" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001998.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15661" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Use memcpy() for BIOS version

The strlcat() with FORTIFY support is triggering a panic because it
thinks the target buffer will overflow although the correct target
buffer size is passed in.

Anyway, instead of memset() with 0 followed by a strlcat(), just use
memcpy() and ensure that the resulting buffer is NULL terminated.

BIOSVersion is only used for the lpfc_printf_log() which expects a
properly terminated string.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38332/">CVE-2025-38332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38332">CVE-2025-38332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246375">SUSE bug 1246375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38335</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38335" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38335" ref_url="https://www.suse.com/security/cve/CVE-2025-38335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: gpio-keys - fix a sleep while atomic with PREEMPT_RT

When enabling PREEMPT_RT, the gpio_keys_irq_timer() callback runs in
hard irq context, but the input_event() takes a spin_lock, which isn't
allowed there as it is converted to a rt_spin_lock().

[ 4054.289999] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48
[ 4054.290028] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 0, name: swapper/0
...
[ 4054.290195]  __might_resched+0x13c/0x1f4
[ 4054.290209]  rt_spin_lock+0x54/0x11c
[ 4054.290219]  input_event+0x48/0x80
[ 4054.290230]  gpio_keys_irq_timer+0x4c/0x78
[ 4054.290243]  __hrtimer_run_queues+0x1a4/0x438
[ 4054.290257]  hrtimer_interrupt+0xe4/0x240
[ 4054.290269]  arch_timer_handler_phys+0x2c/0x44
[ 4054.290283]  handle_percpu_devid_irq+0x8c/0x14c
[ 4054.290297]  handle_irq_desc+0x40/0x58
[ 4054.290307]  generic_handle_domain_irq+0x1c/0x28
[ 4054.290316]  gic_handle_irq+0x44/0xcc

Considering the gpio_keys_irq_isr() can run in any context, e.g. it can
be threaded, it seems there's no point in requesting the timer isr to
run in hard irq context.

Relax the hrtimer not to use the hard context.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38335/">CVE-2025-38335 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38335">CVE-2025-38335 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246250">SUSE bug 1246250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38336</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38336" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38336" ref_url="https://www.suse.com/security/cve/CVE-2025-38336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330

The controller has a hardware bug that can hard hang the system when
doing ATAPI DMAs without any trace of what happened. Depending on the
device attached, it can also prevent the system from booting.

In this case, the system hangs when reading the ATIP from optical media
with cdrecord -vvv -atip on an _NEC DVD_RW ND-4571A 1-01 and an
Optiarc DVD RW AD-7200A 1.06 attached to an ASRock 990FX Extreme 4,
running at UDMA/33.

The issue can be reproduced by running the same command with a cygwin
build of cdrecord on WinXP, although it requires more attempts to cause
it. The hang in that case is also resolved by forcing PIO. It doesn't
appear that VIA has produced any drivers for that OS, thus no known
workaround exists.

HDDs attached to the controller do not suffer from any DMA issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38336/">CVE-2025-38336 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38336">CVE-2025-38336 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246370">SUSE bug 1246370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38337</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38337" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38337" ref_url="https://www.suse.com/security/cve/CVE-2025-38337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata()

Since handle-&gt;h_transaction may be a NULL pointer, so we should change it
to call is_handle_aborted(handle) first before dereferencing it.

And the following data-race was reported in my fuzzer:

==================================================================
BUG: KCSAN: data-race in jbd2_journal_dirty_metadata / jbd2_journal_dirty_metadata

write to 0xffff888011024104 of 4 bytes by task 10881 on cpu 1:
 jbd2_journal_dirty_metadata+0x2a5/0x770 fs/jbd2/transaction.c:1556
 __ext4_handle_dirty_metadata+0xe7/0x4b0 fs/ext4/ext4_jbd2.c:358
 ext4_do_update_inode fs/ext4/inode.c:5220 [inline]
 ext4_mark_iloc_dirty+0x32c/0xd50 fs/ext4/inode.c:5869
 __ext4_mark_inode_dirty+0xe1/0x450 fs/ext4/inode.c:6074
 ext4_dirty_inode+0x98/0xc0 fs/ext4/inode.c:6103
....

read to 0xffff888011024104 of 4 bytes by task 10880 on cpu 0:
 jbd2_journal_dirty_metadata+0xf2/0x770 fs/jbd2/transaction.c:1512
 __ext4_handle_dirty_metadata+0xe7/0x4b0 fs/ext4/ext4_jbd2.c:358
 ext4_do_update_inode fs/ext4/inode.c:5220 [inline]
 ext4_mark_iloc_dirty+0x32c/0xd50 fs/ext4/inode.c:5869
 __ext4_mark_inode_dirty+0xe1/0x450 fs/ext4/inode.c:6074
 ext4_dirty_inode+0x98/0xc0 fs/ext4/inode.c:6103
....

value changed: 0x00000000 -&gt; 0x00000001
==================================================================

This issue is caused by missing data-race annotation for jh-&gt;b_modified.
Therefore, the missing annotation needs to be added.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38337/">CVE-2025-38337 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38337">CVE-2025-38337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246253">SUSE bug 1246253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38338</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38338" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38338" ref_url="https://www.suse.com/security/cve/CVE-2025-38338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/nfs/read: fix double-unlock bug in nfs_return_empty_folio()

Sometimes, when a file was read while it was being truncated by
another NFS client, the kernel could deadlock because folio_unlock()
was called twice, and the second call would XOR back the `PG_locked`
flag.

Most of the time (depending on the timing of the truncation), nobody
notices the problem because folio_unlock() gets called three times,
which flips `PG_locked` back off:

 1. vfs_read, nfs_read_folio, ... nfs_read_add_folio,
    nfs_return_empty_folio
 2. vfs_read, nfs_read_folio, ... netfs_read_collection,
    netfs_unlock_abandoned_read_pages
 3. vfs_read, ... nfs_do_read_folio, nfs_read_add_folio,
    nfs_return_empty_folio

The problem is that nfs_read_add_folio() is not supposed to unlock the
folio if fscache is enabled, and a nfs_netfs_folio_unlock() check is
missing in nfs_return_empty_folio().

Rarely this leads to a warning in netfs_read_collection():

 ------------[ cut here ]------------
 R=0000031c: folio 10 is not locked
 WARNING: CPU: 0 PID: 29 at fs/netfs/read_collect.c:133 netfs_read_collection+0x7c0/0xf00
 [...]
 Workqueue: events_unbound netfs_read_collection_worker
 RIP: 0010:netfs_read_collection+0x7c0/0xf00
 [...]
 Call Trace:
  &lt;TASK&gt;
  netfs_read_collection_worker+0x67/0x80
  process_one_work+0x12e/0x2c0
  worker_thread+0x295/0x3a0

Most of the time, however, processes just get stuck forever in
folio_wait_bit_common(), waiting for `PG_locked` to disappear, which
never happens because nobody is really holding the folio lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38338/">CVE-2025-38338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38338">CVE-2025-38338 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246258">SUSE bug 1246258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38339</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38339" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38339" ref_url="https://www.suse.com/security/cve/CVE-2025-38339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/bpf: fix JIT code size calculation of bpf trampoline

arch_bpf_trampoline_size() provides JIT size of the BPF trampoline
before the buffer for JIT'ing it is allocated. The total number of
instructions emitted for BPF trampoline JIT code depends on where
the final image is located. So, the size arrived at with the dummy
pass in arch_bpf_trampoline_size() can vary from the actual size
needed in  arch_prepare_bpf_trampoline().  When the instructions
accounted in  arch_bpf_trampoline_size() is less than the number of
instructions emitted during the actual JIT compile of the trampoline,
the below warning is produced:

  WARNING: CPU: 8 PID: 204190 at arch/powerpc/net/bpf_jit_comp.c:981 __arch_prepare_bpf_trampoline.isra.0+0xd2c/0xdcc

which is:

  /* Make sure the trampoline generation logic doesn't overflow */
  if (image &amp;&amp; WARN_ON_ONCE(&amp;image[ctx-&gt;idx] &gt;
  			(u32 *)rw_image_end - BPF_INSN_SAFETY)) {

So, during the dummy pass, instead of providing some arbitrary image
location, account for maximum possible instructions if and when there
is a dependency with image location for JIT'ing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38339/">CVE-2025-38339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38339">CVE-2025-38339 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246259">SUSE bug 1246259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38341</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38341" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38341" ref_url="https://www.suse.com/security/cve/CVE-2025-38341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

eth: fbnic: avoid double free when failing to DMA-map FW msg

The semantics are that caller of fbnic_mbx_map_msg() retains
the ownership of the message on error. All existing callers
dutifully free the page.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38341/">CVE-2025-38341 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38341">CVE-2025-38341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246260">SUSE bug 1246260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38342</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38342" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38342" ref_url="https://www.suse.com/security/cve/CVE-2025-38342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

software node: Correct a OOB check in software_node_get_reference_args()

software_node_get_reference_args() wants to get @index-th element, so
the property value requires at least '(index + 1) * sizeof(*ref)' bytes
but that can not be guaranteed by current OOB check, and may cause OOB
for malformed property.

Fix by using as OOB check '((index + 1) * sizeof(*ref) &gt; prop-&gt;length)'.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38342/">CVE-2025-38342 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38342">CVE-2025-38342 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246453">SUSE bug 1246453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38343</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38343" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38343" ref_url="https://www.suse.com/security/cve/CVE-2025-38343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7996: drop fragments with multicast or broadcast RA

IEEE 802.11 fragmentation can only be applied to unicast frames.
Therefore, drop fragments with multicast or broadcast RA. This patch
addresses vulnerabilities such as CVE-2020-26145.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-38343/">CVE-2025-38343 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38343">CVE-2025-38343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246438">SUSE bug 1246438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38344</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38344" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38344" ref_url="https://www.suse.com/security/cve/CVE-2025-38344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPICA: fix acpi parse and parseext cache leaks

ACPICA commit 8829e70e1360c81e7a5a901b5d4f48330e021ea5

I'm Seunghun Han, and I work for National Security Research Institute of
South Korea.

I have been doing a research on ACPI and found an ACPI cache leak in ACPI
early abort cases.

Boot log of ACPI cache leak is as follows:
[    0.352414] ACPI: Added _OSI(Module Device)
[    0.353182] ACPI: Added _OSI(Processor Device)
[    0.353182] ACPI: Added _OSI(3.0 _SCP Extensions)
[    0.353182] ACPI: Added _OSI(Processor Aggregator Device)
[    0.356028] ACPI: Unable to start the ACPI Interpreter
[    0.356799] ACPI Error: Could not remove SCI handler (20170303/evmisc-281)
[    0.360215] kmem_cache_destroy Acpi-State: Slab cache still has objects
[    0.360648] CPU: 0 PID: 1 Comm: swapper/0 Tainted: G        W
4.12.0-rc4-next-20170608+ #10
[    0.361273] Hardware name: innotek gmb_h virtual_box/virtual_box, BIOS
virtual_box 12/01/2006
[    0.361873] Call Trace:
[    0.362243]  ? dump_stack+0x5c/0x81
[    0.362591]  ? kmem_cache_destroy+0x1aa/0x1c0
[    0.362944]  ? acpi_sleep_proc_init+0x27/0x27
[    0.363296]  ? acpi_os_delete_cache+0xa/0x10
[    0.363646]  ? acpi_ut_delete_caches+0x6d/0x7b
[    0.364000]  ? acpi_terminate+0xa/0x14
[    0.364000]  ? acpi_init+0x2af/0x34f
[    0.364000]  ? __class_create+0x4c/0x80
[    0.364000]  ? video_setup+0x7f/0x7f
[    0.364000]  ? acpi_sleep_proc_init+0x27/0x27
[    0.364000]  ? do_one_initcall+0x4e/0x1a0
[    0.364000]  ? kernel_init_freeable+0x189/0x20a
[    0.364000]  ? rest_init+0xc0/0xc0
[    0.364000]  ? kernel_init+0xa/0x100
[    0.364000]  ? ret_from_fork+0x25/0x30

I analyzed this memory leak in detail. I found that “Acpi-State” cache and
“Acpi-Parse” cache were merged because the size of cache objects was same
slab cache size.

I finally found “Acpi-Parse” cache and “Acpi-parse_ext” cache were leaked
using SLAB_NEVER_MERGE flag in kmem_cache_create() function.

Real ACPI cache leak point is as follows:
[    0.360101] ACPI: Added _OSI(Module Device)
[    0.360101] ACPI: Added _OSI(Processor Device)
[    0.360101] ACPI: Added _OSI(3.0 _SCP Extensions)
[    0.361043] ACPI: Added _OSI(Processor Aggregator Device)
[    0.364016] ACPI: Unable to start the ACPI Interpreter
[    0.365061] ACPI Error: Could not remove SCI handler (20170303/evmisc-281)
[    0.368174] kmem_cache_destroy Acpi-Parse: Slab cache still has objects
[    0.369332] CPU: 1 PID: 1 Comm: swapper/0 Tainted: G        W
4.12.0-rc4-next-20170608+ #8
[    0.371256] Hardware name: innotek gmb_h virtual_box/virtual_box, BIOS
virtual_box 12/01/2006
[    0.372000] Call Trace:
[    0.372000]  ? dump_stack+0x5c/0x81
[    0.372000]  ? kmem_cache_destroy+0x1aa/0x1c0
[    0.372000]  ? acpi_sleep_proc_init+0x27/0x27
[    0.372000]  ? acpi_os_delete_cache+0xa/0x10
[    0.372000]  ? acpi_ut_delete_caches+0x56/0x7b
[    0.372000]  ? acpi_terminate+0xa/0x14
[    0.372000]  ? acpi_init+0x2af/0x34f
[    0.372000]  ? __class_create+0x4c/0x80
[    0.372000]  ? video_setup+0x7f/0x7f
[    0.372000]  ? acpi_sleep_proc_init+0x27/0x27
[    0.372000]  ? do_one_initcall+0x4e/0x1a0
[    0.372000]  ? kernel_init_freeable+0x189/0x20a
[    0.372000]  ? rest_init+0xc0/0xc0
[    0.372000]  ? kernel_init+0xa/0x100
[    0.372000]  ? ret_from_fork+0x25/0x30
[    0.388039] kmem_cache_destroy Acpi-parse_ext: Slab cache still has objects
[    0.389063] CPU: 1 PID: 1 Comm: swapper/0 Tainted: G        W
4.12.0-rc4-next-20170608+ #8
[    0.390557] Hardware name: innotek gmb_h virtual_box/virtual_box, BIOS
virtual_box 12/01/2006
[    0.392000] Call Trace:
[    0.392000]  ? dump_stack+0x5c/0x81
[    0.392000]  ? kmem_cache_destroy+0x1aa/0x1c0
[    0.392000]  ? acpi_sleep_proc_init+0x27/0x27
[    0.392000]  ? acpi_os_delete_cache+0xa/0x10
[    0.392000]  ? acpi_ut_delete_caches+0x6d/0x7b
[    0.392000]  ? acpi_terminate+0xa/0x14
[    0.392000]  ? acpi_init+0x2af/0x3
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38344/">CVE-2025-38344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38344">CVE-2025-38344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246334">SUSE bug 1246334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38345</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38345" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38345" ref_url="https://www.suse.com/security/cve/CVE-2025-38345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPICA: fix acpi operand cache leak in dswstate.c

ACPICA commit 987a3b5cf7175916e2a4b6ea5b8e70f830dfe732

I found an ACPI cache leak in ACPI early termination and boot continuing case.

When early termination occurs due to malicious ACPI table, Linux kernel
terminates ACPI function and continues to boot process. While kernel terminates
ACPI function, kmem_cache_destroy() reports Acpi-Operand cache leak.

Boot log of ACPI operand cache leak is as follows:
&gt;[    0.585957] ACPI: Added _OSI(Module Device)
&gt;[    0.587218] ACPI: Added _OSI(Processor Device)
&gt;[    0.588530] ACPI: Added _OSI(3.0 _SCP Extensions)
&gt;[    0.589790] ACPI: Added _OSI(Processor Aggregator Device)
&gt;[    0.591534] ACPI Error: Illegal I/O port address/length above 64K: C806E00000004002/0x2 (20170303/hwvalid-155)
&gt;[    0.594351] ACPI Exception: AE_LIMIT, Unable to initialize fixed events (20170303/evevent-88)
&gt;[    0.597858] ACPI: Unable to start the ACPI Interpreter
&gt;[    0.599162] ACPI Error: Could not remove SCI handler (20170303/evmisc-281)
&gt;[    0.601836] kmem_cache_destroy Acpi-Operand: Slab cache still has objects
&gt;[    0.603556] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 4.12.0-rc5 #26
&gt;[    0.605159] Hardware name: innotek gmb_h virtual_box/virtual_box, BIOS virtual_box 12/01/2006
&gt;[    0.609177] Call Trace:
&gt;[    0.610063]  ? dump_stack+0x5c/0x81
&gt;[    0.611118]  ? kmem_cache_destroy+0x1aa/0x1c0
&gt;[    0.612632]  ? acpi_sleep_proc_init+0x27/0x27
&gt;[    0.613906]  ? acpi_os_delete_cache+0xa/0x10
&gt;[    0.617986]  ? acpi_ut_delete_caches+0x3f/0x7b
&gt;[    0.619293]  ? acpi_terminate+0xa/0x14
&gt;[    0.620394]  ? acpi_init+0x2af/0x34f
&gt;[    0.621616]  ? __class_create+0x4c/0x80
&gt;[    0.623412]  ? video_setup+0x7f/0x7f
&gt;[    0.624585]  ? acpi_sleep_proc_init+0x27/0x27
&gt;[    0.625861]  ? do_one_initcall+0x4e/0x1a0
&gt;[    0.627513]  ? kernel_init_freeable+0x19e/0x21f
&gt;[    0.628972]  ? rest_init+0x80/0x80
&gt;[    0.630043]  ? kernel_init+0xa/0x100
&gt;[    0.631084]  ? ret_from_fork+0x25/0x30
&gt;[    0.633343] vgaarb: loaded
&gt;[    0.635036] EDAC MC: Ver: 3.0.0
&gt;[    0.638601] PCI: Probing PCI hardware
&gt;[    0.639833] PCI host bridge to bus 0000:00
&gt;[    0.641031] pci_bus 0000:00: root bus resource [io  0x0000-0xffff]
&gt; ... Continue to boot and log is omitted ...

I analyzed this memory leak in detail and found acpi_ds_obj_stack_pop_and_
delete() function miscalculated the top of the stack. acpi_ds_obj_stack_push()
function uses walk_state-&gt;operand_index for start position of the top, but
acpi_ds_obj_stack_pop_and_delete() function considers index 0 for it.
Therefore, this causes acpi operand memory leak.

This cache leak causes a security threat because an old kernel (&lt;= 4.9) shows
memory locations of kernel functions in stack dump. Some malicious users
could use this information to neutralize kernel ASLR.

I made a patch to fix ACPI operand cache leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38345/">CVE-2025-38345 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38345">CVE-2025-38345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246337">SUSE bug 1246337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38348</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38348" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38348" ref_url="https://www.suse.com/security/cve/CVE-2025-38348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback()

Robert Morris reported:

|If a malicious USB device pretends to be an Intersil p54 wifi
|interface and generates an eeprom_readback message with a large
|eeprom-&gt;v1.len, p54_rx_eeprom_readback() will copy data from the
|message beyond the end of priv-&gt;eeprom.
|
|static void p54_rx_eeprom_readback(struct p54_common *priv,
|                                   struct sk_buff *skb)
|{
|        struct p54_hdr *hdr = (struct p54_hdr *) skb-&gt;data;
|        struct p54_eeprom_lm86 *eeprom = (struct p54_eeprom_lm86 *) hdr-&gt;data;
|
|        if (priv-&gt;fw_var &gt;= 0x509) {
|                memcpy(priv-&gt;eeprom, eeprom-&gt;v2.data,
|                       le16_to_cpu(eeprom-&gt;v2.len));
|        } else {
|                memcpy(priv-&gt;eeprom, eeprom-&gt;v1.data,
|                       le16_to_cpu(eeprom-&gt;v1.len));
|        }
| [...]

The eeprom-&gt;v{1,2}.len is set by the driver in p54_download_eeprom().
The device is supposed to provide the same length back to the driver.
But yes, it's possible (like shown in the report) to alter the value
to something that causes a crash/panic due to overrun.

This patch addresses the issue by adding the size to the common device
context, so p54_rx_eeprom_readback no longer relies on possibly tampered
values... That said, it also checks if the "firmware" altered the value
and no longer copies them.

The one, small saving grace is: Before the driver tries to read the eeprom,
it needs to upload &gt;a&lt; firmware. the vendor firmware has a proprietary
license and as a reason, it is not present on most distributions by
default.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38348/">CVE-2025-38348 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38348">CVE-2025-38348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246262">SUSE bug 1246262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38349</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38349" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38349" ref_url="https://www.suse.com/security/cve/CVE-2025-38349" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

eventpoll: don't decrement ep refcount while still holding the ep mutex

Jann Horn points out that epoll is decrementing the ep refcount and then
doing a

    mutex_unlock(&amp;ep-&gt;mtx);

afterwards. That's very wrong, because it can lead to a use-after-free.

That pattern is actually fine for the very last reference, because the
code in question will delay the actual call to "ep_free(ep)" until after
it has unlocked the mutex.

But it's wrong for the much subtler "next to last" case when somebody
*else* may also be dropping their reference and free the ep while we're
still using the mutex.

Note that this is true even if that other user is also using the same ep
mutex: mutexes, unlike spinlocks, can not be used for object ownership,
even if they guarantee mutual exclusion.

A mutex "unlock" operation is not atomic, and as one user is still
accessing the mutex as part of unlocking it, another user can come in
and get the now released mutex and free the data structure while the
first user is still cleaning up.

See our mutex documentation in Documentation/locking/mutex-design.rst,
in particular the section [1] about semantics:

	"mutex_unlock() may access the mutex structure even after it has
	 internally released the lock already - so it's not safe for
	 another context to acquire the mutex and assume that the
	 mutex_unlock() context is not using the structure anymore"

So if we drop our ep ref before the mutex unlock, but we weren't the
last one, we may then unlock the mutex, another user comes in, drops
_their_ reference and releases the 'ep' as it now has no users - all
while the mutex_unlock() is still accessing it.

Fix this by simply moving the ep refcount dropping to outside the mutex:
the refcount itself is atomic, and doesn't need mutex protection (that's
the whole _point_ of refcounts: unlike mutexes, they are inherently
about object lifetimes).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38349/">CVE-2025-38349 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38349">CVE-2025-38349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246777">SUSE bug 1246777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38350</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38350" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38350" ref_url="https://www.suse.com/security/cve/CVE-2025-38350" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15785" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Always pass notifications when child class becomes empty

Certain classful qdiscs may invoke their classes' dequeue handler on an
enqueue operation. This may unexpectedly empty the child qdisc and thus
make an in-flight class passive via qlen_notify(). Most qdiscs do not
expect such behaviour at this point in time and may re-activate the
class eventually anyways which will lead to a use-after-free.

The referenced fix commit attempted to fix this behavior for the HFSC
case by moving the backlog accounting around, though this turned out to
be incomplete since the parent's parent may run into the issue too.
The following reproducer demonstrates this use-after-free:

    tc qdisc add dev lo root handle 1: drr
    tc filter add dev lo parent 1: basic classid 1:1
    tc class add dev lo parent 1: classid 1:1 drr
    tc qdisc add dev lo parent 1:1 handle 2: hfsc def 1
    tc class add dev lo parent 2: classid 2:1 hfsc rt m1 8 d 1 m2 0
    tc qdisc add dev lo parent 2:1 handle 3: netem
    tc qdisc add dev lo parent 3:1 handle 4: blackhole

    echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888
    tc class delete dev lo classid 1:1
    echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888

Since backlog accounting issues leading to a use-after-frees on stale
class pointers is a recurring pattern at this point, this patch takes
a different approach. Instead of trying to fix the accounting, the patch
ensures that qdisc_tree_reduce_backlog always calls qlen_notify when
the child qdisc is empty. This solves the problem because deletion of
qdiscs always involves a call to qdisc_reset() and / or
qdisc_purge_queue() which ultimately resets its qlen to 0 thus causing
the following qdisc_tree_reduce_backlog() to report to the parent. Note
that this may call qlen_notify on passive classes multiple times. This
is not a problem after the recent patch series that made all the
classful qdiscs qlen_notify() handlers idempotent.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38350/">CVE-2025-38350 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38350">CVE-2025-38350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246781">SUSE bug 1246781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247043">SUSE bug 1247043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38351</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38351" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38351" ref_url="https://www.suse.com/security/cve/CVE-2025-38351" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17377" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002061.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush

In KVM guests with Hyper-V hypercalls enabled, the hypercalls
HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST and HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST_EX
allow a guest to request invalidation of portions of a virtual TLB.
For this, the hypercall parameter includes a list of GVAs that are supposed
to be invalidated.

However, when non-canonical GVAs are passed, there is currently no
filtering in place and they are eventually passed to checked invocations of
INVVPID on Intel / INVLPGA on AMD.  While AMD's INVLPGA silently ignores
non-canonical addresses (effectively a no-op), Intel's INVVPID explicitly
signals VM-Fail and ultimately triggers the WARN_ONCE in invvpid_error():

  invvpid failed: ext=0x0 vpid=1 gva=0xaaaaaaaaaaaaa000
  WARNING: CPU: 6 PID: 326 at arch/x86/kvm/vmx/vmx.c:482
  invvpid_error+0x91/0xa0 [kvm_intel]
  Modules linked in: kvm_intel kvm 9pnet_virtio irqbypass fuse
  CPU: 6 UID: 0 PID: 326 Comm: kvm-vm Not tainted 6.15.0 #14 PREEMPT(voluntary)
  RIP: 0010:invvpid_error+0x91/0xa0 [kvm_intel]
  Call Trace:
    vmx_flush_tlb_gva+0x320/0x490 [kvm_intel]
    kvm_hv_vcpu_flush_tlb+0x24f/0x4f0 [kvm]
    kvm_arch_vcpu_ioctl_run+0x3013/0x5810 [kvm]

Hyper-V documents that invalid GVAs (those that are beyond a partition's
GVA space) are to be ignored.  While not completely clear whether this
ruling also applies to non-canonical GVAs, it is likely fine to make that
assumption, and manual testing on Azure confirms "real" Hyper-V interprets
the specification in the same way.

Skip non-canonical GVAs when processing the list of address to avoid
tripping the INVVPID failure.  Alternatively, KVM could filter out "bad"
GVAs before inserting into the FIFO, but practically speaking the only
downside of pushing validation to the final processing is that doing so
is suboptimal for the guest, and no well-behaved guest will request TLB
flushes for non-canonical addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38351/">CVE-2025-38351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38351">CVE-2025-38351 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246782">SUSE bug 1246782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38352</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38352" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38352" ref_url="https://www.suse.com/security/cve/CVE-2025-38352" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:3453" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002049.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15471" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001992.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15648" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001998.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15661" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20457-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20458-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20460-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20464-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024655.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()

If an exiting non-autoreaping task has already passed exit_notify() and
calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent
or debugger right after unlock_task_sighand().

If a concurrent posix_cpu_timer_del() runs at that moment, it won't be
able to detect timer-&gt;it.cpu.firing != 0: cpu_timer_task_rcu() and/or
lock_task_sighand() will fail.

Add the tsk-&gt;exit_state check into run_posix_cpu_timers() to fix this.

This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because
exit_task_work() is called before exit_notify(). But the check still
makes sense, task_work_add(&amp;tsk-&gt;posix_cputimers_work.work) will fail
anyway in this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38352/">CVE-2025-38352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38352">CVE-2025-38352 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246911">SUSE bug 1246911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249205">SUSE bug 1249205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047551" comment="kernel-livepatch-6_12_0-160000_5-default-7-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047556" comment="kernel-livepatch-6_12_0-160000_5-rt-5-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38353</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38353" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38353" ref_url="https://www.suse.com/security/cve/CVE-2025-38353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Fix taking invalid lock on wedge

If device wedges on e.g. GuC upload, the submission is not yet enabled
and the state is not even initialized. Protect the wedge call so it does
nothing in this case. It fixes the following splat:

	[] xe 0000:bf:00.0: [drm] device wedged, needs recovery
	[] ------------[ cut here ]------------
	[] DEBUG_LOCKS_WARN_ON(lock-&gt;magic != lock)
	[] WARNING: CPU: 48 PID: 312 at kernel/locking/mutex.c:564 __mutex_lock+0x8a1/0xe60
	...
	[] RIP: 0010:__mutex_lock+0x8a1/0xe60
	[]  mutex_lock_nested+0x1b/0x30
	[]  xe_guc_submit_wedge+0x80/0x2b0 [xe]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38353/">CVE-2025-38353 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38353">CVE-2025-38353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247265">SUSE bug 1247265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38354</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38354" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38354" ref_url="https://www.suse.com/security/cve/CVE-2025-38354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/gpu: Fix crash when throttling GPU immediately during boot

There is a small chance that the GPU is already hot during boot. In that
case, the call to of_devfreq_cooling_register() will immediately try to
apply devfreq cooling, as seen in the following crash:

  Unable to handle kernel paging request at virtual address 0000000000014110
  pc : a6xx_gpu_busy+0x1c/0x58 [msm]
  lr : msm_devfreq_get_dev_status+0xbc/0x140 [msm]
  Call trace:
   a6xx_gpu_busy+0x1c/0x58 [msm] (P)
   devfreq_simple_ondemand_func+0x3c/0x150
   devfreq_update_target+0x44/0xd8
   qos_max_notifier_call+0x30/0x84
   blocking_notifier_call_chain+0x6c/0xa0
   pm_qos_update_target+0xd0/0x110
   freq_qos_apply+0x3c/0x74
   apply_constraint+0x88/0x148
   __dev_pm_qos_update_request+0x7c/0xcc
   dev_pm_qos_update_request+0x38/0x5c
   devfreq_cooling_set_cur_state+0x98/0xf0
   __thermal_cdev_update+0x64/0xb4
   thermal_cdev_update+0x4c/0x58
   step_wise_manage+0x1f0/0x318
   __thermal_zone_device_update+0x278/0x424
   __thermal_cooling_device_register+0x2bc/0x308
   thermal_of_cooling_device_register+0x10/0x1c
   of_devfreq_cooling_register_power+0x240/0x2bc
   of_devfreq_cooling_register+0x14/0x20
   msm_devfreq_init+0xc4/0x1a0 [msm]
   msm_gpu_init+0x304/0x574 [msm]
   adreno_gpu_init+0x1c4/0x2e0 [msm]
   a6xx_gpu_init+0x5c8/0x9c8 [msm]
   adreno_bind+0x2a8/0x33c [msm]
   ...

At this point we haven't initialized the GMU at all yet, so we cannot read
the GMU registers inside a6xx_gpu_busy(). A similar issue was fixed before
in commit 6694482a70e9 ("drm/msm: Avoid unclocked GMU register access in
6xx gpu_busy"): msm_devfreq_init() does call devfreq_suspend_device(), but
unlike msm_devfreq_suspend(), it doesn't set the df-&gt;suspended flag
accordingly. This means the df-&gt;suspended flag does not match the actual
devfreq state after initialization and msm_devfreq_get_dev_status() will
end up accessing GMU registers, causing the crash.

Fix this by setting df-&gt;suspended correctly during initialization.

Patchwork: https://patchwork.freedesktop.org/patch/650772/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38354/">CVE-2025-38354 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38354">CVE-2025-38354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247061">SUSE bug 1247061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38355</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38355" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38355" ref_url="https://www.suse.com/security/cve/CVE-2025-38355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Process deferred GGTT node removals on device unwind

While we are indirectly draining our dedicated workqueue ggtt-&gt;wq
that we use to complete asynchronous removal of some GGTT nodes,
this happends as part of the managed-drm unwinding (ggtt_fini_early),
which could be later then manage-device unwinding, where we could
already unmap our MMIO/GMS mapping (mmio_fini).

This was recently observed during unsuccessful VF initialization:

 [ ] xe 0000:00:02.1: probe with driver xe failed with error -62
 [ ] xe 0000:00:02.1: DEVRES REL ffff88811e747340 __xe_bo_unpin_map_no_vm (16 bytes)
 [ ] xe 0000:00:02.1: DEVRES REL ffff88811e747540 __xe_bo_unpin_map_no_vm (16 bytes)
 [ ] xe 0000:00:02.1: DEVRES REL ffff88811e747240 __xe_bo_unpin_map_no_vm (16 bytes)
 [ ] xe 0000:00:02.1: DEVRES REL ffff88811e747040 tiles_fini (16 bytes)
 [ ] xe 0000:00:02.1: DEVRES REL ffff88811e746840 mmio_fini (16 bytes)
 [ ] xe 0000:00:02.1: DEVRES REL ffff88811e747f40 xe_bo_pinned_fini (16 bytes)
 [ ] xe 0000:00:02.1: DEVRES REL ffff88811e746b40 devm_drm_dev_init_release (16 bytes)
 [ ] xe 0000:00:02.1: [drm:drm_managed_release] drmres release begin
 [ ] xe 0000:00:02.1: [drm:drm_managed_release] REL ffff88810ef81640 __fini_relay (8 bytes)
 [ ] xe 0000:00:02.1: [drm:drm_managed_release] REL ffff88810ef80d40 guc_ct_fini (8 bytes)
 [ ] xe 0000:00:02.1: [drm:drm_managed_release] REL ffff88810ef80040 __drmm_mutex_release (8 bytes)
 [ ] xe 0000:00:02.1: [drm:drm_managed_release] REL ffff88810ef80140 ggtt_fini_early (8 bytes)

and this was leading to:

 [ ] BUG: unable to handle page fault for address: ffffc900058162a0
 [ ] #PF: supervisor write access in kernel mode
 [ ] #PF: error_code(0x0002) - not-present page
 [ ] Oops: Oops: 0002 [#1] SMP NOPTI
 [ ] Tainted: [W]=WARN
 [ ] Workqueue: xe-ggtt-wq ggtt_node_remove_work_func [xe]
 [ ] RIP: 0010:xe_ggtt_set_pte+0x6d/0x350 [xe]
 [ ] Call Trace:
 [ ]  &lt;TASK&gt;
 [ ]  xe_ggtt_clear+0xb0/0x270 [xe]
 [ ]  ggtt_node_remove+0xbb/0x120 [xe]
 [ ]  ggtt_node_remove_work_func+0x30/0x50 [xe]
 [ ]  process_one_work+0x22b/0x6f0
 [ ]  worker_thread+0x1e8/0x3d

Add managed-device action that will explicitly drain the workqueue
with all pending node removals prior to releasing MMIO/GSM mapping.

(cherry picked from commit 89d2835c3680ab1938e22ad81b1c9f8c686bd391)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38355/">CVE-2025-38355 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38355">CVE-2025-38355 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247062">SUSE bug 1247062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38356</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38356" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38356" ref_url="https://www.suse.com/security/cve/CVE-2025-38356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/guc: Explicitly exit CT safe mode on unwind

During driver probe we might be briefly using CT safe mode, which
is based on a delayed work, but usually we are able to stop this
once we have IRQ fully operational.  However, if we abort the probe
quite early then during unwind we might try to destroy the workqueue
while there is still a pending delayed work that attempts to restart
itself which triggers a WARN.

This was recently observed during unsuccessful VF initialization:

 [ ] xe 0000:00:02.1: probe with driver xe failed with error -62
 [ ] ------------[ cut here ]------------
 [ ] workqueue: cannot queue safe_mode_worker_func [xe] on wq xe-g2h-wq
 [ ] WARNING: CPU: 9 PID: 0 at kernel/workqueue.c:2257 __queue_work+0x287/0x710
 [ ] RIP: 0010:__queue_work+0x287/0x710
 [ ] Call Trace:
 [ ]  delayed_work_timer_fn+0x19/0x30
 [ ]  call_timer_fn+0xa1/0x2a0

Exit the CT safe mode on unwind to avoid that warning.

(cherry picked from commit 2ddbb73ec20b98e70a5200cb85deade22ccea2ec)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38356/">CVE-2025-38356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38356">CVE-2025-38356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247064">SUSE bug 1247064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38359</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38359" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38359" ref_url="https://www.suse.com/security/cve/CVE-2025-38359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/mm: Fix in_atomic() handling in do_secure_storage_access()

Kernel user spaces accesses to not exported pages in atomic context
incorrectly try to resolve the page fault.
With debug options enabled call traces like this can be seen:

BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
INFO: lockdep is turned off.
Preemption disabled at:
[&lt;00000383ea47cfa2&gt;] copy_page_from_iter_atomic+0xa2/0x8a0
CPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39
Tainted: G        W           6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT
Tainted: [W]=WARN
Hardware name: IBM 3931 A01 703 (LPAR)
Call Trace:
 [&lt;00000383e990d282&gt;] dump_stack_lvl+0xa2/0xe8
 [&lt;00000383e99bf152&gt;] __might_resched+0x292/0x2d0
 [&lt;00000383eaa7c374&gt;] down_read+0x34/0x2d0
 [&lt;00000383e99432f8&gt;] do_secure_storage_access+0x108/0x360
 [&lt;00000383eaa724b0&gt;] __do_pgm_check+0x130/0x220
 [&lt;00000383eaa842e4&gt;] pgm_check_handler+0x114/0x160
 [&lt;00000383ea47d028&gt;] copy_page_from_iter_atomic+0x128/0x8a0
([&lt;00000383ea47d016&gt;] copy_page_from_iter_atomic+0x116/0x8a0)
 [&lt;00000383e9c45eae&gt;] generic_perform_write+0x16e/0x310
 [&lt;00000383e9eb87f4&gt;] ext4_buffered_write_iter+0x84/0x160
 [&lt;00000383e9da0de4&gt;] vfs_write+0x1c4/0x460
 [&lt;00000383e9da123c&gt;] ksys_write+0x7c/0x100
 [&lt;00000383eaa7284e&gt;] __do_syscall+0x15e/0x280
 [&lt;00000383eaa8417e&gt;] system_call+0x6e/0x90
INFO: lockdep is turned off.

It is not allowed to take the mmap_lock while in atomic context. Therefore
handle such a secure storage access fault as if the accessed page is not
mapped: the uaccess function will return -EFAULT, and the caller has to
deal with this. Usually this means that the access is retried in process
context, which allows to resolve the page fault (or in this case export the
page).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38359/">CVE-2025-38359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38359">CVE-2025-38359 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247076">SUSE bug 1247076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38360</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38360" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38360" ref_url="https://www.suse.com/security/cve/CVE-2025-38360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add more checks for DSC / HUBP ONO guarantees

[WHY]
For non-zero DSC instances it's possible that the HUBP domain required
to drive it for sequential ONO ASICs isn't met, potentially causing
the logic to the tile to enter an undefined state leading to a system
hang.

[HOW]
Add more checks to ensure that the HUBP domain matching the DSC instance
is appropriately powered.

(cherry picked from commit da63df07112e5a9857a8d2aaa04255c4206754ec)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38360/">CVE-2025-38360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38360">CVE-2025-38360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247078">SUSE bug 1247078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38361</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38361" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38361" ref_url="https://www.suse.com/security/cve/CVE-2025-38361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check dce_hwseq before dereferencing it

[WHAT]

hws was checked for null earlier in dce110_blank_stream, indicating hws
can be null, and should be checked whenever it is used.

(cherry picked from commit 79db43611ff61280b6de58ce1305e0b2ecf675ad)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38361/">CVE-2025-38361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38361">CVE-2025-38361 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247079">SUSE bug 1247079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38362</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38362" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38362" ref_url="https://www.suse.com/security/cve/CVE-2025-38362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null pointer check for get_first_active_display()

The function mod_hdcp_hdcp1_enable_encryption() calls the function
get_first_active_display(), but does not check its return value.
The return value is a null pointer if the display list is empty.
This will lead to a null pointer dereference in
mod_hdcp_hdcp2_enable_encryption().

Add a null pointer check for get_first_active_display() and return
MOD_HDCP_STATUS_DISPLAY_NOT_FOUND if the function return null.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38362/">CVE-2025-38362 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38362">CVE-2025-38362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247089">SUSE bug 1247089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38363</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38363" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38363" ref_url="https://www.suse.com/security/cve/CVE-2025-38363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/tegra: Fix a possible null pointer dereference

In tegra_crtc_reset(), new memory is allocated with kzalloc(), but
no check is performed. Before calling __drm_atomic_helper_crtc_reset,
state should be checked to prevent possible null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38363/">CVE-2025-38363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38363">CVE-2025-38363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247018">SUSE bug 1247018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38364</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38364" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38364" ref_url="https://www.suse.com/security/cve/CVE-2025-38364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

maple_tree: fix MA_STATE_PREALLOC flag in mas_preallocate()

Temporarily clear the preallocation flag when explicitly requesting
allocations.  Pre-existing allocations are already counted against the
request through mas_node_count_gfp(), but the allocations will not happen
if the MA_STATE_PREALLOC flag is set.  This flag is meant to avoid
re-allocating in bulk allocation mode, and to detect issues with
preallocation calculations.

The MA_STATE_PREALLOC flag should also always be set on zero allocations
so that detection of underflow allocations will print a WARN_ON() during
consumption.

User visible effect of this flaw is a WARN_ON() followed by a null pointer
dereference when subsequent requests for larger number of nodes is
ignored, such as the vma merge retry in mmap_region() caused by drivers
altering the vma flags (which happens in v6.6, at least)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38364/">CVE-2025-38364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38364">CVE-2025-38364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247091">SUSE bug 1247091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38365</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38365" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38365" ref_url="https://www.suse.com/security/cve/CVE-2025-38365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix a race between renames and directory logging

We have a race between a rename and directory inode logging that if it
happens and we crash/power fail before the rename completes, the next time
the filesystem is mounted, the log replay code will end up deleting the
file that was being renamed.

This is best explained following a step by step analysis of an interleaving
of steps that lead into this situation.

Consider the initial conditions:

1) We are at transaction N;

2) We have directories A and B created in a past transaction (&lt; N);

3) We have inode X corresponding to a file that has 2 hardlinks, one in
   directory A and the other in directory B, so we'll name them as
   "A/foo_link1" and "B/foo_link2". Both hard links were persisted in a
   past transaction (&lt; N);

4) We have inode Y corresponding to a file that as a single hard link and
   is located in directory A, we'll name it as "A/bar". This file was also
   persisted in a past transaction (&lt; N).

The steps leading to a file loss are the following and for all of them we
are under transaction N:

 1) Link "A/foo_link1" is removed, so inode's X last_unlink_trans field
    is updated to N, through btrfs_unlink() -&gt; btrfs_record_unlink_dir();

 2) Task A starts a rename for inode Y, with the goal of renaming from
    "A/bar" to "A/baz", so we enter btrfs_rename();

 3) Task A inserts the new BTRFS_INODE_REF_KEY for inode Y by calling
    btrfs_insert_inode_ref();

 4) Because the rename happens in the same directory, we don't set the
    last_unlink_trans field of directoty A's inode to the current
    transaction id, that is, we don't cal btrfs_record_unlink_dir();

 5) Task A then removes the entries from directory A (BTRFS_DIR_ITEM_KEY
    and BTRFS_DIR_INDEX_KEY items) when calling __btrfs_unlink_inode()
    (actually the dir index item is added as a delayed item, but the
    effect is the same);

 6) Now before task A adds the new entry "A/baz" to directory A by
    calling btrfs_add_link(), another task, task B is logging inode X;

 7) Task B starts a fsync of inode X and after logging inode X, at
    btrfs_log_inode_parent() it calls btrfs_log_all_parents(), since
    inode X has a last_unlink_trans value of N, set at in step 1;

 8) At btrfs_log_all_parents() we search for all parent directories of
    inode X using the commit root, so we find directories A and B and log
    them. Bu when logging direct A, we don't have a dir index item for
    inode Y anymore, neither the old name "A/bar" nor for the new name
    "A/baz" since the rename has deleted the old name but has not yet
    inserted the new name - task A hasn't called yet btrfs_add_link() to
    do that.

    Note that logging directory A doesn't fallback to a transaction
    commit because its last_unlink_trans has a lower value than the
    current transaction's id (see step 4);

 9) Task B finishes logging directories A and B and gets back to
    btrfs_sync_file() where it calls btrfs_sync_log() to persist the log
    tree;

10) Task B successfully persisted the log tree, btrfs_sync_log() completed
    with success, and a power failure happened.

    We have a log tree without any directory entry for inode Y, so the
    log replay code deletes the entry for inode Y, name "A/bar", from the
    subvolume tree since it doesn't exist in the log tree and the log
    tree is authorative for its index (we logged a BTRFS_DIR_LOG_INDEX_KEY
    item that covers the index range for the dentry that corresponds to
    "A/bar").

    Since there's no other hard link for inode Y and the log replay code
    deletes the name "A/bar", the file is lost.

The issue wouldn't happen if task B synced the log only after task A
called btrfs_log_new_name(), which would update the log with the new name
for inode Y ("A/bar").

Fix this by pinning the log root during renames before removing the old
directory entry, and unpinning af
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38365/">CVE-2025-38365 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38365">CVE-2025-38365 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247023">SUSE bug 1247023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38368</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38368" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38368" ref_url="https://www.suse.com/security/cve/CVE-2025-38368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: tps6594-pfsm: Add NULL pointer check in tps6594_pfsm_probe()

The returned value, pfsm-&gt;miscdev.name, from devm_kasprintf()
could be NULL.
A pointer check is added to prevent potential NULL pointer dereference.
This is similar to the fix in commit 3027e7b15b02
("ice: Fix some null pointer dereference issues in ice_ptp.c").

This issue is found by our static analysis tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38368/">CVE-2025-38368 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38368">CVE-2025-38368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247022">SUSE bug 1247022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38369</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38369" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38369" ref_url="https://www.suse.com/security/cve/CVE-2025-38369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using

Running IDXD workloads in a container with the /dev directory mounted can
trigger a call trace or even a kernel panic when the parent process of the
container is terminated.

This issue occurs because, under certain configurations, Docker does not
properly propagate the mount replica back to the original mount point.

In this case, when the user driver detaches, the WQ is destroyed but it
still calls destroy_workqueue() attempting to completes all pending work.
It's necessary to check wq-&gt;wq and skip the drain if it no longer exists.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38369/">CVE-2025-38369 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38369">CVE-2025-38369 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247209">SUSE bug 1247209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38371</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38371" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38371" ref_url="https://www.suse.com/security/cve/CVE-2025-38371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/v3d: Disable interrupts before resetting the GPU

Currently, an interrupt can be triggered during a GPU reset, which can
lead to GPU hangs and NULL pointer dereference in an interrupt context
as shown in the following trace:

 [  314.035040] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000c0
 [  314.043822] Mem abort info:
 [  314.046606]   ESR = 0x0000000096000005
 [  314.050347]   EC = 0x25: DABT (current EL), IL = 32 bits
 [  314.055651]   SET = 0, FnV = 0
 [  314.058695]   EA = 0, S1PTW = 0
 [  314.061826]   FSC = 0x05: level 1 translation fault
 [  314.066694] Data abort info:
 [  314.069564]   ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000
 [  314.075039]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
 [  314.080080]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
 [  314.085382] user pgtable: 4k pages, 39-bit VAs, pgdp=0000000102728000
 [  314.091814] [00000000000000c0] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000
 [  314.100511] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
 [  314.106770] Modules linked in: v3d i2c_brcmstb vc4 snd_soc_hdmi_codec gpu_sched drm_shmem_helper drm_display_helper cec drm_dma_helper drm_kms_helper drm drm_panel_orientation_quirks snd_soc_core snd_compress snd_pcm_dmaengine snd_pcm snd_timer snd backlight
 [  314.129654] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.25+rpt-rpi-v8 #1  Debian 1:6.12.25-1+rpt1
 [  314.139388] Hardware name: Raspberry Pi 4 Model B Rev 1.4 (DT)
 [  314.145211] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 [  314.152165] pc : v3d_irq+0xec/0x2e0 [v3d]
 [  314.156187] lr : v3d_irq+0xe0/0x2e0 [v3d]
 [  314.160198] sp : ffffffc080003ea0
 [  314.163502] x29: ffffffc080003ea0 x28: ffffffec1f184980 x27: 021202b000000000
 [  314.170633] x26: ffffffec1f17f630 x25: ffffff8101372000 x24: ffffffec1f17d9f0
 [  314.177764] x23: 000000000000002a x22: 000000000000002a x21: ffffff8103252000
 [  314.184895] x20: 0000000000000001 x19: 00000000deadbeef x18: 0000000000000000
 [  314.192026] x17: ffffff94e51d2000 x16: ffffffec1dac3cb0 x15: c306000000000000
 [  314.199156] x14: 0000000000000000 x13: b2fc982e03cc5168 x12: 0000000000000001
 [  314.206286] x11: ffffff8103f8bcc0 x10: ffffffec1f196868 x9 : ffffffec1dac3874
 [  314.213416] x8 : 0000000000000000 x7 : 0000000000042a3a x6 : ffffff810017a180
 [  314.220547] x5 : ffffffec1ebad400 x4 : ffffffec1ebad320 x3 : 00000000000bebeb
 [  314.227677] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
 [  314.234807] Call trace:
 [  314.237243]  v3d_irq+0xec/0x2e0 [v3d]
 [  314.240906]  __handle_irq_event_percpu+0x58/0x218
 [  314.245609]  handle_irq_event+0x54/0xb8
 [  314.249439]  handle_fasteoi_irq+0xac/0x240
 [  314.253527]  handle_irq_desc+0x48/0x68
 [  314.257269]  generic_handle_domain_irq+0x24/0x38
 [  314.261879]  gic_handle_irq+0x48/0xd8
 [  314.265533]  call_on_irq_stack+0x24/0x58
 [  314.269448]  do_interrupt_handler+0x88/0x98
 [  314.273624]  el1_interrupt+0x34/0x68
 [  314.277193]  el1h_64_irq_handler+0x18/0x28
 [  314.281281]  el1h_64_irq+0x64/0x68
 [  314.284673]  default_idle_call+0x3c/0x168
 [  314.288675]  do_idle+0x1fc/0x230
 [  314.291895]  cpu_startup_entry+0x3c/0x50
 [  314.295810]  rest_init+0xe4/0xf0
 [  314.299030]  start_kernel+0x5e8/0x790
 [  314.302684]  __primary_switched+0x80/0x90
 [  314.306691] Code: 940029eb 360ffc13 f9442ea0 52800001 (f9406017)
 [  314.312775] ---[ end trace 0000000000000000 ]---
 [  314.317384] Kernel panic - not syncing: Oops: Fatal exception in interrupt
 [  314.324249] SMP: stopping secondary CPUs
 [  314.328167] Kernel Offset: 0x2b9da00000 from 0xffffffc080000000
 [  314.334076] PHYS_OFFSET: 0x0
 [  314.336946] CPU features: 0x08,00002013,c0200000,0200421b
 [  314.342337] Memory Limit: none
 [  314.345382] ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---

Before resetting the G
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38371/">CVE-2025-38371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38371">CVE-2025-38371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247178">SUSE bug 1247178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38372</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38372" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38372" ref_url="https://www.suse.com/security/cve/CVE-2025-38372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Fix unsafe xarray access in implicit ODP handling

__xa_store() and __xa_erase() were used without holding the proper lock,
which led to a lockdep warning due to unsafe RCU usage.  This patch
replaces them with xa_store() and xa_erase(), which perform the necessary
locking internally.

  =============================
  WARNING: suspicious RCPU usage
  6.14.0-rc7_for_upstream_debug_2025_03_18_15_01 #1 Not tainted
  -----------------------------
  ./include/linux/xarray.h:1211 suspicious rcu_dereference_protected() usage!

  other info that might help us debug this:

  rcu_scheduler_active = 2, debug_locks = 1
  3 locks held by kworker/u136:0/219:
      at: process_one_work+0xbe4/0x15f0
      process_one_work+0x75c/0x15f0
      pagefault_mr+0x9a5/0x1390 [mlx5_ib]

  stack backtrace:
  CPU: 14 UID: 0 PID: 219 Comm: kworker/u136:0 Not tainted
  6.14.0-rc7_for_upstream_debug_2025_03_18_15_01 #1
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS
  rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
  Workqueue: mlx5_ib_page_fault mlx5_ib_eqe_pf_action [mlx5_ib]
  Call Trace:
   dump_stack_lvl+0xa8/0xc0
   lockdep_rcu_suspicious+0x1e6/0x260
   xas_create+0xb8a/0xee0
   xas_store+0x73/0x14c0
   __xa_store+0x13c/0x220
   ? xa_store_range+0x390/0x390
   ? spin_bug+0x1d0/0x1d0
   pagefault_mr+0xcb5/0x1390 [mlx5_ib]
   ? _raw_spin_unlock+0x1f/0x30
   mlx5_ib_eqe_pf_action+0x3be/0x2620 [mlx5_ib]
   ? lockdep_hardirqs_on_prepare+0x400/0x400
   ? mlx5_ib_invalidate_range+0xcb0/0xcb0 [mlx5_ib]
   process_one_work+0x7db/0x15f0
   ? pwq_dec_nr_in_flight+0xda0/0xda0
   ? assign_work+0x168/0x240
   worker_thread+0x57d/0xcd0
   ? rescuer_thread+0xc40/0xc40
   kthread+0x3b3/0x800
   ? kthread_is_per_cpu+0xb0/0xb0
   ? lock_downgrade+0x680/0x680
   ? do_raw_spin_lock+0x12d/0x270
   ? spin_bug+0x1d0/0x1d0
   ? finish_task_switch.isra.0+0x284/0x9e0
   ? lockdep_hardirqs_on_prepare+0x284/0x400
   ? kthread_is_per_cpu+0xb0/0xb0
   ret_from_fork+0x2d/0x70
   ? kthread_is_per_cpu+0xb0/0xb0
   ret_from_fork_asm+0x11/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38372/">CVE-2025-38372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38372">CVE-2025-38372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247020">SUSE bug 1247020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38373</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38373" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38373" ref_url="https://www.suse.com/security/cve/CVE-2025-38373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/mlx5: Fix potential deadlock in MR deregistration

The issue arises when kzalloc() is invoked while holding umem_mutex or
any other lock acquired under umem_mutex. This is problematic because
kzalloc() can trigger fs_reclaim_aqcuire(), which may, in turn, invoke
mmu_notifier_invalidate_range_start(). This function can lead to
mlx5_ib_invalidate_range(), which attempts to acquire umem_mutex again,
resulting in a deadlock.

The problematic flow:
             CPU0                      |              CPU1
---------------------------------------|------------------------------------------------
mlx5_ib_dereg_mr()                     |
 -&gt; revoke_mr()                         |
   -&gt; mutex_lock(&amp;umem_odp-&gt;umem_mutex) |
                                       | mlx5_mkey_cache_init()
                                       |  -&gt; mutex_lock(&amp;dev-&gt;cache.rb_lock)
                                       |  -&gt; mlx5r_cache_create_ent_locked()
                                       |    -&gt; kzalloc(GFP_KERNEL)
                                       |      -&gt; fs_reclaim()
                                       |        -&gt; mmu_notifier_invalidate_range_start()
                                       |          -&gt; mlx5_ib_invalidate_range()
                                       |            -&gt; mutex_lock(&amp;umem_odp-&gt;umem_mutex)
   -&gt; cache_ent_find_and_store()        |
     -&gt; mutex_lock(&amp;dev-&gt;cache.rb_lock) |

Additionally, when kzalloc() is called from within
cache_ent_find_and_store(), we encounter the same deadlock due to
re-acquisition of umem_mutex.

Solve by releasing umem_mutex in dereg_mr() after umr_revoke_mr()
and before acquiring rb_lock. This ensures that we don't hold
umem_mutex while performing memory allocations that could trigger
the reclaim path.

This change prevents the deadlock by ensuring proper lock ordering and
avoiding holding locks during memory allocation operations that could
trigger the reclaim path.

The following lockdep warning demonstrates the deadlock:

 python3/20557 is trying to acquire lock:
 ffff888387542128 (&amp;umem_odp-&gt;umem_mutex){+.+.}-{4:4}, at:
 mlx5_ib_invalidate_range+0x5b/0x550 [mlx5_ib]

 but task is already holding lock:
 ffffffff82f6b840 (mmu_notifier_invalidate_range_start){+.+.}-{0:0}, at:
 unmap_vmas+0x7b/0x1a0

 which lock already depends on the new lock.

 the existing dependency chain (in reverse order) is:

 -&gt; #3 (mmu_notifier_invalidate_range_start){+.+.}-{0:0}:
       fs_reclaim_acquire+0x60/0xd0
       mem_cgroup_css_alloc+0x6f/0x9b0
       cgroup_init_subsys+0xa4/0x240
       cgroup_init+0x1c8/0x510
       start_kernel+0x747/0x760
       x86_64_start_reservations+0x25/0x30
       x86_64_start_kernel+0x73/0x80
       common_startup_64+0x129/0x138

 -&gt; #2 (fs_reclaim){+.+.}-{0:0}:
       fs_reclaim_acquire+0x91/0xd0
       __kmalloc_cache_noprof+0x4d/0x4c0
       mlx5r_cache_create_ent_locked+0x75/0x620 [mlx5_ib]
       mlx5_mkey_cache_init+0x186/0x360 [mlx5_ib]
       mlx5_ib_stage_post_ib_reg_umr_init+0x3c/0x60 [mlx5_ib]
       __mlx5_ib_add+0x4b/0x190 [mlx5_ib]
       mlx5r_probe+0xd9/0x320 [mlx5_ib]
       auxiliary_bus_probe+0x42/0x70
       really_probe+0xdb/0x360
       __driver_probe_device+0x8f/0x130
       driver_probe_device+0x1f/0xb0
       __driver_attach+0xd4/0x1f0
       bus_for_each_dev+0x79/0xd0
       bus_add_driver+0xf0/0x200
       driver_register+0x6e/0xc0
       __auxiliary_driver_register+0x6a/0xc0
       do_one_initcall+0x5e/0x390
       do_init_module+0x88/0x240
       init_module_from_file+0x85/0xc0
       idempotent_init_module+0x104/0x300
       __x64_sys_finit_module+0x68/0xc0
       do_syscall_64+0x6d/0x140
       entry_SYSCALL_64_after_hwframe+0x4b/0x53

 -&gt; #1 (&amp;dev-&gt;cache.rb_lock){+.+.}-{4:4}:
       __mutex_lock+0x98/0xf10
       __mlx5_ib_dereg_mr+0x6f2/0x890 [mlx5_ib]
       mlx5_ib_dereg_mr+0x21/0x110 [mlx5_ib]
       ib_dereg_mr_user+0x85/0x1f0 [ib_core]
  
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38373/">CVE-2025-38373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38373">CVE-2025-38373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247033">SUSE bug 1247033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38374</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38374" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38374" ref_url="https://www.suse.com/security/cve/CVE-2025-38374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

optee: ffa: fix sleep in atomic context

The OP-TEE driver registers the function notif_callback() for FF-A
notifications. However, this function is called in an atomic context
leading to errors like this when processing asynchronous notifications:

 | BUG: sleeping function called from invalid context at kernel/locking/mutex.c:258
 | in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 9, name: kworker/0:0
 | preempt_count: 1, expected: 0
 | RCU nest depth: 0, expected: 0
 | CPU: 0 UID: 0 PID: 9 Comm: kworker/0:0 Not tainted 6.14.0-00019-g657536ebe0aa #13
 | Hardware name: linux,dummy-virt (DT)
 | Workqueue: ffa_pcpu_irq_notification notif_pcpu_irq_work_fn
 | Call trace:
 |  show_stack+0x18/0x24 (C)
 |  dump_stack_lvl+0x78/0x90
 |  dump_stack+0x18/0x24
 |  __might_resched+0x114/0x170
 |  __might_sleep+0x48/0x98
 |  mutex_lock+0x24/0x80
 |  optee_get_msg_arg+0x7c/0x21c
 |  simple_call_with_arg+0x50/0xc0
 |  optee_do_bottom_half+0x14/0x20
 |  notif_callback+0x3c/0x48
 |  handle_notif_callbacks+0x9c/0xe0
 |  notif_get_and_handle+0x40/0x88
 |  generic_exec_single+0x80/0xc0
 |  smp_call_function_single+0xfc/0x1a0
 |  notif_pcpu_irq_work_fn+0x2c/0x38
 |  process_one_work+0x14c/0x2b4
 |  worker_thread+0x2e4/0x3e0
 |  kthread+0x13c/0x210
 |  ret_from_fork+0x10/0x20

Fix this by adding work queue to process the notification in a
non-atomic context.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38374/">CVE-2025-38374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38374">CVE-2025-38374 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247024">SUSE bug 1247024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38375</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38375" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38375" ref_url="https://www.suse.com/security/cve/CVE-2025-38375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-net: ensure the received length does not exceed allocated size

In xdp_linearize_page, when reading the following buffers from the ring,
we forget to check the received length with the true allocate size. This
can lead to an out-of-bound read. This commit adds that missing check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38375/">CVE-2025-38375 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38375">CVE-2025-38375 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247177">SUSE bug 1247177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258073">SUSE bug 1258073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38376</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38376" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38376" ref_url="https://www.suse.com/security/cve/CVE-2025-38376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: chipidea: udc: disconnect/reconnect from host when do suspend/resume

Shawn and John reported a hang issue during system suspend as below:

 - USB gadget is enabled as Ethernet
 - There is data transfer over USB Ethernet (scp a big file between host
                                             and device)
 - Device is going in/out suspend (echo mem &gt; /sys/power/state)

The root cause is the USB device controller is suspended but the USB bus
is still active which caused the USB host continues to transfer data with
device and the device continues to queue USB requests (in this case, a
delayed TCP ACK packet trigger the issue) after controller is suspended,
however the USB controller clock is already gated off. Then if udc driver
access registers after that point, the system will hang.

The correct way to avoid such issue is to disconnect device from host when
the USB bus is not at suspend state. Then the host will receive disconnect
event and stop data transfer in time. To continue make USB gadget device
work after system resume, this will reconnect device automatically.

To make usb wakeup work if USB bus is already at suspend state, this will
keep connection for it only when USB device controller has enabled wakeup
capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38376/">CVE-2025-38376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38376">CVE-2025-38376 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247176">SUSE bug 1247176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38377</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38377" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38377" ref_url="https://www.suse.com/security/cve/CVE-2025-38377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rose: fix dangling neighbour pointers in rose_rt_device_down()

There are two bugs in rose_rt_device_down() that can cause
use-after-free:

1. The loop bound `t-&gt;count` is modified within the loop, which can
   cause the loop to terminate early and miss some entries.

2. When removing an entry from the neighbour array, the subsequent entries
   are moved up to fill the gap, but the loop index `i` is still
   incremented, causing the next entry to be skipped.

For example, if a node has three neighbours (A, A, B) with count=3 and A
is being removed, the second A is not checked.

    i=0: (A, A, B) -&gt; (A, B) with count=2
          ^ checked
    i=1: (A, B)    -&gt; (A, B) with count=2
             ^ checked (B, not A!)
    i=2: (doesn't occur because i &lt; count is false)

This leaves the second A in the array with count=2, but the rose_neigh
structure has been freed. Code that accesses these entries assumes that
the first `count` entries are valid pointers, causing a use-after-free
when it accesses the dangling pointer.

Fix both issues by iterating over the array in reverse order with a fixed
loop bound. This ensures that all entries are examined and that the removal
of an entry doesn't affect subsequent iterations.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38377/">CVE-2025-38377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38377">CVE-2025-38377 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247174">SUSE bug 1247174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247175">SUSE bug 1247175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38379</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38379" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38379" ref_url="https://www.suse.com/security/cve/CVE-2025-38379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix warning when reconnecting channel

When reconnecting a channel in smb2_reconnect_server(), a dummy tcon
is passed down to smb2_reconnect() with -&gt;query_interface
uninitialized, so we can't call queue_delayed_work() on it.

Fix the following warning by ensuring that we're queueing the delayed
worker from correct tcon.

WARNING: CPU: 4 PID: 1126 at kernel/workqueue.c:2498 __queue_delayed_work+0x1d2/0x200
Modules linked in: cifs cifs_arc4 nls_ucs2_utils cifs_md4 [last unloaded: cifs]
CPU: 4 UID: 0 PID: 1126 Comm: kworker/4:0 Not tainted 6.16.0-rc3 #5 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-4.fc42 04/01/2014
Workqueue: cifsiod smb2_reconnect_server [cifs]
RIP: 0010:__queue_delayed_work+0x1d2/0x200
Code: 41 5e 41 5f e9 7f ee ff ff 90 0f 0b 90 e9 5d ff ff ff bf 02 00
00 00 e8 6c f3 07 00 89 c3 eb bd 90 0f 0b 90 e9 57 f&gt; 0b 90 e9 65 fe
ff ff 90 0f 0b 90 e9 72 fe ff ff 90 0f 0b 90 e9
RSP: 0018:ffffc900014afad8 EFLAGS: 00010003
RAX: 0000000000000000 RBX: ffff888124d99988 RCX: ffffffff81399cc1
RDX: dffffc0000000000 RSI: ffff888114326e00 RDI: ffff888124d999f0
RBP: 000000000000ea60 R08: 0000000000000001 R09: ffffed10249b3331
R10: ffff888124d9998f R11: 0000000000000004 R12: 0000000000000040
R13: ffff888114326e00 R14: ffff888124d999d8 R15: ffff888114939020
FS:  0000000000000000(0000) GS:ffff88829f7fe000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffe7a2b4038 CR3: 0000000120a6f000 CR4: 0000000000750ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 queue_delayed_work_on+0xb4/0xc0
 smb2_reconnect+0xb22/0xf50 [cifs]
 smb2_reconnect_server+0x413/0xd40 [cifs]
 ? __pfx_smb2_reconnect_server+0x10/0x10 [cifs]
 ? local_clock_noinstr+0xd/0xd0
 ? local_clock+0x15/0x30
 ? lock_release+0x29b/0x390
 process_one_work+0x4c5/0xa10
 ? __pfx_process_one_work+0x10/0x10
 ? __list_add_valid_or_report+0x37/0x120
 worker_thread+0x2f1/0x5a0
 ? __kthread_parkme+0xde/0x100
 ? __pfx_worker_thread+0x10/0x10
 kthread+0x1fe/0x380
 ? kthread+0x10f/0x380
 ? __pfx_kthread+0x10/0x10
 ? local_clock_noinstr+0xd/0xd0
 ? ret_from_fork+0x1b/0x1f0
 ? local_clock+0x15/0x30
 ? lock_release+0x29b/0x390
 ? rcu_is_watching+0x20/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x15b/0x1f0
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
irq event stamp: 1116206
hardirqs last  enabled at (1116205): [&lt;ffffffff8143af42&gt;] __up_console_sem+0x52/0x60
hardirqs last disabled at (1116206): [&lt;ffffffff81399f0e&gt;] queue_delayed_work_on+0x6e/0xc0
softirqs last  enabled at (1116138): [&lt;ffffffffc04562fd&gt;] __smb_send_rqst+0x42d/0x950 [cifs]
softirqs last disabled at (1116136): [&lt;ffffffff823d35e1&gt;] release_sock+0x21/0xf0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38379/">CVE-2025-38379 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38379">CVE-2025-38379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247030">SUSE bug 1247030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38380</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38380" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38380" ref_url="https://www.suse.com/security/cve/CVE-2025-38380" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13960" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001923.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38380/">CVE-2025-38380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38380">CVE-2025-38380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247028">SUSE bug 1247028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247029">SUSE bug 1247029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38381</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38381" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38381" ref_url="https://www.suse.com/security/cve/CVE-2025-38381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: cs40l50-vibra - fix potential NULL dereference in cs40l50_upload_owt()

The cs40l50_upload_owt() function allocates memory via kmalloc()
without checking for allocation failure, which could lead to a
NULL pointer dereference.

Return -ENOMEM in case allocation fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38381/">CVE-2025-38381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38381">CVE-2025-38381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247027">SUSE bug 1247027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38382</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38382" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38382" ref_url="https://www.suse.com/security/cve/CVE-2025-38382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix iteration of extrefs during log replay

At __inode_add_ref() when processing extrefs, if we jump into the next
label we have an undefined value of victim_name.len, since we haven't
initialized it before we did the goto. This results in an invalid memory
access in the next iteration of the loop since victim_name.len was not
initialized to the length of the name of the current extref.

Fix this by initializing victim_name.len with the current extref's name
length.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38382/">CVE-2025-38382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38382">CVE-2025-38382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247031">SUSE bug 1247031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247032">SUSE bug 1247032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38383</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38383" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38383" ref_url="https://www.suse.com/security/cve/CVE-2025-38383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/vmalloc: fix data race in show_numa_info()

The following data-race was found in show_numa_info():

==================================================================
BUG: KCSAN: data-race in vmalloc_info_show / vmalloc_info_show

read to 0xffff88800971fe30 of 4 bytes by task 8289 on cpu 0:
 show_numa_info mm/vmalloc.c:4936 [inline]
 vmalloc_info_show+0x5a8/0x7e0 mm/vmalloc.c:5016
 seq_read_iter+0x373/0xb40 fs/seq_file.c:230
 proc_reg_read_iter+0x11e/0x170 fs/proc/inode.c:299
....

write to 0xffff88800971fe30 of 4 bytes by task 8287 on cpu 1:
 show_numa_info mm/vmalloc.c:4934 [inline]
 vmalloc_info_show+0x38f/0x7e0 mm/vmalloc.c:5016
 seq_read_iter+0x373/0xb40 fs/seq_file.c:230
 proc_reg_read_iter+0x11e/0x170 fs/proc/inode.c:299
....

value changed: 0x0000008f -&gt; 0x00000000
==================================================================

According to this report,there is a read/write data-race because
m-&gt;private is accessible to multiple CPUs.  To fix this, instead of
allocating the heap in proc_vmalloc_init() and passing the heap address to
m-&gt;private, vmalloc_info_show() should allocate the heap.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38383/">CVE-2025-38383 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38383">CVE-2025-38383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247250">SUSE bug 1247250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38384</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38384" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38384" ref_url="https://www.suse.com/security/cve/CVE-2025-38384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: spinand: fix memory leak of ECC engine conf

Memory allocated for the ECC engine conf is not released during spinand
cleanup. Below kmemleak trace is seen for this memory leak:

unreferenced object 0xffffff80064f00e0 (size 8):
  comm "swapper/0", pid 1, jiffies 4294937458
  hex dump (first 8 bytes):
    00 00 00 00 00 00 00 00                          ........
  backtrace (crc 0):
    kmemleak_alloc+0x30/0x40
    __kmalloc_cache_noprof+0x208/0x3c0
    spinand_ondie_ecc_init_ctx+0x114/0x200
    nand_ecc_init_ctx+0x70/0xa8
    nanddev_ecc_engine_init+0xec/0x27c
    spinand_probe+0xa2c/0x1620
    spi_mem_probe+0x130/0x21c
    spi_probe+0xf0/0x170
    really_probe+0x17c/0x6e8
    __driver_probe_device+0x17c/0x21c
    driver_probe_device+0x58/0x180
    __device_attach_driver+0x15c/0x1f8
    bus_for_each_drv+0xec/0x150
    __device_attach+0x188/0x24c
    device_initial_probe+0x10/0x20
    bus_probe_device+0x11c/0x160

Fix the leak by calling nanddev_ecc_engine_cleanup() inside
spinand_cleanup().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38384/">CVE-2025-38384 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38384">CVE-2025-38384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247035">SUSE bug 1247035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38385</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38385" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38385" ref_url="https://www.suse.com/security/cve/CVE-2025-38385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect

Remove redundant netif_napi_del() call from disconnect path.

A WARN may be triggered in __netif_napi_del_locked() during USB device
disconnect:

  WARNING: CPU: 0 PID: 11 at net/core/dev.c:7417 __netif_napi_del_locked+0x2b4/0x350

This happens because netif_napi_del() is called in the disconnect path while
NAPI is still enabled. However, it is not necessary to call netif_napi_del()
explicitly, since unregister_netdev() will handle NAPI teardown automatically
and safely. Removing the redundant call avoids triggering the warning.

Full trace:
 lan78xx 1-1:1.0 enu1: Failed to read register index 0x000000c4. ret = -ENODEV
 lan78xx 1-1:1.0 enu1: Failed to set MAC down with error -ENODEV
 lan78xx 1-1:1.0 enu1: Link is Down
 lan78xx 1-1:1.0 enu1: Failed to read register index 0x00000120. ret = -ENODEV
 ------------[ cut here ]------------
 WARNING: CPU: 0 PID: 11 at net/core/dev.c:7417 __netif_napi_del_locked+0x2b4/0x350
 Modules linked in: flexcan can_dev fuse
 CPU: 0 UID: 0 PID: 11 Comm: kworker/0:1 Not tainted 6.16.0-rc2-00624-ge926949dab03 #9 PREEMPT
 Hardware name: SKOV IMX8MP CPU revC - bd500 (DT)
 Workqueue: usb_hub_wq hub_event
 pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : __netif_napi_del_locked+0x2b4/0x350
 lr : __netif_napi_del_locked+0x7c/0x350
 sp : ffffffc085b673c0
 x29: ffffffc085b673c0 x28: ffffff800b7f2000 x27: ffffff800b7f20d8
 x26: ffffff80110bcf58 x25: ffffff80110bd978 x24: 1ffffff0022179eb
 x23: ffffff80110bc000 x22: ffffff800b7f5000 x21: ffffff80110bc000
 x20: ffffff80110bcf38 x19: ffffff80110bcf28 x18: dfffffc000000000
 x17: ffffffc081578940 x16: ffffffc08284cee0 x15: 0000000000000028
 x14: 0000000000000006 x13: 0000000000040000 x12: ffffffb0022179e8
 x11: 1ffffff0022179e7 x10: ffffffb0022179e7 x9 : dfffffc000000000
 x8 : 0000004ffdde8619 x7 : ffffff80110bcf3f x6 : 0000000000000001
 x5 : ffffff80110bcf38 x4 : ffffff80110bcf38 x3 : 0000000000000000
 x2 : 0000000000000000 x1 : 1ffffff0022179e7 x0 : 0000000000000000
 Call trace:
  __netif_napi_del_locked+0x2b4/0x350 (P)
  lan78xx_disconnect+0xf4/0x360
  usb_unbind_interface+0x158/0x718
  device_remove+0x100/0x150
  device_release_driver_internal+0x308/0x478
  device_release_driver+0x1c/0x30
  bus_remove_device+0x1a8/0x368
  device_del+0x2e0/0x7b0
  usb_disable_device+0x244/0x540
  usb_disconnect+0x220/0x758
  hub_event+0x105c/0x35e0
  process_one_work+0x760/0x17b0
  worker_thread+0x768/0xce8
  kthread+0x3bc/0x690
  ret_from_fork+0x10/0x20
 irq event stamp: 211604
 hardirqs last  enabled at (211603): [&lt;ffffffc0828cc9ec&gt;] _raw_spin_unlock_irqrestore+0x84/0x98
 hardirqs last disabled at (211604): [&lt;ffffffc0828a9a84&gt;] el1_dbg+0x24/0x80
 softirqs last  enabled at (211296): [&lt;ffffffc080095f10&gt;] handle_softirqs+0x820/0xbc8
 softirqs last disabled at (210993): [&lt;ffffffc080010288&gt;] __do_softirq+0x18/0x20
 ---[ end trace 0000000000000000 ]---
 lan78xx 1-1:1.0 enu1: failed to kill vid 0081/0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38385/">CVE-2025-38385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38385">CVE-2025-38385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247149">SUSE bug 1247149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38386</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38386" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38386" ref_url="https://www.suse.com/security/cve/CVE-2025-38386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPICA: Refuse to evaluate a method if arguments are missing

As reported in [1], a platform firmware update that increased the number
of method parameters and forgot to update a least one of its callers,
caused ACPICA to crash due to use-after-free.

Since this a result of a clear AML issue that arguably cannot be fixed
up by the interpreter (it cannot produce missing data out of thin air),
address it by making ACPICA refuse to evaluate a method if the caller
attempts to pass fewer arguments than expected to it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38386/">CVE-2025-38386 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38386">CVE-2025-38386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247138">SUSE bug 1247138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38387</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38387" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38387" ref_url="https://www.suse.com/security/cve/CVE-2025-38387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Initialize obj_event-&gt;obj_sub_list before xa_insert

The obj_event may be loaded immediately after inserted, then if the
list_head is not initialized then we may get a poisonous pointer.  This
fixes the crash below:

 mlx5_core 0000:03:00.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0 enhanced)
 mlx5_core.sf mlx5_core.sf.4: firmware version: 32.38.3056
 mlx5_core 0000:03:00.0 en3f0pf0sf2002: renamed from eth0
 mlx5_core.sf mlx5_core.sf.4: Rate limit: 127 rates are supported, range: 0Mbps to 195312Mbps
 IPv6: ADDRCONF(NETDEV_CHANGE): en3f0pf0sf2002: link becomes ready
 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000060
 Mem abort info:
   ESR = 0x96000006
   EC = 0x25: DABT (current EL), IL = 32 bits
   SET = 0, FnV = 0
   EA = 0, S1PTW = 0
 Data abort info:
   ISV = 0, ISS = 0x00000006
   CM = 0, WnR = 0
 user pgtable: 4k pages, 48-bit VAs, pgdp=00000007760fb000
 [0000000000000060] pgd=000000076f6d7003, p4d=000000076f6d7003, pud=0000000777841003, pmd=0000000000000000
 Internal error: Oops: 96000006 [#1] SMP
 Modules linked in: ipmb_host(OE) act_mirred(E) cls_flower(E) sch_ingress(E) mptcp_diag(E) udp_diag(E) raw_diag(E) unix_diag(E) tcp_diag(E) inet_diag(E) binfmt_misc(E) bonding(OE) rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) isofs(E) cdrom(E) mst_pciconf(OE) ib_umad(OE) mlx5_ib(OE) ipmb_dev_int(OE) mlx5_core(OE) kpatch_15237886(OEK) mlxdevm(OE) auxiliary(OE) ib_uverbs(OE) ib_core(OE) psample(E) mlxfw(OE) tls(E) sunrpc(E) vfat(E) fat(E) crct10dif_ce(E) ghash_ce(E) sha1_ce(E) sbsa_gwdt(E) virtio_console(E) ext4(E) mbcache(E) jbd2(E) xfs(E) libcrc32c(E) mmc_block(E) virtio_net(E) net_failover(E) failover(E) sha2_ce(E) sha256_arm64(E) nvme(OE) nvme_core(OE) gpio_mlxbf3(OE) mlx_compat(OE) mlxbf_pmc(OE) i2c_mlxbf(OE) sdhci_of_dwcmshc(OE) pinctrl_mlxbf3(OE) mlxbf_pka(OE) gpio_generic(E) i2c_core(E) mmc_core(E) mlxbf_gige(OE) vitesse(E) pwr_mlxbf(OE) mlxbf_tmfifo(OE) micrel(E) mlxbf_bootctl(OE) virtio_ring(E) virtio(E) ipmi_devintf(E) ipmi_msghandler(E)
  [last unloaded: mst_pci]
 CPU: 11 PID: 20913 Comm: rte-worker-11 Kdump: loaded Tainted: G           OE K   5.10.134-13.1.an8.aarch64 #1
 Hardware name: https://www.mellanox.com BlueField-3 SmartNIC Main Card/BlueField-3 SmartNIC Main Card, BIOS 4.2.2.12968 Oct 26 2023
 pstate: a0400089 (NzCv daIf +PAN -UAO -TCO BTYPE=--)
 pc : dispatch_event_fd+0x68/0x300 [mlx5_ib]
 lr : devx_event_notifier+0xcc/0x228 [mlx5_ib]
 sp : ffff80001005bcf0
 x29: ffff80001005bcf0 x28: 0000000000000001
 x27: ffff244e0740a1d8 x26: ffff244e0740a1d0
 x25: ffffda56beff5ae0 x24: ffffda56bf911618
 x23: ffff244e0596a480 x22: ffff244e0596a480
 x21: ffff244d8312ad90 x20: ffff244e0596a480
 x19: fffffffffffffff0 x18: 0000000000000000
 x17: 0000000000000000 x16: ffffda56be66d620
 x15: 0000000000000000 x14: 0000000000000000
 x13: 0000000000000000 x12: 0000000000000000
 x11: 0000000000000040 x10: ffffda56bfcafb50
 x9 : ffffda5655c25f2c x8 : 0000000000000010
 x7 : 0000000000000000 x6 : ffff24545a2e24b8
 x5 : 0000000000000003 x4 : ffff80001005bd28
 x3 : 0000000000000000 x2 : 0000000000000000
 x1 : ffff244e0596a480 x0 : ffff244d8312ad90
 Call trace:
  dispatch_event_fd+0x68/0x300 [mlx5_ib]
  devx_event_notifier+0xcc/0x228 [mlx5_ib]
  atomic_notifier_call_chain+0x58/0x80
  mlx5_eq_async_int+0x148/0x2b0 [mlx5_core]
  atomic_notifier_call_chain+0x58/0x80
  irq_int_handler+0x20/0x30 [mlx5_core]
  __handle_irq_event_percpu+0x60/0x220
  handle_irq_event_percpu+0x3c/0x90
  handle_irq_event+0x58/0x158
  handle_fasteoi_irq+0xfc/0x188
  generic_handle_irq+0x34/0x48
  ...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38387/">CVE-2025-38387 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38387">CVE-2025-38387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247154">SUSE bug 1247154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38389</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38389" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38389" ref_url="https://www.suse.com/security/cve/CVE-2025-38389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gt: Fix timeline left held on VMA alloc error

The following error has been reported sporadically by CI when a test
unbinds the i915 driver on a ring submission platform:

&lt;4&gt; [239.330153] ------------[ cut here ]------------
&lt;4&gt; [239.330166] i915 0000:00:02.0: [drm] drm_WARN_ON(dev_priv-&gt;mm.shrink_count)
&lt;4&gt; [239.330196] WARNING: CPU: 1 PID: 18570 at drivers/gpu/drm/i915/i915_gem.c:1309 i915_gem_cleanup_early+0x13e/0x150 [i915]
...
&lt;4&gt; [239.330640] RIP: 0010:i915_gem_cleanup_early+0x13e/0x150 [i915]
...
&lt;4&gt; [239.330942] Call Trace:
&lt;4&gt; [239.330944]  &lt;TASK&gt;
&lt;4&gt; [239.330949]  i915_driver_late_release+0x2b/0xa0 [i915]
&lt;4&gt; [239.331202]  i915_driver_release+0x86/0xa0 [i915]
&lt;4&gt; [239.331482]  devm_drm_dev_init_release+0x61/0x90
&lt;4&gt; [239.331494]  devm_action_release+0x15/0x30
&lt;4&gt; [239.331504]  release_nodes+0x3d/0x120
&lt;4&gt; [239.331517]  devres_release_all+0x96/0xd0
&lt;4&gt; [239.331533]  device_unbind_cleanup+0x12/0x80
&lt;4&gt; [239.331543]  device_release_driver_internal+0x23a/0x280
&lt;4&gt; [239.331550]  ? bus_find_device+0xa5/0xe0
&lt;4&gt; [239.331563]  device_driver_detach+0x14/0x20
...
&lt;4&gt; [357.719679] ---[ end trace 0000000000000000 ]---

If the test also unloads the i915 module then that's followed with:

&lt;3&gt; [357.787478] =============================================================================
&lt;3&gt; [357.788006] BUG i915_vma (Tainted: G     U  W        N ): Objects remaining on __kmem_cache_shutdown()
&lt;3&gt; [357.788031] -----------------------------------------------------------------------------
&lt;3&gt; [357.788204] Object 0xffff888109e7f480 @offset=29824
&lt;3&gt; [357.788670] Allocated in i915_vma_instance+0xee/0xc10 [i915] age=292729 cpu=4 pid=2244
&lt;4&gt; [357.788994]  i915_vma_instance+0xee/0xc10 [i915]
&lt;4&gt; [357.789290]  init_status_page+0x7b/0x420 [i915]
&lt;4&gt; [357.789532]  intel_engines_init+0x1d8/0x980 [i915]
&lt;4&gt; [357.789772]  intel_gt_init+0x175/0x450 [i915]
&lt;4&gt; [357.790014]  i915_gem_init+0x113/0x340 [i915]
&lt;4&gt; [357.790281]  i915_driver_probe+0x847/0xed0 [i915]
&lt;4&gt; [357.790504]  i915_pci_probe+0xe6/0x220 [i915]
...

Closer analysis of CI results history has revealed a dependency of the
error on a few IGT tests, namely:
- igt@api_intel_allocator@fork-simple-stress-signal,
- igt@api_intel_allocator@two-level-inception-interruptible,
- igt@gem_linear_blits@interruptible,
- igt@prime_mmap_coherency@ioctl-errors,
which invisibly trigger the issue, then exhibited with first driver unbind
attempt.

All of the above tests perform actions which are actively interrupted with
signals.  Further debugging has allowed to narrow that scope down to
DRM_IOCTL_I915_GEM_EXECBUFFER2, and ring_context_alloc(), specific to ring
submission, in particular.

If successful then that function, or its execlists or GuC submission
equivalent, is supposed to be called only once per GEM context engine,
followed by raise of a flag that prevents the function from being called
again.  The function is expected to unwind its internal errors itself, so
it may be safely called once more after it returns an error.

In case of ring submission, the function first gets a reference to the
engine's legacy timeline and then allocates a VMA.  If the VMA allocation
fails, e.g. when i915_vma_instance() called from inside is interrupted
with a signal, then ring_context_alloc() fails, leaving the timeline held
referenced.  On next I915_GEM_EXECBUFFER2 IOCTL, another reference to the
timeline is got, and only that last one is put on successful completion.
As a consequence, the legacy timeline, with its underlying engine status
page's VMA object, is still held and not released on driver unbind.

Get the legacy timeline only after successful allocation of the context
engine's VMA.

v2: Add a note on other submission methods (Krzysztof Karas):
    Both execlists and GuC submission use lrc_alloc() which seems free
    from a similar issue.

(cherry picked from commit cc43422b3cc79eacff4c5a8ba0d224688ca9dd4f)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38389/">CVE-2025-38389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38389">CVE-2025-38389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247153">SUSE bug 1247153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38390</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38390" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38390" ref_url="https://www.suse.com/security/cve/CVE-2025-38390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_ffa: Fix memory leak by freeing notifier callback node

Commit e0573444edbf ("firmware: arm_ffa: Add interfaces to request
notification callbacks") adds support for notifier callbacks by allocating
and inserting a callback node into a hashtable during registration of
notifiers. However, during unregistration, the code only removes the
node from the hashtable without freeing the associated memory, resulting
in a memory leak.

Resolve the memory leak issue by ensuring the allocated notifier callback
node is properly freed after it is removed from the hashtable entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38390/">CVE-2025-38390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38390">CVE-2025-38390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247088">SUSE bug 1247088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38391</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38391" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38391" ref_url="https://www.suse.com/security/cve/CVE-2025-38391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: altmodes/displayport: do not index invalid pin_assignments

A poorly implemented DisplayPort Alt Mode port partner can indicate
that its pin assignment capabilities are greater than the maximum
value, DP_PIN_ASSIGN_F. In this case, calls to pin_assignment_show
will cause a BRK exception due to an out of bounds array access.

Prevent for loop in pin_assignment_show from accessing
invalid values in pin_assignments by adding DP_PIN_ASSIGN_MAX
value in typec_dp.h and using i &lt; DP_PIN_ASSIGN_MAX as a loop
condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.2/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38391/">CVE-2025-38391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38391">CVE-2025-38391 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247181">SUSE bug 1247181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38392</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38392" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38392" ref_url="https://www.suse.com/security/cve/CVE-2025-38392" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15429" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001984.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15785" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: convert control queue mutex to a spinlock

With VIRTCHNL2_CAP_MACFILTER enabled, the following warning is generated
on module load:

[  324.701677] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:578
[  324.701684] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1582, name: NetworkManager
[  324.701689] preempt_count: 201, expected: 0
[  324.701693] RCU nest depth: 0, expected: 0
[  324.701697] 2 locks held by NetworkManager/1582:
[  324.701702]  #0: ffffffff9f7be770 (rtnl_mutex){....}-{3:3}, at: rtnl_newlink+0x791/0x21e0
[  324.701730]  #1: ff1100216c380368 (_xmit_ETHER){....}-{2:2}, at: __dev_open+0x3f0/0x870
[  324.701749] Preemption disabled at:
[  324.701752] [&lt;ffffffff9cd23b9d&gt;] __dev_open+0x3dd/0x870
[  324.701765] CPU: 30 UID: 0 PID: 1582 Comm: NetworkManager Not tainted 6.15.0-rc5+ #2 PREEMPT(voluntary)
[  324.701771] Hardware name: Intel Corporation M50FCP2SBSTD/M50FCP2SBSTD, BIOS SE5C741.86B.01.01.0001.2211140926 11/14/2022
[  324.701774] Call Trace:
[  324.701777]  &lt;TASK&gt;
[  324.701779]  dump_stack_lvl+0x5d/0x80
[  324.701788]  ? __dev_open+0x3dd/0x870
[  324.701793]  __might_resched.cold+0x1ef/0x23d
&lt;..&gt;
[  324.701818]  __mutex_lock+0x113/0x1b80
&lt;..&gt;
[  324.701917]  idpf_ctlq_clean_sq+0xad/0x4b0 [idpf]
[  324.701935]  ? kasan_save_track+0x14/0x30
[  324.701941]  idpf_mb_clean+0x143/0x380 [idpf]
&lt;..&gt;
[  324.701991]  idpf_send_mb_msg+0x111/0x720 [idpf]
[  324.702009]  idpf_vc_xn_exec+0x4cc/0x990 [idpf]
[  324.702021]  ? rcu_is_watching+0x12/0xc0
[  324.702035]  idpf_add_del_mac_filters+0x3ed/0xb50 [idpf]
&lt;..&gt;
[  324.702122]  __hw_addr_sync_dev+0x1cf/0x300
[  324.702126]  ? find_held_lock+0x32/0x90
[  324.702134]  idpf_set_rx_mode+0x317/0x390 [idpf]
[  324.702152]  __dev_open+0x3f8/0x870
[  324.702159]  ? __pfx___dev_open+0x10/0x10
[  324.702174]  __dev_change_flags+0x443/0x650
&lt;..&gt;
[  324.702208]  netif_change_flags+0x80/0x160
[  324.702218]  do_setlink.isra.0+0x16a0/0x3960
&lt;..&gt;
[  324.702349]  rtnl_newlink+0x12fd/0x21e0

The sequence is as follows:
	rtnl_newlink()-&gt;
	__dev_change_flags()-&gt;
	__dev_open()-&gt;
	dev_set_rx_mode() - &gt;  # disables BH and grabs "dev-&gt;addr_list_lock"
	idpf_set_rx_mode() -&gt;  # proceed only if VIRTCHNL2_CAP_MACFILTER is ON
	__dev_uc_sync() -&gt;
	idpf_add_mac_filter -&gt;
	idpf_add_del_mac_filters -&gt;
	idpf_send_mb_msg() -&gt;
	idpf_mb_clean() -&gt;
	idpf_ctlq_clean_sq()   # mutex_lock(cq_lock)

Fix by converting cq_lock to a spinlock. All operations under the new
lock are safe except freeing the DMA memory, which may use vunmap(). Fix
by requesting a contiguous physical memory for the DMA mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38392/">CVE-2025-38392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38392">CVE-2025-38392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247169">SUSE bug 1247169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38393</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38393" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38393" ref_url="https://www.suse.com/security/cve/CVE-2025-38393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN

We found a few different systems hung up in writeback waiting on the same
page lock, and one task waiting on the NFS_LAYOUT_DRAIN bit in
pnfs_update_layout(), however the pnfs_layout_hdr's plh_outstanding count
was zero.

It seems most likely that this is another race between the waiter and waker
similar to commit ed0172af5d6f ("SUNRPC: Fix a race to wake a sync task").
Fix it up by applying the advised barrier.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38393/">CVE-2025-38393 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38393">CVE-2025-38393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247170">SUSE bug 1247170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38395</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38395" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38395" ref_url="https://www.suse.com/security/cve/CVE-2025-38395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods

drvdata::gpiods is supposed to hold an array of 'gpio_desc' pointers. But
the memory is allocated for only one pointer. This will lead to
out-of-bounds access later in the code if 'config::ngpios' is &gt; 1. So
fix the code to allocate enough memory to hold 'config::ngpios' of GPIO
descriptors.

While at it, also move the check for memory allocation failure to be below
the allocation to make it more readable.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38395/">CVE-2025-38395 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38395">CVE-2025-38395 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247171">SUSE bug 1247171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38396</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38396" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38396" ref_url="https://www.suse.com/security/cve/CVE-2025-38396" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass

Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create
anonymous inodes with proper security context. This replaces the current
pattern of calling alloc_anon_inode() followed by
inode_init_security_anon() for creating security context manually.

This change also fixes a security regression in secretmem where the
S_PRIVATE flag was not cleared after alloc_anon_inode(), causing
LSM/SELinux checks to be bypassed for secretmem file descriptors.

As guest_memfd currently resides in the KVM module, we need to export this
symbol for use outside the core kernel. In the future, guest_memfd might be
moved to core-mm, at which point the symbols no longer would have to be
exported. When/if that happens is still unclear.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38396/">CVE-2025-38396 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38396">CVE-2025-38396 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247156">SUSE bug 1247156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247158">SUSE bug 1247158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38397</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38397" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38397" ref_url="https://www.suse.com/security/cve/CVE-2025-38397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-multipath: fix suspicious RCU usage warning

When I run the NVME over TCP test in virtme-ng, I get the following
"suspicious RCU usage" warning in nvme_mpath_add_sysfs_link():

'''
[    5.024557][   T44] nvmet: Created nvm controller 1 for subsystem nqn.2025-06.org.nvmexpress.mptcp for NQN nqn.2014-08.org.nvmexpress:uuid:f7f6b5e0-ff97-4894-98ac-c85309e0bc77.
[    5.027401][  T183] nvme nvme0: creating 2 I/O queues.
[    5.029017][  T183] nvme nvme0: mapped 2/0/0 default/read/poll queues.
[    5.032587][  T183] nvme nvme0: new ctrl: NQN "nqn.2025-06.org.nvmexpress.mptcp", addr 127.0.0.1:4420, hostnqn: nqn.2014-08.org.nvmexpress:uuid:f7f6b5e0-ff97-4894-98ac-c85309e0bc77
[    5.042214][   T25]
[    5.042440][   T25] =============================
[    5.042579][   T25] WARNING: suspicious RCU usage
[    5.042705][   T25] 6.16.0-rc3+ #23 Not tainted
[    5.042812][   T25] -----------------------------
[    5.042934][   T25] drivers/nvme/host/multipath.c:1203 RCU-list traversed in non-reader section!!
[    5.043111][   T25]
[    5.043111][   T25] other info that might help us debug this:
[    5.043111][   T25]
[    5.043341][   T25]
[    5.043341][   T25] rcu_scheduler_active = 2, debug_locks = 1
[    5.043502][   T25] 3 locks held by kworker/u9:0/25:
[    5.043615][   T25]  #0: ffff888008730948 ((wq_completion)async){+.+.}-{0:0}, at: process_one_work+0x7ed/0x1350
[    5.043830][   T25]  #1: ffffc900001afd40 ((work_completion)(&amp;entry-&gt;work)){+.+.}-{0:0}, at: process_one_work+0xcf3/0x1350
[    5.044084][   T25]  #2: ffff888013ee0020 (&amp;head-&gt;srcu){.+.+}-{0:0}, at: nvme_mpath_add_sysfs_link.part.0+0xb4/0x3a0
[    5.044300][   T25]
[    5.044300][   T25] stack backtrace:
[    5.044439][   T25] CPU: 0 UID: 0 PID: 25 Comm: kworker/u9:0 Not tainted 6.16.0-rc3+ #23 PREEMPT(full)
[    5.044441][   T25] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[    5.044442][   T25] Workqueue: async async_run_entry_fn
[    5.044445][   T25] Call Trace:
[    5.044446][   T25]  &lt;TASK&gt;
[    5.044449][   T25]  dump_stack_lvl+0x6f/0xb0
[    5.044453][   T25]  lockdep_rcu_suspicious.cold+0x4f/0xb1
[    5.044457][   T25]  nvme_mpath_add_sysfs_link.part.0+0x2fb/0x3a0
[    5.044459][   T25]  ? queue_work_on+0x90/0xf0
[    5.044461][   T25]  ? lockdep_hardirqs_on+0x78/0x110
[    5.044466][   T25]  nvme_mpath_set_live+0x1e9/0x4f0
[    5.044470][   T25]  nvme_mpath_add_disk+0x240/0x2f0
[    5.044472][   T25]  ? __pfx_nvme_mpath_add_disk+0x10/0x10
[    5.044475][   T25]  ? add_disk_fwnode+0x361/0x580
[    5.044480][   T25]  nvme_alloc_ns+0x81c/0x17c0
[    5.044483][   T25]  ? kasan_quarantine_put+0x104/0x240
[    5.044487][   T25]  ? __pfx_nvme_alloc_ns+0x10/0x10
[    5.044495][   T25]  ? __pfx_nvme_find_get_ns+0x10/0x10
[    5.044496][   T25]  ? rcu_read_lock_any_held+0x45/0xa0
[    5.044498][   T25]  ? validate_chain+0x232/0x4f0
[    5.044503][   T25]  nvme_scan_ns+0x4c8/0x810
[    5.044506][   T25]  ? __pfx_nvme_scan_ns+0x10/0x10
[    5.044508][   T25]  ? find_held_lock+0x2b/0x80
[    5.044512][   T25]  ? ktime_get+0x16d/0x220
[    5.044517][   T25]  ? kvm_clock_get_cycles+0x18/0x30
[    5.044520][   T25]  ? __pfx_nvme_scan_ns_async+0x10/0x10
[    5.044522][   T25]  async_run_entry_fn+0x97/0x560
[    5.044523][   T25]  ? rcu_is_watching+0x12/0xc0
[    5.044526][   T25]  process_one_work+0xd3c/0x1350
[    5.044532][   T25]  ? __pfx_process_one_work+0x10/0x10
[    5.044536][   T25]  ? assign_work+0x16c/0x240
[    5.044539][   T25]  worker_thread+0x4da/0xd50
[    5.044545][   T25]  ? __pfx_worker_thread+0x10/0x10
[    5.044546][   T25]  kthread+0x356/0x5c0
[    5.044548][   T25]  ? __pfx_kthread+0x10/0x10
[    5.044549][   T25]  ? ret_from_fork+0x1b/0x2e0
[    5.044552][   T25]  ? __lock_release.isra.0+0x5d/0x180
[    5.044553][   T25]  ? ret_from_fork+0x1b/0x2e0
[    5.044555][   T25]  ? rcu_is_watching+0x12/0xc0
[    5.044557][   T25]  ? __pfx_kthread+0x10/0x10
[    5.04
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38397/">CVE-2025-38397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38397">CVE-2025-38397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247163">SUSE bug 1247163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38399</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38399" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38399" ref_url="https://www.suse.com/security/cve/CVE-2025-38399" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port()

The function core_scsi3_decode_spec_i_port(), in its error code path,
unconditionally calls core_scsi3_lunacl_undepend_item() passing the
dest_se_deve pointer, which may be NULL.

This can lead to a NULL pointer dereference if dest_se_deve remains
unset.

SPC-3 PR SPEC_I_PT: Unable to locate dest_tpg
Unable to handle kernel paging request at virtual address dfff800000000012
Call trace:
  core_scsi3_lunacl_undepend_item+0x2c/0xf0 [target_core_mod] (P)
  core_scsi3_decode_spec_i_port+0x120c/0x1c30 [target_core_mod]
  core_scsi3_emulate_pro_register+0x6b8/0xcd8 [target_core_mod]
  target_scsi3_emulate_pr_out+0x56c/0x840 [target_core_mod]

Fix this by adding a NULL check before calling
core_scsi3_lunacl_undepend_item()
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38399/">CVE-2025-38399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38399">CVE-2025-38399 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247097">SUSE bug 1247097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38400</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38400" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38400" ref_url="https://www.suse.com/security/cve/CVE-2025-38400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails.

syzbot reported a warning below [1] following a fault injection in
nfs_fs_proc_net_init(). [0]

When nfs_fs_proc_net_init() fails, /proc/net/rpc/nfs is not removed.

Later, rpc_proc_exit() tries to remove /proc/net/rpc, and the warning
is logged as the directory is not empty.

Let's handle the error of nfs_fs_proc_net_init() properly.

[0]:
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 UID: 0 PID: 6120 Comm: syz.2.27 Not tainted 6.16.0-rc1-syzkaller-00010-g2c4a1f3fe03e #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Call Trace:
 &lt;TASK&gt;
  dump_stack_lvl (lib/dump_stack.c:123)
 should_fail_ex (lib/fault-inject.c:73 lib/fault-inject.c:174)
 should_failslab (mm/failslab.c:46)
 kmem_cache_alloc_noprof (mm/slub.c:4178 mm/slub.c:4204)
 __proc_create (fs/proc/generic.c:427)
 proc_create_reg (fs/proc/generic.c:554)
 proc_create_net_data (fs/proc/proc_net.c:120)
 nfs_fs_proc_net_init (fs/nfs/client.c:1409)
 nfs_net_init (fs/nfs/inode.c:2600)
 ops_init (net/core/net_namespace.c:138)
 setup_net (net/core/net_namespace.c:443)
 copy_net_ns (net/core/net_namespace.c:576)
 create_new_namespaces (kernel/nsproxy.c:110)
 unshare_nsproxy_namespaces (kernel/nsproxy.c:218 (discriminator 4))
 ksys_unshare (kernel/fork.c:3123)
 __x64_sys_unshare (kernel/fork.c:3190)
 do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94)
 entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)
 &lt;/TASK&gt;

[1]:
remove_proc_entry: removing non-empty directory 'net/rpc', leaking at least 'nfs'
 WARNING: CPU: 1 PID: 6120 at fs/proc/generic.c:727 remove_proc_entry+0x45e/0x530 fs/proc/generic.c:727
Modules linked in:
CPU: 1 UID: 0 PID: 6120 Comm: syz.2.27 Not tainted 6.16.0-rc1-syzkaller-00010-g2c4a1f3fe03e #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
 RIP: 0010:remove_proc_entry+0x45e/0x530 fs/proc/generic.c:727
Code: 3c 02 00 0f 85 85 00 00 00 48 8b 93 d8 00 00 00 4d 89 f0 4c 89 e9 48 c7 c6 40 ba a2 8b 48 c7 c7 60 b9 a2 8b e8 33 81 1d ff 90 &lt;0f&gt; 0b 90 90 e9 5f fe ff ff e8 04 69 5e ff 90 48 b8 00 00 00 00 00
RSP: 0018:ffffc90003637b08 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff88805f534140 RCX: ffffffff817a92c8
RDX: ffff88807da99e00 RSI: ffffffff817a92d5 RDI: 0000000000000001
RBP: ffff888033431ac0 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffff888033431a00
R13: ffff888033431ae4 R14: ffff888033184724 R15: dffffc0000000000
FS:  0000555580328500(0000) GS:ffff888124a62000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f71733743e0 CR3: 000000007f618000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  sunrpc_exit_net+0x46/0x90 net/sunrpc/sunrpc_syms.c:76
  ops_exit_list net/core/net_namespace.c:200 [inline]
  ops_undo_list+0x2eb/0xab0 net/core/net_namespace.c:253
  setup_net+0x2e1/0x510 net/core/net_namespace.c:457
  copy_net_ns+0x2a6/0x5f0 net/core/net_namespace.c:574
  create_new_namespaces+0x3ea/0xa90 kernel/nsproxy.c:110
  unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:218
  ksys_unshare+0x45b/0xa40 kernel/fork.c:3121
  __do_sys_unshare kernel/fork.c:3192 [inline]
  __se_sys_unshare kernel/fork.c:3190 [inline]
  __x64_sys_unshare+0x31/0x40 kernel/fork.c:3190
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xcd/0x490 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fa1a6b8e929
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38400/">CVE-2025-38400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38400">CVE-2025-38400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247123">SUSE bug 1247123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38401</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38401" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38401" ref_url="https://www.suse.com/security/cve/CVE-2025-38401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtk-sd: Prevent memory corruption from DMA map failure

If msdc_prepare_data() fails to map the DMA region, the request is
not prepared for data receiving, but msdc_start_data() proceeds
the DMA with previous setting.
Since this will lead a memory corruption, we have to stop the
request operation soon after the msdc_prepare_data() fails to
prepare it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38401/">CVE-2025-38401 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38401">CVE-2025-38401 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247125">SUSE bug 1247125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38402</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38402" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38402" ref_url="https://www.suse.com/security/cve/CVE-2025-38402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: return 0 size for RSS key if not supported

Returning -EOPNOTSUPP from function returning u32 is leading to
cast and invalid size value as a result.

-EOPNOTSUPP as a size probably will lead to allocation fail.

Command: ethtool -x eth0
It is visible on all devices that don't have RSS caps set.

[  136.615917] Call Trace:
[  136.615921]  &lt;TASK&gt;
[  136.615927]  ? __warn+0x89/0x130
[  136.615942]  ? __alloc_frozen_pages_noprof+0x322/0x330
[  136.615953]  ? report_bug+0x164/0x190
[  136.615968]  ? handle_bug+0x58/0x90
[  136.615979]  ? exc_invalid_op+0x17/0x70
[  136.615987]  ? asm_exc_invalid_op+0x1a/0x20
[  136.616001]  ? rss_prepare_get.constprop.0+0xb9/0x170
[  136.616016]  ? __alloc_frozen_pages_noprof+0x322/0x330
[  136.616028]  __alloc_pages_noprof+0xe/0x20
[  136.616038]  ___kmalloc_large_node+0x80/0x110
[  136.616072]  __kmalloc_large_node_noprof+0x1d/0xa0
[  136.616081]  __kmalloc_noprof+0x32c/0x4c0
[  136.616098]  ? rss_prepare_get.constprop.0+0xb9/0x170
[  136.616105]  rss_prepare_get.constprop.0+0xb9/0x170
[  136.616114]  ethnl_default_doit+0x107/0x3d0
[  136.616131]  genl_family_rcv_msg_doit+0x100/0x160
[  136.616147]  genl_rcv_msg+0x1b8/0x2c0
[  136.616156]  ? __pfx_ethnl_default_doit+0x10/0x10
[  136.616168]  ? __pfx_genl_rcv_msg+0x10/0x10
[  136.616176]  netlink_rcv_skb+0x58/0x110
[  136.616186]  genl_rcv+0x28/0x40
[  136.616195]  netlink_unicast+0x19b/0x290
[  136.616206]  netlink_sendmsg+0x222/0x490
[  136.616215]  __sys_sendto+0x1fd/0x210
[  136.616233]  __x64_sys_sendto+0x24/0x30
[  136.616242]  do_syscall_64+0x82/0x160
[  136.616252]  ? __sys_recvmsg+0x83/0xe0
[  136.616265]  ? syscall_exit_to_user_mode+0x10/0x210
[  136.616275]  ? do_syscall_64+0x8e/0x160
[  136.616282]  ? __count_memcg_events+0xa1/0x130
[  136.616295]  ? count_memcg_events.constprop.0+0x1a/0x30
[  136.616306]  ? handle_mm_fault+0xae/0x2d0
[  136.616319]  ? do_user_addr_fault+0x379/0x670
[  136.616328]  ? clear_bhb_loop+0x45/0xa0
[  136.616340]  ? clear_bhb_loop+0x45/0xa0
[  136.616349]  ? clear_bhb_loop+0x45/0xa0
[  136.616359]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  136.616369] RIP: 0033:0x7fd30ba7b047
[  136.616376] Code: 0c 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 80 3d bd d5 0c 00 00 41 89 ca 74 10 b8 2c 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 71 c3 55 48 83 ec 30 44 89 4c 24 2c 4c 89 44
[  136.616381] RSP: 002b:00007ffde1796d68 EFLAGS: 00000202 ORIG_RAX: 000000000000002c
[  136.616388] RAX: ffffffffffffffda RBX: 000055d7bd89f2a0 RCX: 00007fd30ba7b047
[  136.616392] RDX: 0000000000000028 RSI: 000055d7bd89f3b0 RDI: 0000000000000003
[  136.616396] RBP: 00007ffde1796e10 R08: 00007fd30bb4e200 R09: 000000000000000c
[  136.616399] R10: 0000000000000000 R11: 0000000000000202 R12: 000055d7bd89f340
[  136.616403] R13: 000055d7bd89f3b0 R14: 000055d78943f200 R15: 0000000000000000
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38402/">CVE-2025-38402 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38402">CVE-2025-38402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247262">SUSE bug 1247262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38403</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38403" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38403" ref_url="https://www.suse.com/security/cve/CVE-2025-38403" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock/vmci: Clear the vmci transport packet properly when initializing it

In vmci_transport_packet_init memset the vmci_transport_packet before
populating the fields to avoid any uninitialised data being left in the
structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38403/">CVE-2025-38403 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38403">CVE-2025-38403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247141">SUSE bug 1247141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38404</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38404" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38404" ref_url="https://www.suse.com/security/cve/CVE-2025-38404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: displayport: Fix potential deadlock

The deadlock can occur due to a recursive lock acquisition of
`cros_typec_altmode_data::mutex`.
The call chain is as follows:
1. cros_typec_altmode_work() acquires the mutex
2. typec_altmode_vdm() -&gt; dp_altmode_vdm() -&gt;
3. typec_altmode_exit() -&gt; cros_typec_altmode_exit()
4. cros_typec_altmode_exit() attempts to acquire the mutex again

To prevent this, defer the `typec_altmode_exit()` call by scheduling
it rather than calling it directly from within the mutex-protected
context.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38404/">CVE-2025-38404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38404">CVE-2025-38404 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247271">SUSE bug 1247271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38405</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38405" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38405" ref_url="https://www.suse.com/security/cve/CVE-2025-38405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: fix memory leak of bio integrity

If nvmet receives commands with metadata there is a continuous memory
leak of kmalloc-128 slab or more precisely bio-&gt;bi_integrity.

Since commit bf4c89fc8797 ("block: don't call bio_uninit from bio_endio")
each user of bio_init has to use bio_uninit as well. Otherwise the bio
integrity is not getting free. Nvmet uses bio_init for inline bios.

Uninit the inline bio to complete deallocation of integrity in bio.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38405/">CVE-2025-38405 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38405">CVE-2025-38405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247270">SUSE bug 1247270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38406</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38406" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38406" ref_url="https://www.suse.com/security/cve/CVE-2025-38406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath6kl: remove WARN on bad firmware input

If the firmware gives bad input, that's nothing to do with
the driver's stack at this point etc., so the WARN_ON()
doesn't add any value. Additionally, this is one of the
top syzbot reports now. Just print a message, and as an
added bonus, print the sizes too.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38406/">CVE-2025-38406 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38406">CVE-2025-38406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247210">SUSE bug 1247210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38408</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38408" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38408" ref_url="https://www.suse.com/security/cve/CVE-2025-38408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

genirq/irq_sim: Initialize work context pointers properly

Initialize `ops` member's pointers properly by using kzalloc() instead of
kmalloc() when allocating the simulation work context. Otherwise the
pointers contain random content leading to invalid dereferencing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38408/">CVE-2025-38408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38408">CVE-2025-38408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247126">SUSE bug 1247126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38409</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38409" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38409" ref_url="https://www.suse.com/security/cve/CVE-2025-38409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Fix another leak in the submit error path

put_unused_fd() doesn't free the installed file, if we've already done
fd_install().  So we need to also free the sync_file.

Patchwork: https://patchwork.freedesktop.org/patch/653583/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38409/">CVE-2025-38409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38409">CVE-2025-38409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247285">SUSE bug 1247285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38410</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38410" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38410" ref_url="https://www.suse.com/security/cve/CVE-2025-38410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Fix a fence leak in submit error path

In error paths, we could unref the submit without calling
drm_sched_entity_push_job(), so msm_job_free() will never get
called.  Since drm_sched_job_cleanup() will NULL out the
s_fence, we can use that to detect this case.

Patchwork: https://patchwork.freedesktop.org/patch/653584/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38410/">CVE-2025-38410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38410">CVE-2025-38410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247128">SUSE bug 1247128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38412</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38412" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38412" ref_url="https://www.suse.com/security/cve/CVE-2025-38412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs callbacks

After retrieving WMI data blocks in sysfs callbacks, check for the
validity of them before dereferencing their content.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38412/">CVE-2025-38412 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38412">CVE-2025-38412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247132">SUSE bug 1247132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38413</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38413" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38413" ref_url="https://www.suse.com/security/cve/CVE-2025-38413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-net: xsk: rx: fix the frame's length check

When calling buf_to_xdp, the len argument is the frame data's length
without virtio header's length (vi-&gt;hdr_len). We check that len with

	xsk_pool_get_rx_frame_size() + vi-&gt;hdr_len

to ensure the provided len does not larger than the allocated chunk
size. The additional vi-&gt;hdr_len is because in virtnet_add_recvbuf_xsk,
we use part of XDP_PACKET_HEADROOM for virtio header and ask the vhost
to start placing data from

	hard_start + XDP_PACKET_HEADROOM - vi-&gt;hdr_len
not
	hard_start + XDP_PACKET_HEADROOM

But the first buffer has virtio_header, so the maximum frame's length in
the first buffer can only be

	xsk_pool_get_rx_frame_size()
not
	xsk_pool_get_rx_frame_size() + vi-&gt;hdr_len

like in the current check.

This commit adds an additional argument to buf_to_xdp differentiate
between the first buffer and other ones to correctly calculate the maximum
frame's length.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38413/">CVE-2025-38413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38413">CVE-2025-38413 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247131">SUSE bug 1247131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38414</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38414" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38414" ref_url="https://www.suse.com/security/cve/CVE-2025-38414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix GCC_GCC_PCIE_HOT_RST definition for WCN7850

GCC_GCC_PCIE_HOT_RST is wrongly defined for WCN7850, causing kernel crash
on some specific platforms.

Since this register is divergent for WCN7850 and QCN9274, move it to
register table to allow different definitions. Then correct the register
address for WCN7850 to fix this issue.

Note IPQ5332 is not affected as it is not PCIe based device.

Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38414/">CVE-2025-38414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38414">CVE-2025-38414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247145">SUSE bug 1247145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38415</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38415" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38415" ref_url="https://www.suse.com/security/cve/CVE-2025-38415" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002621.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Squashfs: check return result of sb_min_blocksize

Syzkaller reports an "UBSAN: shift-out-of-bounds in squashfs_bio_read" bug.

Syzkaller forks multiple processes which after mounting the Squashfs
filesystem, issues an ioctl("/dev/loop0", LOOP_SET_BLOCK_SIZE, 0x8000). 
Now if this ioctl occurs at the same time another process is in the
process of mounting a Squashfs filesystem on /dev/loop0, the failure
occurs.  When this happens the following code in squashfs_fill_super()
fails.

----
msblk-&gt;devblksize = sb_min_blocksize(sb, SQUASHFS_DEVBLK_SIZE);
msblk-&gt;devblksize_log2 = ffz(~msblk-&gt;devblksize);
----

sb_min_blocksize() returns 0, which means msblk-&gt;devblksize is set to 0.

As a result, ffz(~msblk-&gt;devblksize) returns 64, and msblk-&gt;devblksize_log2
is set to 64.

This subsequently causes the

UBSAN: shift-out-of-bounds in fs/squashfs/block.c:195:36
shift exponent 64 is too large for 64-bit type 'u64' (aka
'unsigned long long')

This commit adds a check for a 0 return by sb_min_blocksize().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38415/">CVE-2025-38415 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38415">CVE-2025-38415 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247147">SUSE bug 1247147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38416</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38416" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38416" ref_url="https://www.suse.com/security/cve/CVE-2025-38416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFC: nci: uart: Set tty-&gt;disc_data only in success path

Setting tty-&gt;disc_data before opening the NCI device means we need to
clean it up on error paths.  This also opens some short window if device
starts sending data, even before NCIUARTSETDRIVER IOCTL succeeded
(broken hardware?).  Close the window by exposing tty-&gt;disc_data only on
the success path, when opening of the NCI device and try_module_get()
succeeds.

The code differs in error path in one aspect: tty-&gt;disc_data won't be
ever assigned thus NULL-ified.  This however should not be relevant
difference, because of "tty-&gt;disc_data=NULL" in nci_uart_tty_open().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38416/">CVE-2025-38416 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38416">CVE-2025-38416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247151">SUSE bug 1247151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38417</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38417" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38417" ref_url="https://www.suse.com/security/cve/CVE-2025-38417" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14420" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix eswitch code memory leak in reset scenario

Add simple eswitch mode checker in attaching VF procedure and allocate
required port representor memory structures only in switchdev mode.
The reset flows triggers VF (if present) detach/attach procedure.
It might involve VF port representor(s) re-creation if the device is
configured is switchdev mode (not legacy one).
The memory was blindly allocated in current implementation,
regardless of the mode and not freed if in legacy mode.

Kmemeleak trace:
unreferenced object (percpu) 0x7e3bce5b888458 (size 40):
  comm "bash", pid 1784, jiffies 4295743894
  hex dump (first 32 bytes on cpu 45):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 0):
    pcpu_alloc_noprof+0x4c4/0x7c0
    ice_repr_create+0x66/0x130 [ice]
    ice_repr_create_vf+0x22/0x70 [ice]
    ice_eswitch_attach_vf+0x1b/0xa0 [ice]
    ice_reset_all_vfs+0x1dd/0x2f0 [ice]
    ice_pci_err_resume+0x3b/0xb0 [ice]
    pci_reset_function+0x8f/0x120
    reset_store+0x56/0xa0
    kernfs_fop_write_iter+0x120/0x1b0
    vfs_write+0x31c/0x430
    ksys_write+0x61/0xd0
    do_syscall_64+0x5b/0x180
    entry_SYSCALL_64_after_hwframe+0x76/0x7e

Testing hints (ethX is PF netdev):
- create at least one VF
    echo 1 &gt; /sys/class/net/ethX/device/sriov_numvfs
- trigger the reset
    echo 1 &gt; /sys/class/net/ethX/device/reset
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38417/">CVE-2025-38417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38417">CVE-2025-38417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247282">SUSE bug 1247282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38418</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38418" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38418" ref_url="https://www.suse.com/security/cve/CVE-2025-38418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

remoteproc: core: Release rproc-&gt;clean_table after rproc_attach() fails

When rproc-&gt;state = RPROC_DETACHED is attached to remote processor
through rproc_attach(), if rproc_handle_resources() returns failure,
then the clean table should be released, otherwise the following
memory leak will occur.

unreferenced object 0xffff000086a99800 (size 1024):
comm "kworker/u12:3", pid 59, jiffies 4294893670 (age 121.140s)
hex dump (first 32 bytes):
00 00 00 00 00 80 00 00 00 00 00 00 00 00 10 00 ............
00 00 00 00 00 00 08 00 00 00 00 00 00 00 00 00 ............
backtrace:
 [&lt;000000008bbe4ca8&gt;] slab_post_alloc_hook+0x98/0x3fc
 [&lt;000000003b8a272b&gt;] __kmem_cache_alloc_node+0x13c/0x230
 [&lt;000000007a507c51&gt;] __kmalloc_node_track_caller+0x5c/0x260
 [&lt;0000000037818dae&gt;] kmemdup+0x34/0x60
 [&lt;00000000610f7f57&gt;] rproc_boot+0x35c/0x56c
 [&lt;0000000065f8871a&gt;] rproc_add+0x124/0x17c
 [&lt;00000000497416ee&gt;] imx_rproc_probe+0x4ec/0x5d4
 [&lt;000000003bcaa37d&gt;] platform_probe+0x68/0xd8
 [&lt;00000000771577f9&gt;] really_probe+0x110/0x27c
 [&lt;00000000531fea59&gt;] __driver_probe_device+0x78/0x12c
 [&lt;0000000080036a04&gt;] driver_probe_device+0x3c/0x118
 [&lt;000000007e0bddcb&gt;] __device_attach_driver+0xb8/0xf8
 [&lt;000000000cf1fa33&gt;] bus_for_each_drv+0x84/0xe4
 [&lt;000000001a53b53e&gt;] __device_attach+0xfc/0x18c
 [&lt;00000000d1a2a32c&gt;] device_initial_probe+0x14/0x20
 [&lt;00000000d8f8b7ae&gt;] bus_probe_device+0xb0/0xb4
 unreferenced object 0xffff0000864c9690 (size 16):
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38418/">CVE-2025-38418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38418">CVE-2025-38418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247137">SUSE bug 1247137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38419</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38419" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38419" ref_url="https://www.suse.com/security/cve/CVE-2025-38419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach()

When rproc-&gt;state = RPROC_DETACHED and rproc_attach() is used
to attach to the remote processor, if rproc_handle_resources()
returns a failure, the resources allocated by imx_rproc_prepare()
should be released, otherwise the following memory leak will occur.

Since almost the same thing is done in imx_rproc_prepare() and
rproc_resource_cleanup(), Function rproc_resource_cleanup() is able
to deal with empty lists so it is better to fix the "goto" statements
in rproc_attach(). replace the "unprepare_device" goto statement with
"clean_up_resources" and get rid of the "unprepare_device" label.

unreferenced object 0xffff0000861c5d00 (size 128):
comm "kworker/u12:3", pid 59, jiffies 4294893509 (age 149.220s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 02 88 00 00 00 00 00 00 10 00 00 00 00 00 ............
backtrace:
 [&lt;00000000f949fe18&gt;] slab_post_alloc_hook+0x98/0x37c
 [&lt;00000000adbfb3e7&gt;] __kmem_cache_alloc_node+0x138/0x2e0
 [&lt;00000000521c0345&gt;] kmalloc_trace+0x40/0x158
 [&lt;000000004e330a49&gt;] rproc_mem_entry_init+0x60/0xf8
 [&lt;000000002815755e&gt;] imx_rproc_prepare+0xe0/0x180
 [&lt;0000000003f61b4e&gt;] rproc_boot+0x2ec/0x528
 [&lt;00000000e7e994ac&gt;] rproc_add+0x124/0x17c
 [&lt;0000000048594076&gt;] imx_rproc_probe+0x4ec/0x5d4
 [&lt;00000000efc298a1&gt;] platform_probe+0x68/0xd8
 [&lt;00000000110be6fe&gt;] really_probe+0x110/0x27c
 [&lt;00000000e245c0ae&gt;] __driver_probe_device+0x78/0x12c
 [&lt;00000000f61f6f5e&gt;] driver_probe_device+0x3c/0x118
 [&lt;00000000a7874938&gt;] __device_attach_driver+0xb8/0xf8
 [&lt;0000000065319e69&gt;] bus_for_each_drv+0x84/0xe4
 [&lt;00000000db3eb243&gt;] __device_attach+0xfc/0x18c
 [&lt;0000000072e4e1a4&gt;] device_initial_probe+0x14/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38419/">CVE-2025-38419 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38419">CVE-2025-38419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247136">SUSE bug 1247136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38420</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38420" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38420" ref_url="https://www.suse.com/security/cve/CVE-2025-38420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: carl9170: do not ping device which has failed to load firmware

Syzkaller reports [1, 2] crashes caused by an attempts to ping
the device which has failed to load firmware. Since such a device
doesn't pass 'ieee80211_register_hw()', an internal workqueue
managed by 'ieee80211_queue_work()' is not yet created and an
attempt to queue work on it causes null-ptr-deref.

[1] https://syzkaller.appspot.com/bug?extid=9a4aec827829942045ff
[2] https://syzkaller.appspot.com/bug?extid=0d8afba53e8fb2633217
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38420/">CVE-2025-38420 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38420">CVE-2025-38420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247279">SUSE bug 1247279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38421</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38421" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38421" ref_url="https://www.suse.com/security/cve/CVE-2025-38421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86/amd: pmf: Use device managed allocations

If setting up smart PC fails for any reason then this can lead to
a double free when unloading amd-pmf.  This is because dev-&gt;buf was
freed but never set to NULL and is again freed in amd_pmf_remove().

To avoid subtle allocation bugs in failures leading to a double free
change all allocations into device managed allocations.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38421/">CVE-2025-38421 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38421">CVE-2025-38421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247130">SUSE bug 1247130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247133">SUSE bug 1247133</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38423</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38423" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38423" ref_url="https://www.suse.com/security/cve/CVE-2025-38423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: codecs: wcd9375: Fix double free of regulator supplies

Driver gets regulator supplies in probe path with
devm_regulator_bulk_get(), so should not call regulator_bulk_free() in
error and remove paths to avoid double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38423/">CVE-2025-38423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38423">CVE-2025-38423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247292">SUSE bug 1247292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38424</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38424" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38424" ref_url="https://www.suse.com/security/cve/CVE-2025-38424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: Fix sample vs do_exit()

Baisheng Gao reported an ARM64 crash, which Mark decoded as being a
synchronous external abort -- most likely due to trying to access
MMIO in bad ways.

The crash further shows perf trying to do a user stack sample while in
exit_mmap()'s tlb_finish_mmu() -- i.e. while tearing down the address
space it is trying to access.

It turns out that we stop perf after we tear down the userspace mm; a
receipie for disaster, since perf likes to access userspace for
various reasons.

Flip this order by moving up where we stop perf in do_exit().

Additionally, harden PERF_SAMPLE_CALLCHAIN and PERF_SAMPLE_STACK_USER
to abort when the current task does not have an mm (exit_mm() makes
sure to set current-&gt;mm = NULL; before commencing with the actual
teardown). Such that CPU wide events don't trip on this same problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38424/">CVE-2025-38424 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38424">CVE-2025-38424 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247293">SUSE bug 1247293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38425</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38425" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38425" ref_url="https://www.suse.com/security/cve/CVE-2025-38425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: tegra: check msg length in SMBUS block read

For SMBUS block read, do not continue to read if the message length
passed from the device is '0' or greater than the maximum allowed bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38425/">CVE-2025-38425 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38425">CVE-2025-38425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247251">SUSE bug 1247251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38426</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38426" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38426" ref_url="https://www.suse.com/security/cve/CVE-2025-38426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Add basic validation for RAS header

If RAS header read from EEPROM is corrupted, it could result in trying
to allocate huge memory for reading the records. Add some validation to
header fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38426/">CVE-2025-38426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38426">CVE-2025-38426 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247252">SUSE bug 1247252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38427</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38427" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38427" ref_url="https://www.suse.com/security/cve/CVE-2025-38427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

video: screen_info: Relocate framebuffers behind PCI bridges

Apply PCI host-bridge window offsets to screen_info framebuffers. Fixes
invalid access to I/O memory.

Resources behind a PCI host bridge can be relocated by a certain offset
in the kernel's CPU address range used for I/O. The framebuffer memory
range stored in screen_info refers to the CPU addresses as seen during
boot (where the offset is 0). During boot up, firmware may assign a
different memory offset to the PCI host bridge and thereby relocating
the framebuffer address of the PCI graphics device as seen by the kernel.
The information in screen_info must be updated as well.

The helper pcibios_bus_to_resource() performs the relocation of the
screen_info's framebuffer resource (given in PCI bus addresses). The
result matches the I/O-memory resource of the PCI graphics device (given
in CPU addresses). As before, we store away the information necessary to
later update the information in screen_info itself.

Commit 78aa89d1dfba ("firmware/sysfb: Update screen_info for relocated
EFI framebuffers") added the code for updating screen_info. It is based
on similar functionality that pre-existed in efifb. Efifb uses a pointer
to the PCI resource, while the newer code does a memcpy of the region.
Hence efifb sees any updates to the PCI resource and avoids the issue.

v3:
- Only use struct pci_bus_region for PCI bus addresses (Bjorn)
- Clarify address semantics in commit messages and comments (Bjorn)
v2:
- Fixed tags (Takashi, Ivan)
- Updated information on efifb
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38427/">CVE-2025-38427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38427">CVE-2025-38427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247152">SUSE bug 1247152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38428</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38428" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38428" ref_url="https://www.suse.com/security/cve/CVE-2025-38428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: ims-pcu - check record size in ims_pcu_flash_firmware()

The "len" variable comes from the firmware and we generally do
trust firmware, but it's always better to double check.  If the "len"
is too large it could result in memory corruption when we do
"memcpy(fragment-&gt;data, rec-&gt;data, len);"
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38428/">CVE-2025-38428 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38428">CVE-2025-38428 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247150">SUSE bug 1247150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38429</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38429" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38429" ref_url="https://www.suse.com/security/cve/CVE-2025-38429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: mhi: ep: Update read pointer only after buffer is written

Inside mhi_ep_ring_add_element, the read pointer (rd_offset) is updated
before the buffer is written, potentially causing race conditions where
the host sees an updated read pointer before the buffer is actually
written. Updating rd_offset prematurely can lead to the host accessing
an uninitialized or incomplete element, resulting in data corruption.

Invoke the buffer write before updating rd_offset to ensure the element
is fully written before signaling its availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38429/">CVE-2025-38429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38429">CVE-2025-38429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247253">SUSE bug 1247253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38430</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38430" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38430" ref_url="https://www.suse.com/security/cve/CVE-2025-38430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request

If the request being processed is not a v4 compound request, then
examining the cstate can have undefined results.

This patch adds a check that the rpc procedure being executed
(rq_procinfo) is the NFSPROC4_COMPOUND procedure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38430/">CVE-2025-38430 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38430">CVE-2025-38430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247160">SUSE bug 1247160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38436</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38436" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38436" ref_url="https://www.suse.com/security/cve/CVE-2025-38436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/scheduler: signal scheduled fence when kill job

When an entity from application B is killed, drm_sched_entity_kill()
removes all jobs belonging to that entity through
drm_sched_entity_kill_jobs_work(). If application A's job depends on a
scheduled fence from application B's job, and that fence is not properly
signaled during the killing process, application A's dependency cannot be
cleared.

This leads to application A hanging indefinitely while waiting for a
dependency that will never be resolved. Fix this issue by ensuring that
scheduled fences are properly signaled when an entity is killed, allowing
dependent applications to continue execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38436/">CVE-2025-38436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38436">CVE-2025-38436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247227">SUSE bug 1247227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38438</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38438" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38438" ref_url="https://www.suse.com/security/cve/CVE-2025-38438" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: Intel: hda: Use devm_kstrdup() to avoid memleak.

sof_pdata-&gt;tplg_filename can have address allocated by kstrdup()
and can be overwritten. Memory leak was detected with kmemleak:

unreferenced object 0xffff88812391ff60 (size 16):
  comm "kworker/4:1", pid 161, jiffies 4294802931
  hex dump (first 16 bytes):
    73 6f 66 2d 68 64 61 2d 67 65 6e 65 72 69 63 00  sof-hda-generic.
  backtrace (crc 4bf1675c):
    __kmalloc_node_track_caller_noprof+0x49c/0x6b0
    kstrdup+0x46/0xc0
    hda_machine_select.cold+0x1de/0x12cf [snd_sof_intel_hda_generic]
    sof_init_environment+0x16f/0xb50 [snd_sof]
    sof_probe_continue+0x45/0x7c0 [snd_sof]
    sof_probe_work+0x1e/0x40 [snd_sof]
    process_one_work+0x894/0x14b0
    worker_thread+0x5e5/0xfb0
    kthread+0x39d/0x760
    ret_from_fork+0x31/0x70
    ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38438/">CVE-2025-38438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38438">CVE-2025-38438 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247157">SUSE bug 1247157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38439</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38439" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38439" ref_url="https://www.suse.com/security/cve/CVE-2025-38439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT

When transmitting an XDP_REDIRECT packet, call dma_unmap_len_set()
with the proper length instead of 0.  This bug triggers this warning
on a system with IOMMU enabled:

WARNING: CPU: 36 PID: 0 at drivers/iommu/dma-iommu.c:842 __iommu_dma_unmap+0x159/0x170
RIP: 0010:__iommu_dma_unmap+0x159/0x170
Code: a8 00 00 00 00 48 c7 45 b0 00 00 00 00 48 c7 45 c8 00 00 00 00 48 c7 45 a0 ff ff ff ff 4c 89 45
b8 4c 89 45 c0 e9 77 ff ff ff &lt;0f&gt; 0b e9 60 ff ff ff e8 8b bf 6a 00 66 66 2e 0f 1f 84 00 00 00 00
RSP: 0018:ff22d31181150c88 EFLAGS: 00010206
RAX: 0000000000002000 RBX: 00000000e13a0000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ff22d31181150cf0 R08: ff22d31181150ca8 R09: 0000000000000000
R10: 0000000000000000 R11: ff22d311d36c9d80 R12: 0000000000001000
R13: ff13544d10645010 R14: ff22d31181150c90 R15: ff13544d0b2bac00
FS: 0000000000000000(0000) GS:ff13550908a00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005be909dacff8 CR3: 0008000173408003 CR4: 0000000000f71ef0
PKRU: 55555554
Call Trace:
&lt;IRQ&gt;
? show_regs+0x6d/0x80
? __warn+0x89/0x160
? __iommu_dma_unmap+0x159/0x170
? report_bug+0x17e/0x1b0
? handle_bug+0x46/0x90
? exc_invalid_op+0x18/0x80
? asm_exc_invalid_op+0x1b/0x20
? __iommu_dma_unmap+0x159/0x170
? __iommu_dma_unmap+0xb3/0x170
iommu_dma_unmap_page+0x4f/0x100
dma_unmap_page_attrs+0x52/0x220
? srso_alias_return_thunk+0x5/0xfbef5
? xdp_return_frame+0x2e/0xd0
bnxt_tx_int_xdp+0xdf/0x440 [bnxt_en]
__bnxt_poll_work_done+0x81/0x1e0 [bnxt_en]
bnxt_poll+0xd3/0x1e0 [bnxt_en]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38439/">CVE-2025-38439 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38439">CVE-2025-38439 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247155">SUSE bug 1247155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38440</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38440" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38440" ref_url="https://www.suse.com/security/cve/CVE-2025-38440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix race between DIM disable and net_dim()

There's a race between disabling DIM and NAPI callbacks using the dim
pointer on the RQ or SQ.

If NAPI checks the DIM state bit and sees it still set, it assumes
`rq-&gt;dim` or `sq-&gt;dim` is valid. But if DIM gets disabled right after
that check, the pointer might already be set to NULL, leading to a NULL
pointer dereference in net_dim().

Fix this by calling `synchronize_net()` before freeing the DIM context.
This ensures all in-progress NAPI callbacks are finished before the
pointer is cleared.

Kernel log:

BUG: kernel NULL pointer dereference, address: 0000000000000000
...
RIP: 0010:net_dim+0x23/0x190
...
Call Trace:
 &lt;TASK&gt;
 ? __die+0x20/0x60
 ? page_fault_oops+0x150/0x3e0
 ? common_interrupt+0xf/0xa0
 ? sysvec_call_function_single+0xb/0x90
 ? exc_page_fault+0x74/0x130
 ? asm_exc_page_fault+0x22/0x30
 ? net_dim+0x23/0x190
 ? mlx5e_poll_ico_cq+0x41/0x6f0 [mlx5_core]
 ? sysvec_apic_timer_interrupt+0xb/0x90
 mlx5e_handle_rx_dim+0x92/0xd0 [mlx5_core]
 mlx5e_napi_poll+0x2cd/0xac0 [mlx5_core]
 ? mlx5e_poll_ico_cq+0xe5/0x6f0 [mlx5_core]
 busy_poll_stop+0xa2/0x200
 ? mlx5e_napi_poll+0x1d9/0xac0 [mlx5_core]
 ? mlx5e_trigger_irq+0x130/0x130 [mlx5_core]
 __napi_busy_loop+0x345/0x3b0
 ? sysvec_call_function_single+0xb/0x90
 ? asm_sysvec_call_function_single+0x16/0x20
 ? sysvec_apic_timer_interrupt+0xb/0x90
 ? pcpu_free_area+0x1e4/0x2e0
 napi_busy_loop+0x11/0x20
 xsk_recvmsg+0x10c/0x130
 sock_recvmsg+0x44/0x70
 __sys_recvfrom+0xbc/0x130
 ? __schedule+0x398/0x890
 __x64_sys_recvfrom+0x20/0x30
 do_syscall_64+0x4c/0x100
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
...
---[ end trace 0000000000000000 ]---
...
---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38440/">CVE-2025-38440 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38440">CVE-2025-38440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247290">SUSE bug 1247290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38441</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38441" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38441" ref_url="https://www.suse.com/security/cve/CVE-2025-38441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto()

syzbot found a potential access to uninit-value in nf_flow_pppoe_proto()

Blamed commit forgot the Ethernet header.

BUG: KMSAN: uninit-value in nf_flow_offload_inet_hook+0x7e4/0x940 net/netfilter/nf_flow_table_inet.c:27
  nf_flow_offload_inet_hook+0x7e4/0x940 net/netfilter/nf_flow_table_inet.c:27
  nf_hook_entry_hookfn include/linux/netfilter.h:157 [inline]
  nf_hook_slow+0xe1/0x3d0 net/netfilter/core.c:623
  nf_hook_ingress include/linux/netfilter_netdev.h:34 [inline]
  nf_ingress net/core/dev.c:5742 [inline]
  __netif_receive_skb_core+0x4aff/0x70c0 net/core/dev.c:5837
  __netif_receive_skb_one_core net/core/dev.c:5975 [inline]
  __netif_receive_skb+0xcc/0xac0 net/core/dev.c:6090
  netif_receive_skb_internal net/core/dev.c:6176 [inline]
  netif_receive_skb+0x57/0x630 net/core/dev.c:6235
  tun_rx_batched+0x1df/0x980 drivers/net/tun.c:1485
  tun_get_user+0x4ee0/0x6b40 drivers/net/tun.c:1938
  tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1984
  new_sync_write fs/read_write.c:593 [inline]
  vfs_write+0xb4b/0x1580 fs/read_write.c:686
  ksys_write fs/read_write.c:738 [inline]
  __do_sys_write fs/read_write.c:749 [inline]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38441/">CVE-2025-38441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38441">CVE-2025-38441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247167">SUSE bug 1247167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38443</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38443" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38443" ref_url="https://www.suse.com/security/cve/CVE-2025-38443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nbd: fix uaf in nbd_genl_connect() error path

There is a use-after-free issue in nbd:

block nbd6: Receive control failed (result -104)
block nbd6: shutting down sockets
==================================================================
BUG: KASAN: slab-use-after-free in recv_work+0x694/0xa80 drivers/block/nbd.c:1022
Write of size 4 at addr ffff8880295de478 by task kworker/u33:0/67

CPU: 2 UID: 0 PID: 67 Comm: kworker/u33:0 Not tainted 6.15.0-rc5-syzkaller-00123-g2c89c1b655c0 #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Workqueue: nbd6-recv recv_work
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:408 [inline]
 print_report+0xc3/0x670 mm/kasan/report.c:521
 kasan_report+0xe0/0x110 mm/kasan/report.c:634
 check_region_inline mm/kasan/generic.c:183 [inline]
 kasan_check_range+0xef/0x1a0 mm/kasan/generic.c:189
 instrument_atomic_read_write include/linux/instrumented.h:96 [inline]
 atomic_dec include/linux/atomic/atomic-instrumented.h:592 [inline]
 recv_work+0x694/0xa80 drivers/block/nbd.c:1022
 process_one_work+0x9cc/0x1b70 kernel/workqueue.c:3238
 process_scheduled_works kernel/workqueue.c:3319 [inline]
 worker_thread+0x6c8/0xf10 kernel/workqueue.c:3400
 kthread+0x3c2/0x780 kernel/kthread.c:464
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:153
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

nbd_genl_connect() does not properly stop the device on certain
error paths after nbd_start_device() has been called. This causes
the error path to put nbd-&gt;config while recv_work continue to use
the config after putting it, leading to use-after-free in recv_work.

This patch moves nbd_start_device() after the backend file creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38443/">CVE-2025-38443 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38443">CVE-2025-38443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247164">SUSE bug 1247164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38444</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38444" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38444" ref_url="https://www.suse.com/security/cve/CVE-2025-38444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

raid10: cleanup memleak at raid10_make_request

If raid10_read_request or raid10_write_request registers a new
request and the REQ_NOWAIT flag is set, the code does not
free the malloc from the mempool.

unreferenced object 0xffff8884802c3200 (size 192):
   comm "fio", pid 9197, jiffies 4298078271
   hex dump (first 32 bytes):
     00 00 00 00 00 00 00 00 88 41 02 00 00 00 00 00  .........A......
     08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
   backtrace (crc c1a049a2):
     __kmalloc+0x2bb/0x450
     mempool_alloc+0x11b/0x320
     raid10_make_request+0x19e/0x650 [raid10]
     md_handle_request+0x3b3/0x9e0
     __submit_bio+0x394/0x560
     __submit_bio_noacct+0x145/0x530
     submit_bio_noacct_nocheck+0x682/0x830
     __blkdev_direct_IO_async+0x4dc/0x6b0
     blkdev_read_iter+0x1e5/0x3b0
     __io_read+0x230/0x1110
     io_read+0x13/0x30
     io_issue_sqe+0x134/0x1180
     io_submit_sqes+0x48c/0xe90
     __do_sys_io_uring_enter+0x574/0x8b0
     do_syscall_64+0x5c/0xe0
     entry_SYSCALL_64_after_hwframe+0x76/0x7e

V4: changing backing tree to see if CKI tests will pass.
The patch code has not changed between any versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38444/">CVE-2025-38444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38444">CVE-2025-38444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247162">SUSE bug 1247162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38445</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38445" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38445" ref_url="https://www.suse.com/security/cve/CVE-2025-38445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid1: Fix stack memory use after return in raid1_reshape

In the raid1_reshape function, newpool is
allocated on the stack and assigned to conf-&gt;r1bio_pool.
This results in conf-&gt;r1bio_pool.wait.head pointing
to a stack address.
Accessing this address later can lead to a kernel panic.

Example access path:

raid1_reshape()
{
	// newpool is on the stack
	mempool_t newpool, oldpool;
	// initialize newpool.wait.head to stack address
	mempool_init(&amp;newpool, ...);
	conf-&gt;r1bio_pool = newpool;
}

raid1_read_request() or raid1_write_request()
{
	alloc_r1bio()
	{
		mempool_alloc()
		{
			// if pool-&gt;alloc fails
			remove_element()
			{
				--pool-&gt;curr_nr;
			}
		}
	}
}

mempool_free()
{
	if (pool-&gt;curr_nr &lt; pool-&gt;min_nr) {
		// pool-&gt;wait.head is a stack address
		// wake_up() will try to access this invalid address
		// which leads to a kernel panic
		return;
		wake_up(&amp;pool-&gt;wait);
	}
}

Fix:
reinit conf-&gt;r1bio_pool.wait after assigning newpool.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38445/">CVE-2025-38445 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38445">CVE-2025-38445 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247229">SUSE bug 1247229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38446</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38446" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38446" ref_url="https://www.suse.com/security/cve/CVE-2025-38446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: imx: Fix an out-of-bounds access in dispmix_csr_clk_dev_data

When num_parents is 4, __clk_register() occurs an out-of-bounds
when accessing parent_names member. Use ARRAY_SIZE() instead of
hardcode number here.

 BUG: KASAN: global-out-of-bounds in __clk_register+0x1844/0x20d8
 Read of size 8 at addr ffff800086988e78 by task kworker/u24:3/59
  Hardware name: NXP i.MX95 19X19 board (DT)
  Workqueue: events_unbound deferred_probe_work_func
  Call trace:
    dump_backtrace+0x94/0xec
    show_stack+0x18/0x24
    dump_stack_lvl+0x8c/0xcc
    print_report+0x398/0x5fc
    kasan_report+0xd4/0x114
    __asan_report_load8_noabort+0x20/0x2c
    __clk_register+0x1844/0x20d8
    clk_hw_register+0x44/0x110
    __clk_hw_register_mux+0x284/0x3a8
    imx95_bc_probe+0x4f4/0xa70
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38446/">CVE-2025-38446 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38446">CVE-2025-38446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247231">SUSE bug 1247231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38448</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38448" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38448" ref_url="https://www.suse.com/security/cve/CVE-2025-38448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: u_serial: Fix race condition in TTY wakeup

A race condition occurs when gs_start_io() calls either gs_start_rx() or
gs_start_tx(), as those functions briefly drop the port_lock for
usb_ep_queue(). This allows gs_close() and gserial_disconnect() to clear
port.tty and port_usb, respectively.

Use the null-safe TTY Port helper function to wake up TTY.

Example
  CPU1:			      CPU2:
  gserial_connect() // lock
  			      gs_close() // await lock
  gs_start_rx()     // unlock
  usb_ep_queue()
  			      gs_close() // lock, reset port.tty and unlock
  gs_start_rx()     // lock
  tty_wakeup()      // NPE
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38448/">CVE-2025-38448 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38448">CVE-2025-38448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247233">SUSE bug 1247233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38449</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38449" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38449" ref_url="https://www.suse.com/security/cve/CVE-2025-38449" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15661" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001995.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15785" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/gem: Acquire references on GEM handles for framebuffers

A GEM handle can be released while the GEM buffer object is attached
to a DRM framebuffer. This leads to the release of the dma-buf backing
the buffer object, if any. [1] Trying to use the framebuffer in further
mode-setting operations leads to a segmentation fault. Most easily
happens with driver that use shadow planes for vmap-ing the dma-buf
during a page flip. An example is shown below.

[  156.791968] ------------[ cut here ]------------
[  156.796830] WARNING: CPU: 2 PID: 2255 at drivers/dma-buf/dma-buf.c:1527 dma_buf_vmap+0x224/0x430
[...]
[  156.942028] RIP: 0010:dma_buf_vmap+0x224/0x430
[  157.043420] Call Trace:
[  157.045898]  &lt;TASK&gt;
[  157.048030]  ? show_trace_log_lvl+0x1af/0x2c0
[  157.052436]  ? show_trace_log_lvl+0x1af/0x2c0
[  157.056836]  ? show_trace_log_lvl+0x1af/0x2c0
[  157.061253]  ? drm_gem_shmem_vmap+0x74/0x710
[  157.065567]  ? dma_buf_vmap+0x224/0x430
[  157.069446]  ? __warn.cold+0x58/0xe4
[  157.073061]  ? dma_buf_vmap+0x224/0x430
[  157.077111]  ? report_bug+0x1dd/0x390
[  157.080842]  ? handle_bug+0x5e/0xa0
[  157.084389]  ? exc_invalid_op+0x14/0x50
[  157.088291]  ? asm_exc_invalid_op+0x16/0x20
[  157.092548]  ? dma_buf_vmap+0x224/0x430
[  157.096663]  ? dma_resv_get_singleton+0x6d/0x230
[  157.101341]  ? __pfx_dma_buf_vmap+0x10/0x10
[  157.105588]  ? __pfx_dma_resv_get_singleton+0x10/0x10
[  157.110697]  drm_gem_shmem_vmap+0x74/0x710
[  157.114866]  drm_gem_vmap+0xa9/0x1b0
[  157.118763]  drm_gem_vmap_unlocked+0x46/0xa0
[  157.123086]  drm_gem_fb_vmap+0xab/0x300
[  157.126979]  drm_atomic_helper_prepare_planes.part.0+0x487/0xb10
[  157.133032]  ? lockdep_init_map_type+0x19d/0x880
[  157.137701]  drm_atomic_helper_commit+0x13d/0x2e0
[  157.142671]  ? drm_atomic_nonblocking_commit+0xa0/0x180
[  157.147988]  drm_mode_atomic_ioctl+0x766/0xe40
[...]
[  157.346424] ---[ end trace 0000000000000000 ]---

Acquiring GEM handles for the framebuffer's GEM buffer objects prevents
this from happening. The framebuffer's cleanup later puts the handle
references.

Commit 1a148af06000 ("drm/gem-shmem: Use dma_buf from GEM object
instance") triggers the segmentation fault easily by using the dma-buf
field more widely. The underlying issue with reference counting has
been present before.

v2:
- acquire the handle instead of the BO (Christian)
- fix comment style (Christian)
- drop the Fixes tag (Christian)
- rename err_ gotos
- add missing Link tag
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38449/">CVE-2025-38449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38449">CVE-2025-38449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247255">SUSE bug 1247255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247258">SUSE bug 1247258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38450</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38450" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38450" ref_url="https://www.suse.com/security/cve/CVE-2025-38450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7925: prevent NULL pointer dereference in mt7925_sta_set_decap_offload()

Add a NULL check for msta-&gt;vif before accessing its members to prevent
a kernel panic in AP mode deployment. This also fix the issue reported
in [1].

The crash occurs when this function is triggered before the station is
fully initialized. The call trace shows a page fault at
mt7925_sta_set_decap_offload() due to accessing resources when msta-&gt;vif
is NULL.

Fix this by adding an early return if msta-&gt;vif is NULL and also check
wcid.sta is ready. This ensures we only proceed with decap offload
configuration when the station's state is properly initialized.

[14739.655703] Unable to handle kernel paging request at virtual address ffffffffffffffa0
[14739.811820] CPU: 0 UID: 0 PID: 895854 Comm: hostapd Tainted: G
[14739.821394] Tainted: [C]=CRAP, [O]=OOT_MODULE
[14739.825746] Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT)
[14739.831577] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[14739.838538] pc : mt7925_sta_set_decap_offload+0xc0/0x1b8 [mt7925_common]
[14739.845271] lr : mt7925_sta_set_decap_offload+0x58/0x1b8 [mt7925_common]
[14739.851985] sp : ffffffc085efb500
[14739.855295] x29: ffffffc085efb500 x28: 0000000000000000 x27: ffffff807803a158
[14739.862436] x26: ffffff8041ececb8 x25: 0000000000000001 x24: 0000000000000001
[14739.869577] x23: 0000000000000001 x22: 0000000000000008 x21: ffffff8041ecea88
[14739.876715] x20: ffffff8041c19ca0 x19: ffffff8078031fe0 x18: 0000000000000000
[14739.883853] x17: 0000000000000000 x16: ffffffe2aeac1110 x15: 000000559da48080
[14739.890991] x14: 0000000000000001 x13: 0000000000000000 x12: 0000000000000000
[14739.898130] x11: 0a10020001008e88 x10: 0000000000001a50 x9 : ffffffe26457bfa0
[14739.905269] x8 : ffffff8042013bb0 x7 : ffffff807fb6cbf8 x6 : dead000000000100
[14739.912407] x5 : dead000000000122 x4 : ffffff80780326c8 x3 : 0000000000000000
[14739.919546] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffffff8041ececb8
[14739.926686] Call trace:
[14739.929130]  mt7925_sta_set_decap_offload+0xc0/0x1b8 [mt7925_common]
[14739.935505]  ieee80211_check_fast_rx+0x19c/0x510 [mac80211]
[14739.941344]  _sta_info_move_state+0xe4/0x510 [mac80211]
[14739.946860]  sta_info_move_state+0x1c/0x30 [mac80211]
[14739.952116]  sta_apply_auth_flags.constprop.0+0x90/0x1b0 [mac80211]
[14739.958708]  sta_apply_parameters+0x234/0x5e0 [mac80211]
[14739.964332]  ieee80211_add_station+0xdc/0x190 [mac80211]
[14739.969950]  nl80211_new_station+0x46c/0x670 [cfg80211]
[14739.975516]  genl_family_rcv_msg_doit+0xdc/0x150
[14739.980158]  genl_rcv_msg+0x218/0x298
[14739.983830]  netlink_rcv_skb+0x64/0x138
[14739.987670]  genl_rcv+0x40/0x60
[14739.990816]  netlink_unicast+0x314/0x380
[14739.994742]  netlink_sendmsg+0x198/0x3f0
[14739.998664]  __sock_sendmsg+0x64/0xc0
[14740.002324]  ____sys_sendmsg+0x260/0x298
[14740.006242]  ___sys_sendmsg+0xb4/0x110
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38450/">CVE-2025-38450 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38450">CVE-2025-38450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247376">SUSE bug 1247376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38451</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38451" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38451" ref_url="https://www.suse.com/security/cve/CVE-2025-38451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/md-bitmap: fix GPF in bitmap_get_stats()

The commit message of commit 6ec1f0239485 ("md/md-bitmap: fix stats
collection for external bitmaps") states:

    Remove the external bitmap check as the statistics should be
    available regardless of bitmap storage location.

    Return -EINVAL only for invalid bitmap with no storage (neither in
    superblock nor in external file).

But, the code does not adhere to the above, as it does only check for
a valid super-block for "internal" bitmaps. Hence, we observe:

Oops: GPF, probably for non-canonical address 0x1cd66f1f40000028
RIP: 0010:bitmap_get_stats+0x45/0xd0
Call Trace:

 seq_read_iter+0x2b9/0x46a
 seq_read+0x12f/0x180
 proc_reg_read+0x57/0xb0
 vfs_read+0xf6/0x380
 ksys_read+0x6d/0xf0
 do_syscall_64+0x8c/0x1b0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

We fix this by checking the existence of a super-block for both the
internal and external case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38451/">CVE-2025-38451 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38451">CVE-2025-38451 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247102">SUSE bug 1247102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38453</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38453" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38453" ref_url="https://www.suse.com/security/cve/CVE-2025-38453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/msg_ring: ensure io_kiocb freeing is deferred for RCU

syzbot reports that defer/local task_work adding via msg_ring can hit
a request that has been freed:

CPU: 1 UID: 0 PID: 19356 Comm: iou-wrk-19354 Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:408 [inline]
 print_report+0xd2/0x2b0 mm/kasan/report.c:521
 kasan_report+0x118/0x150 mm/kasan/report.c:634
 io_req_local_work_add io_uring/io_uring.c:1184 [inline]
 __io_req_task_work_add+0x589/0x950 io_uring/io_uring.c:1252
 io_msg_remote_post io_uring/msg_ring.c:103 [inline]
 io_msg_data_remote io_uring/msg_ring.c:133 [inline]
 __io_msg_ring_data+0x820/0xaa0 io_uring/msg_ring.c:151
 io_msg_ring_data io_uring/msg_ring.c:173 [inline]
 io_msg_ring+0x134/0xa00 io_uring/msg_ring.c:314
 __io_issue_sqe+0x17e/0x4b0 io_uring/io_uring.c:1739
 io_issue_sqe+0x165/0xfd0 io_uring/io_uring.c:1762
 io_wq_submit_work+0x6e9/0xb90 io_uring/io_uring.c:1874
 io_worker_handle_work+0x7cd/0x1180 io_uring/io-wq.c:642
 io_wq_worker+0x42f/0xeb0 io_uring/io-wq.c:696
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

which is supposed to be safe with how requests are allocated. But msg
ring requests alloc and free on their own, and hence must defer freeing
to a sane time.

Add an rcu_head and use kfree_rcu() in both spots where requests are
freed. Only the one in io_msg_tw_complete() is strictly required as it
has been visible on the other ring, but use it consistently in the other
spot as well.

This should not cause any other issues outside of KASAN rightfully
complaining about it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38453/">CVE-2025-38453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38453">CVE-2025-38453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247234">SUSE bug 1247234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247737">SUSE bug 1247737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38454</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38454" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38454" ref_url="https://www.suse.com/security/cve/CVE-2025-38454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: ad1816a: Fix potential NULL pointer deref in snd_card_ad1816a_pnp()

Use pr_warn() instead of dev_warn() when 'pdev' is NULL to avoid a
potential NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38454/">CVE-2025-38454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38454">CVE-2025-38454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247426">SUSE bug 1247426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38455</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38455" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38455" ref_url="https://www.suse.com/security/cve/CVE-2025-38455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight

Reject migration of SEV{-ES} state if either the source or destination VM
is actively creating a vCPU, i.e. if kvm_vm_ioctl_create_vcpu() is in the
section between incrementing created_vcpus and online_vcpus.  The bulk of
vCPU creation runs _outside_ of kvm-&gt;lock to allow creating multiple vCPUs
in parallel, and so sev_info.es_active can get toggled from false=&gt;true in
the destination VM after (or during) svm_vcpu_create(), resulting in an
SEV{-ES} VM effectively having a non-SEV{-ES} vCPU.

The issue manifests most visibly as a crash when trying to free a vCPU's
NULL VMSA page in an SEV-ES VM, but any number of things can go wrong.

  BUG: unable to handle page fault for address: ffffebde00000000
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: Oops: 0000 [#1] SMP KASAN NOPTI
  CPU: 227 UID: 0 PID: 64063 Comm: syz.5.60023 Tainted: G     U     O        6.15.0-smp-DEV #2 NONE
  Tainted: [U]=USER, [O]=OOT_MODULE
  Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 12.52.0-0 10/28/2024
  RIP: 0010:constant_test_bit arch/x86/include/asm/bitops.h:206 [inline]
  RIP: 0010:arch_test_bit arch/x86/include/asm/bitops.h:238 [inline]
  RIP: 0010:_test_bit include/asm-generic/bitops/instrumented-non-atomic.h:142 [inline]
  RIP: 0010:PageHead include/linux/page-flags.h:866 [inline]
  RIP: 0010:___free_pages+0x3e/0x120 mm/page_alloc.c:5067
  Code: &lt;49&gt; f7 06 40 00 00 00 75 05 45 31 ff eb 0c 66 90 4c 89 f0 4c 39 f0
  RSP: 0018:ffff8984551978d0 EFLAGS: 00010246
  RAX: 0000777f80000001 RBX: 0000000000000000 RCX: ffffffff918aeb98
  RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffebde00000000
  RBP: 0000000000000000 R08: ffffebde00000007 R09: 1ffffd7bc0000000
  R10: dffffc0000000000 R11: fffff97bc0000001 R12: dffffc0000000000
  R13: ffff8983e19751a8 R14: ffffebde00000000 R15: 1ffffd7bc0000000
  FS:  0000000000000000(0000) GS:ffff89ee661d3000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: ffffebde00000000 CR3: 000000793ceaa000 CR4: 0000000000350ef0
  DR0: 0000000000000000 DR1: 0000000000000b5f DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
  Call Trace:
   &lt;TASK&gt;
   sev_free_vcpu+0x413/0x630 arch/x86/kvm/svm/sev.c:3169
   svm_vcpu_free+0x13a/0x2a0 arch/x86/kvm/svm/svm.c:1515
   kvm_arch_vcpu_destroy+0x6a/0x1d0 arch/x86/kvm/x86.c:12396
   kvm_vcpu_destroy virt/kvm/kvm_main.c:470 [inline]
   kvm_destroy_vcpus+0xd1/0x300 virt/kvm/kvm_main.c:490
   kvm_arch_destroy_vm+0x636/0x820 arch/x86/kvm/x86.c:12895
   kvm_put_kvm+0xb8e/0xfb0 virt/kvm/kvm_main.c:1310
   kvm_vm_release+0x48/0x60 virt/kvm/kvm_main.c:1369
   __fput+0x3e4/0x9e0 fs/file_table.c:465
   task_work_run+0x1a9/0x220 kernel/task_work.c:227
   exit_task_work include/linux/task_work.h:40 [inline]
   do_exit+0x7f0/0x25b0 kernel/exit.c:953
   do_group_exit+0x203/0x2d0 kernel/exit.c:1102
   get_signal+0x1357/0x1480 kernel/signal.c:3034
   arch_do_signal_or_restart+0x40/0x690 arch/x86/kernel/signal.c:337
   exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
   exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline]
   __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
   syscall_exit_to_user_mode+0x67/0xb0 kernel/entry/common.c:218
   do_syscall_64+0x7c/0x150 arch/x86/entry/syscall_64.c:100
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
  RIP: 0033:0x7f87a898e969
   &lt;/TASK&gt;
  Modules linked in: gq(O)
  gsmi: Log Shutdown Reason 0x03
  CR2: ffffebde00000000
  ---[ end trace 0000000000000000 ]---

Deliberately don't check for a NULL VMSA when freeing the vCPU, as crashing
the host is likely desirable due to the VMSA being consumed by hardware.
E.g. if KVM manages to allow VMRUN on the vCPU, hardware may read/write a
bogus VMSA page.  Accessing P
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38455/">CVE-2025-38455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38455">CVE-2025-38455 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247101">SUSE bug 1247101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38456</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38456" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38456" ref_url="https://www.suse.com/security/cve/CVE-2025-38456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipmi:msghandler: Fix potential memory corruption in ipmi_create_user()

The "intf" list iterator is an invalid pointer if the correct
"intf-&gt;intf_num" is not found.  Calling atomic_dec(&amp;intf-&gt;nr_users) on
and invalid pointer will lead to memory corruption.

We don't really need to call atomic_dec() if we haven't called
atomic_add_return() so update the if (intf-&gt;in_shutdown) path as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38456/">CVE-2025-38456 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38456">CVE-2025-38456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247099">SUSE bug 1247099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38457</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38457" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38457" ref_url="https://www.suse.com/security/cve/CVE-2025-38457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Abort __tc_modify_qdisc if parent class does not exist

Lion's patch [1] revealed an ancient bug in the qdisc API.
Whenever a user creates/modifies a qdisc specifying as a parent another
qdisc, the qdisc API will, during grafting, detect that the user is
not trying to attach to a class and reject. However grafting is
performed after qdisc_create (and thus the qdiscs' init callback) is
executed. In qdiscs that eventually call qdisc_tree_reduce_backlog
during init or change (such as fq, hhf, choke, etc), an issue
arises. For example, executing the following commands:

sudo tc qdisc add dev lo root handle a: htb default 2
sudo tc qdisc add dev lo parent a: handle beef fq

Qdiscs such as fq, hhf, choke, etc unconditionally invoke
qdisc_tree_reduce_backlog() in their control path init() or change() which
then causes a failure to find the child class; however, that does not stop
the unconditional invocation of the assumed child qdisc's qlen_notify with
a null class. All these qdiscs make the assumption that class is non-null.

The solution is ensure that qdisc_leaf() which looks up the parent
class, and is invoked prior to qdisc_create(), should return failure on
not finding the class.
In this patch, we leverage qdisc_leaf to return ERR_PTRs whenever the
parentid doesn't correspond to a class, so that we can detect it
earlier on and abort before qdisc_create is called.

[1] https://lore.kernel.org/netdev/d912cbd7-193b-4269-9857-525bee8bbb6a@gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38457/">CVE-2025-38457 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38457">CVE-2025-38457 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247098">SUSE bug 1247098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38458</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38458" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38458" ref_url="https://www.suse.com/security/cve/CVE-2025-38458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: clip: Fix NULL pointer dereference in vcc_sendmsg()

atmarpd_dev_ops does not implement the send method, which may cause crash
as bellow.

BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 0 P4D 0
Oops: Oops: 0010 [#1] SMP KASAN NOPTI
CPU: 0 UID: 0 PID: 5324 Comm: syz.0.0 Not tainted 6.15.0-rc6-syzkaller-00346-g5723cc3450bc #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0018:ffffc9000d3cf778 EFLAGS: 00010246
RAX: 1ffffffff1910dd1 RBX: 00000000000000c0 RCX: dffffc0000000000
RDX: ffffc9000dc82000 RSI: ffff88803e4c4640 RDI: ffff888052cd0000
RBP: ffffc9000d3cf8d0 R08: ffff888052c9143f R09: 1ffff1100a592287
R10: dffffc0000000000 R11: 0000000000000000 R12: 1ffff92001a79f00
R13: ffff888052cd0000 R14: ffff88803e4c4640 R15: ffffffff8c886e88
FS:  00007fbc762566c0(0000) GS:ffff88808d6c2000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 0000000041f1b000 CR4: 0000000000352ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 vcc_sendmsg+0xa10/0xc50 net/atm/common.c:644
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg+0x219/0x270 net/socket.c:727
 ____sys_sendmsg+0x52d/0x830 net/socket.c:2566
 ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2620
 __sys_sendmmsg+0x227/0x430 net/socket.c:2709
 __do_sys_sendmmsg net/socket.c:2736 [inline]
 __se_sys_sendmmsg net/socket.c:2733 [inline]
 __x64_sys_sendmmsg+0xa0/0xc0 net/socket.c:2733
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xf6/0x210 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38458/">CVE-2025-38458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38458">CVE-2025-38458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247116">SUSE bug 1247116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38459</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38459" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38459" ref_url="https://www.suse.com/security/cve/CVE-2025-38459" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: clip: Fix infinite recursive call of clip_push().

syzbot reported the splat below. [0]

This happens if we call ioctl(ATMARP_MKIP) more than once.

During the first call, clip_mkip() sets clip_push() to vcc-&gt;push(),
and the second call copies it to clip_vcc-&gt;old_push().

Later, when the socket is close()d, vcc_destroy_socket() passes
NULL skb to clip_push(), which calls clip_vcc-&gt;old_push(),
triggering the infinite recursion.

Let's prevent the second ioctl(ATMARP_MKIP) by checking
vcc-&gt;user_back, which is allocated by the first call as clip_vcc.

Note also that we use lock_sock() to prevent racy calls.

[0]:
BUG: TASK stack guard page was hit at ffffc9000d66fff8 (stack is ffffc9000d670000..ffffc9000d678000)
Oops: stack guard page: 0000 [#1] SMP KASAN NOPTI
CPU: 0 UID: 0 PID: 5322 Comm: syz.0.0 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:clip_push+0x5/0x720 net/atm/clip.c:191
Code: e0 8f aa 8c e8 1c ad 5b fa eb ae 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 &lt;41&gt; 57 41 56 41 55 41 54 53 48 83 ec 20 48 89 f3 49 89 fd 48 bd 00
RSP: 0018:ffffc9000d670000 EFLAGS: 00010246
RAX: 1ffff1100235a4a5 RBX: ffff888011ad2508 RCX: ffff8880003c0000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888037f01000
RBP: dffffc0000000000 R08: ffffffff8fa104f7 R09: 1ffffffff1f4209e
R10: dffffc0000000000 R11: ffffffff8a99b300 R12: ffffffff8a99b300
R13: ffff888037f01000 R14: ffff888011ad2500 R15: ffff888037f01578
FS:  000055557ab6d500(0000) GS:ffff88808d250000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc9000d66fff8 CR3: 0000000043172000 CR4: 0000000000352ef0
Call Trace:
 &lt;TASK&gt;
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
...
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 vcc_destroy_socket net/atm/common.c:183 [inline]
 vcc_release+0x157/0x460 net/atm/common.c:205
 __sock_release net/socket.c:647 [inline]
 sock_close+0xc0/0x240 net/socket.c:1391
 __fput+0x449/0xa70 fs/file_table.c:465
 task_work_run+0x1d1/0x260 kernel/task_work.c:227
 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
 exit_to_user_mode_loop+0xec/0x110 kernel/entry/common.c:114
 exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline]
 syscall_exit_to_user_mode_work include/linux/entry-common.h:414 [inline]
 syscall_exit_to_user_mode include/linux/entry-common.h:449 [inline]
 do_syscall_64+0x2bd/0x3b0 arch/x86/entry/syscall_64.c:100
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7ff31c98e929
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fffb5aa1f78 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4
RAX: 0000000000000000 RBX: 0000000000012747 RCX: 00007ff31c98e929
RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003
RBP: 00007ff31cbb7ba0 R08: 0000000000000001 R09: 0000000db5aa226f
R10: 00007ff31c7ff030 R11: 0000000000000246 R12: 00007ff31cbb608c
R13: 00007ff31cbb6080 R14: ffffffffffffffff R15: 00007fffb5aa2090
 &lt;/TASK&gt;
Modules linked in:
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38459/">CVE-2025-38459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38459">CVE-2025-38459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247119">SUSE bug 1247119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38460</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38460" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38460" ref_url="https://www.suse.com/security/cve/CVE-2025-38460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: clip: Fix potential null-ptr-deref in to_atmarpd().

atmarpd is protected by RTNL since commit f3a0592b37b8 ("[ATM]: clip
causes unregister hang").

However, it is not enough because to_atmarpd() is called without RTNL,
especially clip_neigh_solicit() / neigh_ops-&gt;solicit() is unsleepable.

Also, there is no RTNL dependency around atmarpd.

Let's use a private mutex and RCU to protect access to atmarpd in
to_atmarpd().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38460/">CVE-2025-38460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38460">CVE-2025-38460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247143">SUSE bug 1247143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38461</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38461" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38461" ref_url="https://www.suse.com/security/cve/CVE-2025-38461" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16372" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: Fix transport_* TOCTOU

Transport assignment may race with module unload. Protect new_transport
from becoming a stale pointer.

This also takes care of an insecure call in vsock_use_local_transport();
add a lockdep assert.

BUG: unable to handle page fault for address: fffffbfff8056000
Oops: Oops: 0000 [#1] SMP KASAN
RIP: 0010:vsock_assign_transport+0x366/0x600
Call Trace:
 vsock_connect+0x59c/0xc40
 __sys_connect+0xe8/0x100
 __x64_sys_connect+0x6e/0xc0
 do_syscall_64+0x92/0x1c0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38461/">CVE-2025-38461 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38461">CVE-2025-38461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247103">SUSE bug 1247103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38462</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38462" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38462" ref_url="https://www.suse.com/security/cve/CVE-2025-38462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: Fix transport_{g2h,h2g} TOCTOU

vsock_find_cid() and vsock_dev_do_ioctl() may race with module unload.
transport_{g2h,h2g} may become NULL after the NULL check.

Introduce vsock_transport_local_cid() to protect from a potential
null-ptr-deref.

KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f]
RIP: 0010:vsock_find_cid+0x47/0x90
Call Trace:
 __vsock_bind+0x4b2/0x720
 vsock_bind+0x90/0xe0
 __sys_bind+0x14d/0x1e0
 __x64_sys_bind+0x6e/0xc0
 do_syscall_64+0x92/0x1c0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53

KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f]
RIP: 0010:vsock_dev_do_ioctl.isra.0+0x58/0xf0
Call Trace:
 __x64_sys_ioctl+0x12d/0x190
 do_syscall_64+0x92/0x1c0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38462/">CVE-2025-38462 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38462">CVE-2025-38462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247104">SUSE bug 1247104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38463</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38463" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38463" ref_url="https://www.suse.com/security/cve/CVE-2025-38463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Correct signedness in skb remaining space calculation

Syzkaller reported a bug [1] where sk-&gt;sk_forward_alloc can overflow.

When we send data, if an skb exists at the tail of the write queue, the
kernel will attempt to append the new data to that skb. However, the code
that checks for available space in the skb is flawed:
'''
copy = size_goal - skb-&gt;len
'''

The types of the variables involved are:
'''
copy: ssize_t (s64 on 64-bit systems)
size_goal: int
skb-&gt;len: unsigned int
'''

Due to C's type promotion rules, the signed size_goal is converted to an
unsigned int to match skb-&gt;len before the subtraction. The result is an
unsigned int.

When this unsigned int result is then assigned to the s64 copy variable,
it is zero-extended, preserving its non-negative value. Consequently, copy
is always &gt;= 0.

Assume we are sending 2GB of data and size_goal has been adjusted to a
value smaller than skb-&gt;len. The subtraction will result in copy holding a
very large positive integer. In the subsequent logic, this large value is
used to update sk-&gt;sk_forward_alloc, which can easily cause it to overflow.

The syzkaller reproducer uses TCP_REPAIR to reliably create this
condition. However, this can also occur in real-world scenarios. The
tcp_bound_to_half_wnd() function can also reduce size_goal to a small
value. This would cause the subsequent tcp_wmem_schedule() to set
sk-&gt;sk_forward_alloc to a value close to INT_MAX. Further memory
allocation requests would then cause sk_forward_alloc to wrap around and
become negative.

[1]: https://syzkaller.appspot.com/bug?extid=de6565462ab540f50e47
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38463/">CVE-2025-38463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38463">CVE-2025-38463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247113">SUSE bug 1247113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38464</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38464" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38464" ref_url="https://www.suse.com/security/cve/CVE-2025-38464" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15008" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001974.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: Fix use-after-free in tipc_conn_close().

syzbot reported a null-ptr-deref in tipc_conn_close() during netns
dismantle. [0]

tipc_topsrv_stop() iterates tipc_net(net)-&gt;topsrv-&gt;conn_idr and calls
tipc_conn_close() for each tipc_conn.

The problem is that tipc_conn_close() is called after releasing the
IDR lock.

At the same time, there might be tipc_conn_recv_work() running and it
could call tipc_conn_close() for the same tipc_conn and release its
last -&gt;kref.

Once we release the IDR lock in tipc_topsrv_stop(), there is no
guarantee that the tipc_conn is alive.

Let's hold the ref before releasing the lock and put the ref after
tipc_conn_close() in tipc_topsrv_stop().

[0]:
BUG: KASAN: use-after-free in tipc_conn_close+0x122/0x140 net/tipc/topsrv.c:165
Read of size 8 at addr ffff888099305a08 by task kworker/u4:3/435

CPU: 0 PID: 435 Comm: kworker/u4:3 Not tainted 4.19.204-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: netns cleanup_net
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1fc/0x2ef lib/dump_stack.c:118
 print_address_description.cold+0x54/0x219 mm/kasan/report.c:256
 kasan_report_error.cold+0x8a/0x1b9 mm/kasan/report.c:354
 kasan_report mm/kasan/report.c:412 [inline]
 __asan_report_load8_noabort+0x88/0x90 mm/kasan/report.c:433
 tipc_conn_close+0x122/0x140 net/tipc/topsrv.c:165
 tipc_topsrv_stop net/tipc/topsrv.c:701 [inline]
 tipc_topsrv_exit_net+0x27b/0x5c0 net/tipc/topsrv.c:722
 ops_exit_list+0xa5/0x150 net/core/net_namespace.c:153
 cleanup_net+0x3b4/0x8b0 net/core/net_namespace.c:553
 process_one_work+0x864/0x1570 kernel/workqueue.c:2153
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
 kthread+0x33f/0x460 kernel/kthread.c:259
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

Allocated by task 23:
 kmem_cache_alloc_trace+0x12f/0x380 mm/slab.c:3625
 kmalloc include/linux/slab.h:515 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 tipc_conn_alloc+0x43/0x4f0 net/tipc/topsrv.c:192
 tipc_topsrv_accept+0x1b5/0x280 net/tipc/topsrv.c:470
 process_one_work+0x864/0x1570 kernel/workqueue.c:2153
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
 kthread+0x33f/0x460 kernel/kthread.c:259
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

Freed by task 23:
 __cache_free mm/slab.c:3503 [inline]
 kfree+0xcc/0x210 mm/slab.c:3822
 tipc_conn_kref_release net/tipc/topsrv.c:150 [inline]
 kref_put include/linux/kref.h:70 [inline]
 conn_put+0x2cd/0x3a0 net/tipc/topsrv.c:155
 process_one_work+0x864/0x1570 kernel/workqueue.c:2153
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
 kthread+0x33f/0x460 kernel/kthread.c:259
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

The buggy address belongs to the object at ffff888099305a00
 which belongs to the cache kmalloc-512 of size 512
The buggy address is located 8 bytes inside of
 512-byte region [ffff888099305a00, ffff888099305c00)
The buggy address belongs to the page:
page:ffffea000264c140 count:1 mapcount:0 mapping:ffff88813bff0940 index:0x0
flags: 0xfff00000000100(slab)
raw: 00fff00000000100 ffffea00028b6b88 ffffea0002cd2b08 ffff88813bff0940
raw: 0000000000000000 ffff888099305000 0000000100000006 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff888099305900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff888099305980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
&gt;ffff888099305a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                      ^
 ffff888099305a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff888099305b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38464/">CVE-2025-38464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38464">CVE-2025-38464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247112">SUSE bug 1247112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38465</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38465" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38465" ref_url="https://www.suse.com/security/cve/CVE-2025-38465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netlink: Fix wraparounds of sk-&gt;sk_rmem_alloc.

Netlink has this pattern in some places

  if (atomic_read(&amp;sk-&gt;sk_rmem_alloc) &gt; sk-&gt;sk_rcvbuf)
  	atomic_add(skb-&gt;truesize, &amp;sk-&gt;sk_rmem_alloc);

, which has the same problem fixed by commit 5a465a0da13e ("udp:
Fix multiple wraparounds of sk-&gt;sk_rmem_alloc.").

For example, if we set INT_MAX to SO_RCVBUFFORCE, the condition
is always false as the two operands are of int.

Then, a single socket can eat as many skb as possible until OOM
happens, and we can see multiple wraparounds of sk-&gt;sk_rmem_alloc.

Let's fix it by using atomic_add_return() and comparing the two
variables as unsigned int.

Before:
  [root@fedora ~]# ss -f netlink
  Recv-Q      Send-Q Local Address:Port                Peer Address:Port
  -1668710080 0               rtnl:nl_wraparound/293               *

After:
  [root@fedora ~]# ss -f netlink
  Recv-Q     Send-Q Local Address:Port                Peer Address:Port
  2147483072 0               rtnl:nl_wraparound/290               *
  ^
  `--- INT_MAX - 576
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38465/">CVE-2025-38465 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38465">CVE-2025-38465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247118">SUSE bug 1247118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38466</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38466" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38466" ref_url="https://www.suse.com/security/cve/CVE-2025-38466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: Revert to requiring CAP_SYS_ADMIN for uprobes

Jann reports that uprobes can be used destructively when used in the
middle of an instruction. The kernel only verifies there is a valid
instruction at the requested offset, but due to variable instruction
length cannot determine if this is an instruction as seen by the
intended execution stream.

Additionally, Mark Rutland notes that on architectures that mix data
in the text segment (like arm64), a similar things can be done if the
data word is 'mistaken' for an instruction.

As such, require CAP_SYS_ADMIN for uprobes.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-38466/">CVE-2025-38466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38466">CVE-2025-38466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247442">SUSE bug 1247442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38467</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38467" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38467" ref_url="https://www.suse.com/security/cve/CVE-2025-38467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling

If there's support for another console device (such as a TTY serial),
the kernel occasionally panics during boot. The panic message and a
relevant snippet of the call stack is as follows:

  Unable to handle kernel NULL pointer dereference at virtual address 000000000000000
  Call trace:
    drm_crtc_handle_vblank+0x10/0x30 (P)
    decon_irq_handler+0x88/0xb4
    [...]

Otherwise, the panics don't happen. This indicates that it's some sort
of race condition.

Add a check to validate if the drm device can handle vblanks before
calling drm_crtc_handle_vblank() to avoid this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38467/">CVE-2025-38467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38467">CVE-2025-38467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247146">SUSE bug 1247146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38468</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38468" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38468" ref_url="https://www.suse.com/security/cve/CVE-2025-38468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree

htb_lookup_leaf has a BUG_ON that can trigger with the following:

tc qdisc del dev lo root
tc qdisc add dev lo root handle 1: htb default 1
tc class add dev lo parent 1: classid 1:1 htb rate 64bit
tc qdisc add dev lo parent 1:1 handle 2: netem
tc qdisc add dev lo parent 2:1 handle 3: blackhole
ping -I lo -c1 -W0.001 127.0.0.1

The root cause is the following:

1. htb_dequeue calls htb_dequeue_tree which calls the dequeue handler on
   the selected leaf qdisc
2. netem_dequeue calls enqueue on the child qdisc
3. blackhole_enqueue drops the packet and returns a value that is not
   just NET_XMIT_SUCCESS
4. Because of this, netem_dequeue calls qdisc_tree_reduce_backlog, and
   since qlen is now 0, it calls htb_qlen_notify -&gt; htb_deactivate -&gt;
   htb_deactiviate_prios -&gt; htb_remove_class_from_row -&gt; htb_safe_rb_erase
5. As this is the only class in the selected hprio rbtree,
   __rb_change_child in __rb_erase_augmented sets the rb_root pointer to
   NULL
6. Because blackhole_dequeue returns NULL, netem_dequeue returns NULL,
   which causes htb_dequeue_tree to call htb_lookup_leaf with the same
   hprio rbtree, and fail the BUG_ON

The function graph for this scenario is shown here:
 0)               |  htb_enqueue() {
 0) + 13.635 us   |    netem_enqueue();
 0)   4.719 us    |    htb_activate_prios();
 0) # 2249.199 us |  }
 0)               |  htb_dequeue() {
 0)   2.355 us    |    htb_lookup_leaf();
 0)               |    netem_dequeue() {
 0) + 11.061 us   |      blackhole_enqueue();
 0)               |      qdisc_tree_reduce_backlog() {
 0)               |        qdisc_lookup_rcu() {
 0)   1.873 us    |          qdisc_match_from_root();
 0)   6.292 us    |        }
 0)   1.894 us    |        htb_search();
 0)               |        htb_qlen_notify() {
 0)   2.655 us    |          htb_deactivate_prios();
 0)   6.933 us    |        }
 0) + 25.227 us   |      }
 0)   1.983 us    |      blackhole_dequeue();
 0) + 86.553 us   |    }
 0) # 2932.761 us |    qdisc_warn_nonwc();
 0)               |    htb_lookup_leaf() {
 0)               |      BUG_ON();
 ------------------------------------------

The full original bug report can be seen here [1].

We can fix this just by returning NULL instead of the BUG_ON,
as htb_dequeue_tree returns NULL when htb_lookup_leaf returns
NULL.

[1] https://lore.kernel.org/netdev/pF5XOOIim0IuEfhI-SOxTgRvNoDwuux7UHKnE_Y5-zVd4wmGvNk2ceHjKb8ORnzw0cGwfmVu42g9dL7XyJLf1NEzaztboTWcm0Ogxuojoeo=@willsroot.io/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38468/">CVE-2025-38468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38468">CVE-2025-38468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247437">SUSE bug 1247437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38470</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38470" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38470" ref_url="https://www.suse.com/security/cve/CVE-2025-38470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime

Assuming the "rx-vlan-filter" feature is enabled on a net device, the
8021q module will automatically add or remove VLAN 0 when the net device
is put administratively up or down, respectively. There are a couple of
problems with the above scheme.

The first problem is a memory leak that can happen if the "rx-vlan-filter"
feature is disabled while the device is running:

 # ip link add bond1 up type bond mode 0
 # ethtool -K bond1 rx-vlan-filter off
 # ip link del dev bond1

When the device is put administratively down the "rx-vlan-filter"
feature is disabled, so the 8021q module will not remove VLAN 0 and the
memory will be leaked [1].

Another problem that can happen is that the kernel can automatically
delete VLAN 0 when the device is put administratively down despite not
adding it when the device was put administratively up since during that
time the "rx-vlan-filter" feature was disabled. null-ptr-unref or
bug_on[2] will be triggered by unregister_vlan_dev() for refcount
imbalance if toggling filtering during runtime:

$ ip link add bond0 type bond mode 0
$ ip link add link bond0 name vlan0 type vlan id 0 protocol 802.1q
$ ethtool -K bond0 rx-vlan-filter off
$ ifconfig bond0 up
$ ethtool -K bond0 rx-vlan-filter on
$ ifconfig bond0 down
$ ip link del vlan0

Root cause is as below:
step1: add vlan0 for real_dev, such as bond, team.
register_vlan_dev
    vlan_vid_add(real_dev,htons(ETH_P_8021Q),0) //refcnt=1
step2: disable vlan filter feature and enable real_dev
step3: change filter from 0 to 1
vlan_device_event
    vlan_filter_push_vids
        ndo_vlan_rx_add_vid //No refcnt added to real_dev vlan0
step4: real_dev down
vlan_device_event
    vlan_vid_del(dev, htons(ETH_P_8021Q), 0); //refcnt=0
        vlan_info_rcu_free //free vlan0
step5: delete vlan0
unregister_vlan_dev
    BUG_ON(!vlan_info); //vlan_info is null

Fix both problems by noting in the VLAN info whether VLAN 0 was
automatically added upon NETDEV_UP and based on that decide whether it
should be deleted upon NETDEV_DOWN, regardless of the state of the
"rx-vlan-filter" feature.

[1]
unreferenced object 0xffff8880068e3100 (size 256):
  comm "ip", pid 384, jiffies 4296130254
  hex dump (first 32 bytes):
    00 20 30 0d 80 88 ff ff 00 00 00 00 00 00 00 00  . 0.............
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 81ce31fa):
    __kmalloc_cache_noprof+0x2b5/0x340
    vlan_vid_add+0x434/0x940
    vlan_device_event.cold+0x75/0xa8
    notifier_call_chain+0xca/0x150
    __dev_notify_flags+0xe3/0x250
    rtnl_configure_link+0x193/0x260
    rtnl_newlink_create+0x383/0x8e0
    __rtnl_newlink+0x22c/0xa40
    rtnl_newlink+0x627/0xb00
    rtnetlink_rcv_msg+0x6fb/0xb70
    netlink_rcv_skb+0x11f/0x350
    netlink_unicast+0x426/0x710
    netlink_sendmsg+0x75a/0xc20
    __sock_sendmsg+0xc1/0x150
    ____sys_sendmsg+0x5aa/0x7b0
    ___sys_sendmsg+0xfc/0x180

[2]
kernel BUG at net/8021q/vlan.c:99!
Oops: invalid opcode: 0000 [#1] SMP KASAN PTI
CPU: 0 UID: 0 PID: 382 Comm: ip Not tainted 6.16.0-rc3 #61 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:unregister_vlan_dev (net/8021q/vlan.c:99 (discriminator 1))
RSP: 0018:ffff88810badf310 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff88810da84000 RCX: ffffffffb47ceb9a
RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff88810e8b43c8
RBP: 0000000000000000 R08: 0000000000000000 R09: fffffbfff6cefe80
R10: ffffffffb677f407 R11: ffff88810badf3c0 R12: ffff88810e8b4000
R13: 0000000000000000 R14: ffff88810642a5c0 R15: 000000000000017e
FS:  00007f1ff68c20c0(0000) GS:ffff888163a24000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1ff5dad240 CR3: 0000000107e56000 CR4: 00000000000006f0
Call Trace:
 &lt;TASK
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38470/">CVE-2025-38470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38470">CVE-2025-38470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247288">SUSE bug 1247288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38472</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38472" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38472" ref_url="https://www.suse.com/security/cve/CVE-2025-38472" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack: fix crash due to removal of uninitialised entry

A crash in conntrack was reported while trying to unlink the conntrack
entry from the hash bucket list:
    [exception RIP: __nf_ct_delete_from_lists+172]
    [..]
 #7 [ff539b5a2b043aa0] nf_ct_delete at ffffffffc124d421 [nf_conntrack]
 #8 [ff539b5a2b043ad0] nf_ct_gc_expired at ffffffffc124d999 [nf_conntrack]
 #9 [ff539b5a2b043ae0] __nf_conntrack_find_get at ffffffffc124efbc [nf_conntrack]
    [..]

The nf_conn struct is marked as allocated from slab but appears to be in
a partially initialised state:

 ct hlist pointer is garbage; looks like the ct hash value
 (hence crash).
 ct-&gt;status is equal to IPS_CONFIRMED|IPS_DYING, which is expected
 ct-&gt;timeout is 30000 (=30s), which is unexpected.

Everything else looks like normal udp conntrack entry.  If we ignore
ct-&gt;status and pretend its 0, the entry matches those that are newly
allocated but not yet inserted into the hash:
  - ct hlist pointers are overloaded and store/cache the raw tuple hash
  - ct-&gt;timeout matches the relative time expected for a new udp flow
    rather than the absolute 'jiffies' value.

If it were not for the presence of IPS_CONFIRMED,
__nf_conntrack_find_get() would have skipped the entry.

Theory is that we did hit following race:

cpu x 			cpu y			cpu z
 found entry E		found entry E
 E is expired		&lt;preemption&gt;
 nf_ct_delete()
 return E to rcu slab
					init_conntrack
					E is re-inited,
					ct-&gt;status set to 0
					reply tuplehash hnnode.pprev
					stores hash value.

cpu y found E right before it was deleted on cpu x.
E is now re-inited on cpu z.  cpu y was preempted before
checking for expiry and/or confirm bit.

					-&gt;refcnt set to 1
					E now owned by skb
					-&gt;timeout set to 30000

If cpu y were to resume now, it would observe E as
expired but would skip E due to missing CONFIRMED bit.

					nf_conntrack_confirm gets called
					sets: ct-&gt;status |= CONFIRMED
					This is wrong: E is not yet added
					to hashtable.

cpu y resumes, it observes E as expired but CONFIRMED:
			&lt;resumes&gt;
			nf_ct_expired()
			 -&gt; yes (ct-&gt;timeout is 30s)
			confirmed bit set.

cpu y will try to delete E from the hashtable:
			nf_ct_delete() -&gt; set DYING bit
			__nf_ct_delete_from_lists

Even this scenario doesn't guarantee a crash:
cpu z still holds the table bucket lock(s) so y blocks:

			wait for spinlock held by z

					CONFIRMED is set but there is no
					guarantee ct will be added to hash:
					"chaintoolong" or "clash resolution"
					logic both skip the insert step.
					reply hnnode.pprev still stores the
					hash value.

					unlocks spinlock
					return NF_DROP
			&lt;unblocks, then
			 crashes on hlist_nulls_del_rcu pprev&gt;

In case CPU z does insert the entry into the hashtable, cpu y will unlink
E again right away but no crash occurs.

Without 'cpu y' race, 'garbage' hlist is of no consequence:
ct refcnt remains at 1, eventually skb will be free'd and E gets
destroyed via: nf_conntrack_put -&gt; nf_conntrack_destroy -&gt; nf_ct_destroy.

To resolve this, move the IPS_CONFIRMED assignment after the table
insertion but before the unlock.

Pablo points out that the confirm-bit-store could be reordered to happen
before hlist add resp. the timeout fixup, so switch to set_bit and
before_atomic memory barrier to prevent this.

It doesn't matter if other CPUs can observe a newly inserted entry right
before the CONFIRMED bit was set:

Such event cannot be distinguished from above "E is the old incarnation"
case: the entry will be skipped.

Also change nf_ct_should_gc() to first check the confirmed bit.

The gc sequence is:
 1. Check if entry has expired, if not skip to next entry
 2. Obtain a reference to the expired entry.
 3. Call nf_ct_should_gc() to double-check step 1.

nf_ct_should_gc() is thus called only for entries that already failed an
expiry check. After this patch, once the confirmed bit check pas
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38472/">CVE-2025-38472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38472">CVE-2025-38472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247313">SUSE bug 1247313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38473</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38473" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38473" ref_url="https://www.suse.com/security/cve/CVE-2025-38473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb()

syzbot reported null-ptr-deref in l2cap_sock_resume_cb(). [0]

l2cap_sock_resume_cb() has a similar problem that was fixed by commit
1bff51ea59a9 ("Bluetooth: fix use-after-free error in lock_sock_nested()").

Since both l2cap_sock_kill() and l2cap_sock_resume_cb() are executed
under l2cap_sock_resume_cb(), we can avoid the issue simply by checking
if chan-&gt;data is NULL.

Let's not access to the killed socket in l2cap_sock_resume_cb().

[0]:
BUG: KASAN: null-ptr-deref in instrument_atomic_write include/linux/instrumented.h:82 [inline]
BUG: KASAN: null-ptr-deref in clear_bit include/asm-generic/bitops/instrumented-atomic.h:41 [inline]
BUG: KASAN: null-ptr-deref in l2cap_sock_resume_cb+0xb4/0x17c net/bluetooth/l2cap_sock.c:1711
Write of size 8 at addr 0000000000000570 by task kworker/u9:0/52

CPU: 1 UID: 0 PID: 52 Comm: kworker/u9:0 Not tainted 6.16.0-rc4-syzkaller-g7482bb149b9f #0 PREEMPT
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Workqueue: hci0 hci_rx_work
Call trace:
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:501 (C)
 __dump_stack+0x30/0x40 lib/dump_stack.c:94
 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120
 print_report+0x58/0x84 mm/kasan/report.c:524
 kasan_report+0xb0/0x110 mm/kasan/report.c:634
 check_region_inline mm/kasan/generic.c:-1 [inline]
 kasan_check_range+0x264/0x2a4 mm/kasan/generic.c:189
 __kasan_check_write+0x20/0x30 mm/kasan/shadow.c:37
 instrument_atomic_write include/linux/instrumented.h:82 [inline]
 clear_bit include/asm-generic/bitops/instrumented-atomic.h:41 [inline]
 l2cap_sock_resume_cb+0xb4/0x17c net/bluetooth/l2cap_sock.c:1711
 l2cap_security_cfm+0x524/0xea0 net/bluetooth/l2cap_core.c:7357
 hci_auth_cfm include/net/bluetooth/hci_core.h:2092 [inline]
 hci_auth_complete_evt+0x2e8/0xa4c net/bluetooth/hci_event.c:3514
 hci_event_func net/bluetooth/hci_event.c:7511 [inline]
 hci_event_packet+0x650/0xe9c net/bluetooth/hci_event.c:7565
 hci_rx_work+0x320/0xb18 net/bluetooth/hci_core.c:4070
 process_one_work+0x7e8/0x155c kernel/workqueue.c:3238
 process_scheduled_works kernel/workqueue.c:3321 [inline]
 worker_thread+0x958/0xed8 kernel/workqueue.c:3402
 kthread+0x5fc/0x75c kernel/kthread.c:464
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38473/">CVE-2025-38473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38473">CVE-2025-38473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247289">SUSE bug 1247289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38474</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38474" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38474" ref_url="https://www.suse.com/security/cve/CVE-2025-38474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: net: sierra: check for no status endpoint

The driver checks for having three endpoints and
having bulk in and out endpoints, but not that
the third endpoint is interrupt input.
Rectify the omission.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38474/">CVE-2025-38474 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38474">CVE-2025-38474 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247311">SUSE bug 1247311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38475</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38475" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38475" ref_url="https://www.suse.com/security/cve/CVE-2025-38475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smc: Fix various oops due to inet_sock type confusion.

syzbot reported weird splats [0][1] in cipso_v4_sock_setattr() while
freeing inet_sk(sk)-&gt;inet_opt.

The address was freed multiple times even though it was read-only memory.

cipso_v4_sock_setattr() did nothing wrong, and the root cause was type
confusion.

The cited commit made it possible to create smc_sock as an INET socket.

The issue is that struct smc_sock does not have struct inet_sock as the
first member but hijacks AF_INET and AF_INET6 sk_family, which confuses
various places.

In this case, inet_sock.inet_opt was actually smc_sock.clcsk_data_ready(),
which is an address of a function in the text segment.

  $ pahole -C inet_sock vmlinux
  struct inet_sock {
  ...
          struct ip_options_rcu *    inet_opt;             /*   784     8 */

  $ pahole -C smc_sock vmlinux
  struct smc_sock {
  ...
          void                       (*clcsk_data_ready)(struct sock *); /*   784     8 */

The same issue for another field was reported before. [2][3]

At that time, an ugly hack was suggested [4], but it makes both INET
and SMC code error-prone and hard to change.

Also, yet another variant was fixed by a hacky commit 98d4435efcbf3
("net/smc: prevent NULL pointer dereference in txopt_get").

Instead of papering over the root cause by such hacks, we should not
allow non-INET socket to reuse the INET infra.

Let's add inet_sock as the first member of smc_sock.

[0]:
kvfree_call_rcu(): Double-freed call. rcu_head 000000006921da73
WARNING: CPU: 0 PID: 6718 at mm/slab_common.c:1956 kvfree_call_rcu+0x94/0x3f0 mm/slab_common.c:1955
Modules linked in:
CPU: 0 UID: 0 PID: 6718 Comm: syz.0.17 Tainted: G        W           6.16.0-rc4-syzkaller-g7482bb149b9f #0 PREEMPT
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : kvfree_call_rcu+0x94/0x3f0 mm/slab_common.c:1955
lr : kvfree_call_rcu+0x94/0x3f0 mm/slab_common.c:1955
sp : ffff8000a03a7730
x29: ffff8000a03a7730 x28: 00000000fffffff5 x27: 1fffe000184823d3
x26: dfff800000000000 x25: ffff0000c2411e9e x24: ffff0000dd88da00
x23: ffff8000891ac9a0 x22: 00000000ffffffea x21: ffff8000891ac9a0
x20: ffff8000891ac9a0 x19: ffff80008afc2480 x18: 00000000ffffffff
x17: 0000000000000000 x16: ffff80008ae642c8 x15: ffff700011ede14c
x14: 1ffff00011ede14c x13: 0000000000000004 x12: ffffffffffffffff
x11: ffff700011ede14c x10: 0000000000ff0100 x9 : 5fa3c1ffaf0ff000
x8 : 5fa3c1ffaf0ff000 x7 : 0000000000000001 x6 : 0000000000000001
x5 : ffff8000a03a7078 x4 : ffff80008f766c20 x3 : ffff80008054d360
x2 : 0000000000000000 x1 : 0000000000000201 x0 : 0000000000000000
Call trace:
 kvfree_call_rcu+0x94/0x3f0 mm/slab_common.c:1955 (P)
 cipso_v4_sock_setattr+0x2f0/0x3f4 net/ipv4/cipso_ipv4.c:1914
 netlbl_sock_setattr+0x240/0x334 net/netlabel/netlabel_kapi.c:1000
 smack_netlbl_add+0xa8/0x158 security/smack/smack_lsm.c:2581
 smack_inode_setsecurity+0x378/0x430 security/smack/smack_lsm.c:2912
 security_inode_setsecurity+0x118/0x3c0 security/security.c:2706
 __vfs_setxattr_noperm+0x174/0x5c4 fs/xattr.c:251
 __vfs_setxattr_locked+0x1ec/0x218 fs/xattr.c:295
 vfs_setxattr+0x158/0x2ac fs/xattr.c:321
 do_setxattr fs/xattr.c:636 [inline]
 file_setxattr+0x1b8/0x294 fs/xattr.c:646
 path_setxattrat+0x2ac/0x320 fs/xattr.c:711
 __do_sys_fsetxattr fs/xattr.c:761 [inline]
 __se_sys_fsetxattr fs/xattr.c:758 [inline]
 __arm64_sys_fsetxattr+0xc0/0xdc fs/xattr.c:758
 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
 invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
 el0_svc+0x58/0x180 arch/arm64/kernel/entry-common.c:879
 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:898
 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600

[
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38475/">CVE-2025-38475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38475">CVE-2025-38475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247308">SUSE bug 1247308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247309">SUSE bug 1247309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38476</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38476" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38476" ref_url="https://www.suse.com/security/cve/CVE-2025-38476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rpl: Fix use-after-free in rpl_do_srh_inline().

Running lwt_dst_cache_ref_loop.sh in selftest with KASAN triggers
the splat below [0].

rpl_do_srh_inline() fetches ipv6_hdr(skb) and accesses it after
skb_cow_head(), which is illegal as the header could be freed then.

Let's fix it by making oldhdr to a local struct instead of a pointer.

[0]:
[root@fedora net]# ./lwt_dst_cache_ref_loop.sh
...
TEST: rpl (input)
[   57.631529] ==================================================================
BUG: KASAN: slab-use-after-free in rpl_do_srh_inline.isra.0 (net/ipv6/rpl_iptunnel.c:174)
Read of size 40 at addr ffff888122bf96d8 by task ping6/1543

CPU: 50 UID: 0 PID: 1543 Comm: ping6 Not tainted 6.16.0-rc5-01302-gfadd1e6231b1 #23 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl (lib/dump_stack.c:122)
 print_report (mm/kasan/report.c:409 mm/kasan/report.c:521)
 kasan_report (mm/kasan/report.c:221 mm/kasan/report.c:636)
 kasan_check_range (mm/kasan/generic.c:175 (discriminator 1) mm/kasan/generic.c:189 (discriminator 1))
 __asan_memmove (mm/kasan/shadow.c:94 (discriminator 2))
 rpl_do_srh_inline.isra.0 (net/ipv6/rpl_iptunnel.c:174)
 rpl_input (net/ipv6/rpl_iptunnel.c:201 net/ipv6/rpl_iptunnel.c:282)
 lwtunnel_input (net/core/lwtunnel.c:459)
 ipv6_rcv (./include/net/dst.h:471 (discriminator 1) ./include/net/dst.h:469 (discriminator 1) net/ipv6/ip6_input.c:79 (discriminator 1) ./include/linux/netfilter.h:317 (discriminator 1) ./include/linux/netfilter.h:311 (discriminator 1) net/ipv6/ip6_input.c:311 (discriminator 1))
 __netif_receive_skb_one_core (net/core/dev.c:5967)
 process_backlog (./include/linux/rcupdate.h:869 net/core/dev.c:6440)
 __napi_poll.constprop.0 (net/core/dev.c:7452)
 net_rx_action (net/core/dev.c:7518 net/core/dev.c:7643)
 handle_softirqs (kernel/softirq.c:579)
 do_softirq (kernel/softirq.c:480 (discriminator 20))
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 __local_bh_enable_ip (kernel/softirq.c:407)
 __dev_queue_xmit (net/core/dev.c:4740)
 ip6_finish_output2 (./include/linux/netdevice.h:3358 ./include/net/neighbour.h:526 ./include/net/neighbour.h:540 net/ipv6/ip6_output.c:141)
 ip6_finish_output (net/ipv6/ip6_output.c:215 net/ipv6/ip6_output.c:226)
 ip6_output (./include/linux/netfilter.h:306 net/ipv6/ip6_output.c:248)
 ip6_send_skb (net/ipv6/ip6_output.c:1983)
 rawv6_sendmsg (net/ipv6/raw.c:588 net/ipv6/raw.c:918)
 __sys_sendto (net/socket.c:714 (discriminator 1) net/socket.c:729 (discriminator 1) net/socket.c:2228 (discriminator 1))
 __x64_sys_sendto (net/socket.c:2231)
 do_syscall_64 (arch/x86/entry/syscall_64.c:63 (discriminator 1) arch/x86/entry/syscall_64.c:94 (discriminator 1))
 entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)
RIP: 0033:0x7f68cffb2a06
Code: 5d e8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 75 19 83 e2 39 83 fa 08 75 11 e8 26 ff ff ff 66 0f 1f 44 00 00 48 8b 45 10 0f 05 &lt;48&gt; 8b 5d f8 c9 c3 0f 1f 40 00 f3 0f 1e fa 55 48 89 e5 48 83 ec 08
RSP: 002b:00007ffefb7c53d0 EFLAGS: 00000202 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 0000564cd69f10a0 RCX: 00007f68cffb2a06
RDX: 0000000000000040 RSI: 0000564cd69f10a4 RDI: 0000000000000003
RBP: 00007ffefb7c53f0 R08: 0000564cd6a032ac R09: 000000000000001c
R10: 0000000000000000 R11: 0000000000000202 R12: 0000564cd69f10a4
R13: 0000000000000040 R14: 00007ffefb7c66e0 R15: 0000564cd69f10a0
 &lt;/TASK&gt;

Allocated by task 1543:
 kasan_save_stack (mm/kasan/common.c:48)
 kasan_save_track (mm/kasan/common.c:60 (discriminator 1) mm/kasan/common.c:69 (discriminator 1))
 __kasan_slab_alloc (mm/kasan/common.c:319 mm/kasan/common.c:345)
 kmem_cache_alloc_node_noprof (./include/linux/kasan.h:250 mm/slub.c:4148 mm/slub.c:4197 mm/slub.c:4249)
 kmalloc_reserve (net/core/skbuff.c:581 (discriminator 88))
 __alloc_skb (net/core/skbuff.c:669)
 __ip6_append_data (net/ipv6/ip6_output.c:1672 (discriminator 1))
 ip6_
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38476/">CVE-2025-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38476">CVE-2025-38476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247317">SUSE bug 1247317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251203">SUSE bug 1251203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38477</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38477" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38477" ref_url="https://www.suse.com/security/cve/CVE-2025-38477" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15008" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001974.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17161" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03472-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03475-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03482-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03485-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03494-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03495-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03496-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03497-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03514-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03515-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03528-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03539-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03541-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03543-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03548-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03550-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03552-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03554-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03557-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03561-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03562-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03566-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03567-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03568-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03575-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03576-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03577-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03578-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03583-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20806-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20812-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20813-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20815-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20816-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20819-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20820-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20826-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20828-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20829-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20830-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20831-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20835-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20836-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20837-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20838-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20839-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20842-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_qfq: Fix race condition on qfq_aggregate

A race condition can occur when 'agg' is modified in qfq_change_agg
(called during qfq_enqueue) while other threads access it
concurrently. For example, qfq_dump_class may trigger a NULL
dereference, and qfq_delete_class may cause a use-after-free.

This patch addresses the issue by:

1. Moved qfq_destroy_class into the critical section.

2. Added sch_tree_lock protection to qfq_dump_class and
qfq_dump_class_stats.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38477/">CVE-2025-38477 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38477">CVE-2025-38477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247314">SUSE bug 1247314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247315">SUSE bug 1247315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38478</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38478" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38478" ref_url="https://www.suse.com/security/cve/CVE-2025-38478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: Fix initialization of data for instructions that write to subdevice

Some Comedi subdevice instruction handlers are known to access
instruction data elements beyond the first `insn-&gt;n` elements in some
cases.  The `do_insn_ioctl()` and `do_insnlist_ioctl()` functions
allocate at least `MIN_SAMPLES` (16) data elements to deal with this,
but they do not initialize all of that.  For Comedi instruction codes
that write to the subdevice, the first `insn-&gt;n` data elements are
copied from user-space, but the remaining elements are left
uninitialized.  That could be a problem if the subdevice instruction
handler reads the uninitialized data.  Ensure that the first
`MIN_SAMPLES` elements are initialized before calling these instruction
handlers, filling the uncopied elements with 0.  For
`do_insnlist_ioctl()`, the same data buffer elements are used for
handling a list of instructions, so ensure the first `MIN_SAMPLES`
elements are initialized for each instruction that writes to the
subdevice.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38478/">CVE-2025-38478 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38478">CVE-2025-38478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247273">SUSE bug 1247273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38480</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38480" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38480" ref_url="https://www.suse.com/security/cve/CVE-2025-38480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: Fix use of uninitialized data in insn_rw_emulate_bits()

For Comedi `INSN_READ` and `INSN_WRITE` instructions on "digital"
subdevices (subdevice types `COMEDI_SUBD_DI`, `COMEDI_SUBD_DO`, and
`COMEDI_SUBD_DIO`), it is common for the subdevice driver not to have
`insn_read` and `insn_write` handler functions, but to have an
`insn_bits` handler function for handling Comedi `INSN_BITS`
instructions.  In that case, the subdevice's `insn_read` and/or
`insn_write` function handler pointers are set to point to the
`insn_rw_emulate_bits()` function by `__comedi_device_postconfig()`.

For `INSN_WRITE`, `insn_rw_emulate_bits()` currently assumes that the
supplied `data[0]` value is a valid copy from user memory.  It will at
least exist because `do_insnlist_ioctl()` and `do_insn_ioctl()` in
"comedi_fops.c" ensure at lease `MIN_SAMPLES` (16) elements are
allocated.  However, if `insn-&gt;n` is 0 (which is allowable for
`INSN_READ` and `INSN_WRITE` instructions, then `data[0]` may contain
uninitialized data, and certainly contains invalid data, possibly from a
different instruction in the array of instructions handled by
`do_insnlist_ioctl()`.  This will result in an incorrect value being
written to the digital output channel (or to the digital input/output
channel if configured as an output), and may be reflected in the
internal saved state of the channel.

Fix it by returning 0 early if `insn-&gt;n` is 0, before reaching the code
that accesses `data[0]`.  Previously, the function always returned 1 on
success, but it is supposed to be the number of data samples actually
read or written up to `insn-&gt;n`, which is 0 in this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38480/">CVE-2025-38480 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38480">CVE-2025-38480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247274">SUSE bug 1247274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38481</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38481" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38481" ref_url="https://www.suse.com/security/cve/CVE-2025-38481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large

The handling of the `COMEDI_INSNLIST` ioctl allocates a kernel buffer to
hold the array of `struct comedi_insn`, getting the length from the
`n_insns` member of the `struct comedi_insnlist` supplied by the user.
The allocation will fail with a WARNING and a stack dump if it is too
large.

Avoid that by failing with an `-EINVAL` error if the supplied `n_insns`
value is unreasonable.

Define the limit on the `n_insns` value in the `MAX_INSNS` macro.  Set
this to the same value as `MAX_SAMPLES` (65536), which is the maximum
allowed sum of the values of the member `n` in the array of `struct
comedi_insn`, and sensible comedi instructions will have an `n` of at
least 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38481/">CVE-2025-38481 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38481">CVE-2025-38481 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247276">SUSE bug 1247276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38482</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38482" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38482" ref_url="https://www.suse.com/security/cve/CVE-2025-38482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: das6402: Fix bit shift out of bounds

When checking for a supported IRQ number, the following test is used:

	/* IRQs 2,3,5,6,7, 10,11,15 are valid for "enhanced" mode */
	if ((1 &lt;&lt; it-&gt;options[1]) &amp; 0x8cec) {

However, `it-&gt;options[i]` is an unchecked `int` value from userspace, so
the shift amount could be negative or out of bounds.  Fix the test by
requiring `it-&gt;options[1]` to be within bounds before proceeding with
the original test.  Valid `it-&gt;options[1]` values that select the IRQ
will be in the range [1,15]. The value 0 explicitly disables the use of
interrupts.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38482/">CVE-2025-38482 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38482">CVE-2025-38482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247277">SUSE bug 1247277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38483</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38483" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38483" ref_url="https://www.suse.com/security/cve/CVE-2025-38483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: das16m1: Fix bit shift out of bounds

When checking for a supported IRQ number, the following test is used:

	/* only irqs 2, 3, 4, 5, 6, 7, 10, 11, 12, 14, and 15 are valid */
	if ((1 &lt;&lt; it-&gt;options[1]) &amp; 0xdcfc) {

However, `it-&gt;options[i]` is an unchecked `int` value from userspace, so
the shift amount could be negative or out of bounds.  Fix the test by
requiring `it-&gt;options[1]` to be within bounds before proceeding with
the original test.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38483/">CVE-2025-38483 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38483">CVE-2025-38483 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247278">SUSE bug 1247278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38484</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38484" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38484" ref_url="https://www.suse.com/security/cve/CVE-2025-38484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: backend: fix out-of-bound write

The buffer is set to 80 character. If a caller write more characters,
count is truncated to the max available space in "simple_write_to_buffer".
But afterwards a string terminator is written to the buffer at offset count
without boundary check. The zero termination is written OUT-OF-BOUND.

Add a check that the given buffer is smaller then the buffer to prevent.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38484/">CVE-2025-38484 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38484">CVE-2025-38484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247235">SUSE bug 1247235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38485</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38485" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38485" ref_url="https://www.suse.com/security/cve/CVE-2025-38485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: accel: fxls8962af: Fix use after free in fxls8962af_fifo_flush

fxls8962af_fifo_flush() uses indio_dev-&gt;active_scan_mask (with
iio_for_each_active_channel()) without making sure the indio_dev
stays in buffer mode.
There is a race if indio_dev exits buffer mode in the middle of the
interrupt that flushes the fifo. Fix this by calling
synchronize_irq() to ensure that no interrupt is currently running when
disabling buffer mode.

Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read
[...]
_find_first_bit_le from fxls8962af_fifo_flush+0x17c/0x290
fxls8962af_fifo_flush from fxls8962af_interrupt+0x80/0x178
fxls8962af_interrupt from irq_thread_fn+0x1c/0x7c
irq_thread_fn from irq_thread+0x110/0x1f4
irq_thread from kthread+0xe0/0xfc
kthread from ret_from_fork+0x14/0x2c
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38485/">CVE-2025-38485 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38485">CVE-2025-38485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247236">SUSE bug 1247236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247237">SUSE bug 1247237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38487</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38487" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38487" ref_url="https://www.suse.com/security/cve/CVE-2025-38487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: aspeed: lpc-snoop: Don't disable channels that aren't enabled

Mitigate e.g. the following:

    # echo 1e789080.lpc-snoop &gt; /sys/bus/platform/drivers/aspeed-lpc-snoop/unbind
    ...
    [  120.363594] Unable to handle kernel NULL pointer dereference at virtual address 00000004 when write
    [  120.373866] [00000004] *pgd=00000000
    [  120.377910] Internal error: Oops: 805 [#1] SMP ARM
    [  120.383306] CPU: 1 UID: 0 PID: 315 Comm: sh Not tainted 6.15.0-rc1-00009-g926217bc7d7d-dirty #20 NONE
    ...
    [  120.679543] Call trace:
    [  120.679559]  misc_deregister from aspeed_lpc_snoop_remove+0x84/0xac
    [  120.692462]  aspeed_lpc_snoop_remove from platform_remove+0x28/0x38
    [  120.700996]  platform_remove from device_release_driver_internal+0x188/0x200
    ...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38487/">CVE-2025-38487 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38487">CVE-2025-38487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247238">SUSE bug 1247238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38488</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38488" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38488" ref_url="https://www.suse.com/security/cve/CVE-2025-38488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20891-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20893-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20895-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20896-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free in crypt_message when using async crypto

The CVE-2024-50047 fix removed asynchronous crypto handling from
crypt_message(), assuming all crypto operations are synchronous.
However, when hardware crypto accelerators are used, this can cause
use-after-free crashes:

  crypt_message()
    // Allocate the creq buffer containing the req
    creq = smb2_get_aead_req(..., &amp;req);

    // Async encryption returns -EINPROGRESS immediately
    rc = enc ? crypto_aead_encrypt(req) : crypto_aead_decrypt(req);

    // Free creq while async operation is still in progress
    kvfree_sensitive(creq, ...);

Hardware crypto modules often implement async AEAD operations for
performance. When crypto_aead_encrypt/decrypt() returns -EINPROGRESS,
the operation completes asynchronously. Without crypto_wait_req(),
the function immediately frees the request buffer, leading to crashes
when the driver later accesses the freed memory.

This results in a use-after-free condition when the hardware crypto
driver later accesses the freed request structure, leading to kernel
crashes with NULL pointer dereferences.

The issue occurs because crypto_alloc_aead() with mask=0 doesn't
guarantee synchronous operation. Even without CRYPTO_ALG_ASYNC in
the mask, async implementations can be selected.

Fix by restoring the async crypto handling:
- DECLARE_CRYPTO_WAIT(wait) for completion tracking
- aead_request_set_callback() for async completion notification
- crypto_wait_req() to wait for operation completion

This ensures the request buffer isn't freed until the crypto operation
completes, whether synchronous or asynchronous, while preserving the
CVE-2024-50047 fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38488/">CVE-2025-38488 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38488">CVE-2025-38488 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247239">SUSE bug 1247239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247240">SUSE bug 1247240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052000" comment="kernel-livepatch-6_12_0-160000_5-default-8-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051986" comment="kernel-livepatch-6_12_0-160000_5-rt-6-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38489</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38489" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38489" ref_url="https://www.suse.com/security/cve/CVE-2025-38489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again

Commit 7ded842b356d ("s390/bpf: Fix bpf_plt pointer arithmetic") has
accidentally removed the critical piece of commit c730fce7c70c
("s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL"), causing
intermittent kernel panics in e.g. perf's on_switch() prog to reappear.

Restore the fix and add a comment.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38489/">CVE-2025-38489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38489">CVE-2025-38489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247241">SUSE bug 1247241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38490</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38490" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38490" ref_url="https://www.suse.com/security/cve/CVE-2025-38490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: libwx: remove duplicate page_pool_put_full_page()

page_pool_put_full_page() should only be invoked when freeing Rx buffers
or building a skb if the size is too short. At other times, the pages
need to be reused. So remove the redundant page put. In the original
code, double free pages cause kernel panic:

[  876.949834]  __irq_exit_rcu+0xc7/0x130
[  876.949836]  common_interrupt+0xb8/0xd0
[  876.949838]  &lt;/IRQ&gt;
[  876.949838]  &lt;TASK&gt;
[  876.949840]  asm_common_interrupt+0x22/0x40
[  876.949841] RIP: 0010:cpuidle_enter_state+0xc2/0x420
[  876.949843] Code: 00 00 e8 d1 1d 5e ff e8 ac f0 ff ff 49 89 c5 0f 1f 44 00 00 31 ff e8 cd fc 5c ff 45 84 ff 0f 85 40 02 00 00 fb 0f 1f 44 00 00 &lt;45&gt; 85 f6 0f 88 84 01 00 00 49 63 d6 48 8d 04 52 48 8d 04 82 49 8d
[  876.949844] RSP: 0018:ffffaa7340267e78 EFLAGS: 00000246
[  876.949845] RAX: ffff9e3f135be000 RBX: 0000000000000002 RCX: 0000000000000000
[  876.949846] RDX: 000000cc2dc4cb7c RSI: ffffffff89ee49ae RDI: ffffffff89ef9f9e
[  876.949847] RBP: ffff9e378f940800 R08: 0000000000000002 R09: 00000000000000ed
[  876.949848] R10: 000000000000afc8 R11: ffff9e3e9e5a9b6c R12: ffffffff8a6d8580
[  876.949849] R13: 000000cc2dc4cb7c R14: 0000000000000002 R15: 0000000000000000
[  876.949852]  ? cpuidle_enter_state+0xb3/0x420
[  876.949855]  cpuidle_enter+0x29/0x40
[  876.949857]  cpuidle_idle_call+0xfd/0x170
[  876.949859]  do_idle+0x7a/0xc0
[  876.949861]  cpu_startup_entry+0x25/0x30
[  876.949862]  start_secondary+0x117/0x140
[  876.949864]  common_startup_64+0x13e/0x148
[  876.949867]  &lt;/TASK&gt;
[  876.949868] ---[ end trace 0000000000000000 ]---
[  876.949869] ------------[ cut here ]------------
[  876.949870] list_del corruption, ffffead40445a348-&gt;next is NULL
[  876.949873] WARNING: CPU: 14 PID: 0 at lib/list_debug.c:52 __list_del_entry_valid_or_report+0x67/0x120
[  876.949875] Modules linked in: snd_hrtimer(E) bnep(E) binfmt_misc(E) amdgpu(E) squashfs(E) vfat(E) loop(E) fat(E) amd_atl(E) snd_hda_codec_realtek(E) intel_rapl_msr(E) snd_hda_codec_generic(E) intel_rapl_common(E) snd_hda_scodec_component(E) snd_hda_codec_hdmi(E) snd_hda_intel(E) edac_mce_amd(E) snd_intel_dspcfg(E) snd_hda_codec(E) snd_hda_core(E) amdxcp(E) kvm_amd(E) snd_hwdep(E) gpu_sched(E) drm_panel_backlight_quirks(E) cec(E) snd_pcm(E) drm_buddy(E) snd_seq_dummy(E) drm_ttm_helper(E) btusb(E) kvm(E) snd_seq_oss(E) btrtl(E) ttm(E) btintel(E) snd_seq_midi(E) btbcm(E) drm_exec(E) snd_seq_midi_event(E) i2c_algo_bit(E) snd_rawmidi(E) bluetooth(E) drm_suballoc_helper(E) irqbypass(E) snd_seq(E) ghash_clmulni_intel(E) sha512_ssse3(E) drm_display_helper(E) aesni_intel(E) snd_seq_device(E) rfkill(E) snd_timer(E) gf128mul(E) drm_client_lib(E) drm_kms_helper(E) snd(E) i2c_piix4(E) joydev(E) soundcore(E) wmi_bmof(E) ccp(E) k10temp(E) i2c_smbus(E) gpio_amdpt(E) i2c_designware_platform(E) gpio_generic(E) sg(E)
[  876.949914]  i2c_designware_core(E) sch_fq_codel(E) parport_pc(E) drm(E) ppdev(E) lp(E) parport(E) fuse(E) nfnetlink(E) ip_tables(E) ext4 crc16 mbcache jbd2 sd_mod sfp mdio_i2c i2c_core txgbe ahci ngbe pcs_xpcs libahci libwx r8169 phylink libata realtek ptp pps_core video wmi
[  876.949933] CPU: 14 UID: 0 PID: 0 Comm: swapper/14 Kdump: loaded Tainted: G        W   E       6.16.0-rc2+ #20 PREEMPT(voluntary)
[  876.949935] Tainted: [W]=WARN, [E]=UNSIGNED_MODULE
[  876.949936] Hardware name: Micro-Star International Co., Ltd. MS-7E16/X670E GAMING PLUS WIFI (MS-7E16), BIOS 1.90 12/31/2024
[  876.949936] RIP: 0010:__list_del_entry_valid_or_report+0x67/0x120
[  876.949938] Code: 00 00 00 48 39 7d 08 0f 85 a6 00 00 00 5b b8 01 00 00 00 5d 41 5c e9 73 0d 93 ff 48 89 fe 48 c7 c7 a0 31 e8 89 e8 59 7c b3 ff &lt;0f&gt; 0b 31 c0 5b 5d 41 5c e9 57 0d 93 ff 48 89 fe 48 c7 c7 c8 31 e8
[  876.949940] RSP: 0018:ffffaa73405d0c60 EFLAGS: 00010282
[  876.949941] RAX: 0000000000000000 RBX: ffffead40445a348 RCX: 0000000000000000
[  876.949942] RDX: 0000000000000105 RSI: 00000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38490/">CVE-2025-38490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38490">CVE-2025-38490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247243">SUSE bug 1247243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247384">SUSE bug 1247384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38491</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38491" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38491" ref_url="https://www.suse.com/security/cve/CVE-2025-38491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: make fallback action and fallback decision atomic

Syzkaller reported the following splat:

  WARNING: CPU: 1 PID: 7704 at net/mptcp/protocol.h:1223 __mptcp_do_fallback net/mptcp/protocol.h:1223 [inline]
  WARNING: CPU: 1 PID: 7704 at net/mptcp/protocol.h:1223 mptcp_do_fallback net/mptcp/protocol.h:1244 [inline]
  WARNING: CPU: 1 PID: 7704 at net/mptcp/protocol.h:1223 check_fully_established net/mptcp/options.c:982 [inline]
  WARNING: CPU: 1 PID: 7704 at net/mptcp/protocol.h:1223 mptcp_incoming_options+0x21a8/0x2510 net/mptcp/options.c:1153
  Modules linked in:
  CPU: 1 UID: 0 PID: 7704 Comm: syz.3.1419 Not tainted 6.16.0-rc3-gbd5ce2324dba #20 PREEMPT(voluntary)
  Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
  RIP: 0010:__mptcp_do_fallback net/mptcp/protocol.h:1223 [inline]
  RIP: 0010:mptcp_do_fallback net/mptcp/protocol.h:1244 [inline]
  RIP: 0010:check_fully_established net/mptcp/options.c:982 [inline]
  RIP: 0010:mptcp_incoming_options+0x21a8/0x2510 net/mptcp/options.c:1153
  Code: 24 18 e8 bb 2a 00 fd e9 1b df ff ff e8 b1 21 0f 00 e8 ec 5f c4 fc 44 0f b7 ac 24 b0 00 00 00 e9 54 f1 ff ff e8 d9 5f c4 fc 90 &lt;0f&gt; 0b 90 e9 b8 f4 ff ff e8 8b 2a 00 fd e9 8d e6 ff ff e8 81 2a 00
  RSP: 0018:ffff8880a3f08448 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: ffff8880180a8000 RCX: ffffffff84afcf45
  RDX: ffff888090223700 RSI: ffffffff84afdaa7 RDI: 0000000000000001
  RBP: ffff888017955780 R08: 0000000000000001 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
  R13: ffff8880180a8910 R14: ffff8880a3e9d058 R15: 0000000000000000
  FS:  00005555791b8500(0000) GS:ffff88811c495000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 000000110c2800b7 CR3: 0000000058e44000 CR4: 0000000000350ef0
  Call Trace:
   &lt;IRQ&gt;
   tcp_reset+0x26f/0x2b0 net/ipv4/tcp_input.c:4432
   tcp_validate_incoming+0x1057/0x1b60 net/ipv4/tcp_input.c:5975
   tcp_rcv_established+0x5b5/0x21f0 net/ipv4/tcp_input.c:6166
   tcp_v4_do_rcv+0x5dc/0xa70 net/ipv4/tcp_ipv4.c:1925
   tcp_v4_rcv+0x3473/0x44a0 net/ipv4/tcp_ipv4.c:2363
   ip_protocol_deliver_rcu+0xba/0x480 net/ipv4/ip_input.c:205
   ip_local_deliver_finish+0x2f1/0x500 net/ipv4/ip_input.c:233
   NF_HOOK include/linux/netfilter.h:317 [inline]
   NF_HOOK include/linux/netfilter.h:311 [inline]
   ip_local_deliver+0x1be/0x560 net/ipv4/ip_input.c:254
   dst_input include/net/dst.h:469 [inline]
   ip_rcv_finish net/ipv4/ip_input.c:447 [inline]
   NF_HOOK include/linux/netfilter.h:317 [inline]
   NF_HOOK include/linux/netfilter.h:311 [inline]
   ip_rcv+0x514/0x810 net/ipv4/ip_input.c:567
   __netif_receive_skb_one_core+0x197/0x1e0 net/core/dev.c:5975
   __netif_receive_skb+0x1f/0x120 net/core/dev.c:6088
   process_backlog+0x301/0x1360 net/core/dev.c:6440
   __napi_poll.constprop.0+0xba/0x550 net/core/dev.c:7453
   napi_poll net/core/dev.c:7517 [inline]
   net_rx_action+0xb44/0x1010 net/core/dev.c:7644
   handle_softirqs+0x1d0/0x770 kernel/softirq.c:579
   do_softirq+0x3f/0x90 kernel/softirq.c:480
   &lt;/IRQ&gt;
   &lt;TASK&gt;
   __local_bh_enable_ip+0xed/0x110 kernel/softirq.c:407
   local_bh_enable include/linux/bottom_half.h:33 [inline]
   inet_csk_listen_stop+0x2c5/0x1070 net/ipv4/inet_connection_sock.c:1524
   mptcp_check_listen_stop.part.0+0x1cc/0x220 net/mptcp/protocol.c:2985
   mptcp_check_listen_stop net/mptcp/mib.h:118 [inline]
   __mptcp_close+0x9b9/0xbd0 net/mptcp/protocol.c:3000
   mptcp_close+0x2f/0x140 net/mptcp/protocol.c:3066
   inet_release+0xed/0x200 net/ipv4/af_inet.c:435
   inet6_release+0x4f/0x70 net/ipv6/af_inet6.c:487
   __sock_release+0xb3/0x270 net/socket.c:649
   sock_close+0x1c/0x30 net/socket.c:1439
   __fput+0x402/0xb70 fs/file_table.c:465
   task_work_run+0x150/0x240 kernel/task_work.c:227
   resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
   exit_to_user_mode_loop+0xd4
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38491/">CVE-2025-38491 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38491">CVE-2025-38491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247280">SUSE bug 1247280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38493</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38493" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38493" ref_url="https://www.suse.com/security/cve/CVE-2025-38493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing/osnoise: Fix crash in timerlat_dump_stack()

We have observed kernel panics when using timerlat with stack saving,
with the following dmesg output:

memcpy: detected buffer overflow: 88 byte write of buffer size 0
WARNING: CPU: 2 PID: 8153 at lib/string_helpers.c:1032 __fortify_report+0x55/0xa0
CPU: 2 UID: 0 PID: 8153 Comm: timerlatu/2 Kdump: loaded Not tainted 6.15.3-200.fc42.x86_64 #1 PREEMPT(lazy)
Call Trace:
 &lt;TASK&gt;
 ? trace_buffer_lock_reserve+0x2a/0x60
 __fortify_panic+0xd/0xf
 __timerlat_dump_stack.cold+0xd/0xd
 timerlat_dump_stack.part.0+0x47/0x80
 timerlat_fd_read+0x36d/0x390
 vfs_read+0xe2/0x390
 ? syscall_exit_to_user_mode+0x1d5/0x210
 ksys_read+0x73/0xe0
 do_syscall_64+0x7b/0x160
 ? exc_page_fault+0x7e/0x1a0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

__timerlat_dump_stack() constructs the ftrace stack entry like this:

struct stack_entry *entry;
...
memcpy(&amp;entry-&gt;caller, fstack-&gt;calls, size);
entry-&gt;size = fstack-&gt;nr_entries;

Since commit e7186af7fb26 ("tracing: Add back FORTIFY_SOURCE logic to
kernel_stack event structure"), struct stack_entry marks its caller
field with __counted_by(size). At the time of the memcpy, entry-&gt;size
contains garbage from the ringbuffer, which under some circumstances is
zero, triggering a kernel panic by buffer overflow.

Populate the size field before the memcpy so that the out-of-bounds
check knows the correct size. This is analogous to
__ftrace_trace_stack().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38493/">CVE-2025-38493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38493">CVE-2025-38493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247283">SUSE bug 1247283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38494</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38494" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38494" ref_url="https://www.suse.com/security/cve/CVE-2025-38494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02820-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02823-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02830-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02854-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02857-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02859-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02860-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02873-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02878-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02883-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02884-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02908-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02909-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02911-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02917-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02918-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02922-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02926-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02932-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02933-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02936-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02937-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02938-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02942-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02955-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20686-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20687-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20688-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20689-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20781-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: core: do not bypass hid_hw_raw_request

hid_hw_raw_request() is actually useful to ensure the provided buffer
and length are valid. Directly calling in the low level transport driver
function bypassed those checks and allowed invalid paramto be used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38494/">CVE-2025-38494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38494">CVE-2025-38494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247349">SUSE bug 1247349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247350">SUSE bug 1247350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38495</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38495" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38495" ref_url="https://www.suse.com/security/cve/CVE-2025-38495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02820-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02823-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02830-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02854-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02857-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02859-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02860-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02873-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02878-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02883-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02884-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02908-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02909-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02911-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02917-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02918-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02922-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02926-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02932-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02933-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02936-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02937-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02938-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02942-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02955-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20686-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20687-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20688-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20689-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20781-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: core: ensure the allocated report buffer can contain the reserved report ID

When the report ID is not used, the low level transport drivers expect
the first byte to be 0. However, currently the allocated buffer not
account for that extra byte, meaning that instead of having 8 guaranteed
bytes for implement to be working, we only have 7.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38495/">CVE-2025-38495 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38495">CVE-2025-38495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247348">SUSE bug 1247348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247351">SUSE bug 1247351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38496</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38496" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38496" ref_url="https://www.suse.com/security/cve/CVE-2025-38496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm-bufio: fix sched in atomic context

If "try_verify_in_tasklet" is set for dm-verity, DM_BUFIO_CLIENT_NO_SLEEP
is enabled for dm-bufio. However, when bufio tries to evict buffers, there
is a chance to trigger scheduling in spin_lock_bh, the following warning
is hit:

BUG: sleeping function called from invalid context at drivers/md/dm-bufio.c:2745
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 123, name: kworker/2:2
preempt_count: 201, expected: 0
RCU nest depth: 0, expected: 0
4 locks held by kworker/2:2/123:
 #0: ffff88800a2d1548 ((wq_completion)dm_bufio_cache){....}-{0:0}, at: process_one_work+0xe46/0x1970
 #1: ffffc90000d97d20 ((work_completion)(&amp;dm_bufio_replacement_work)){....}-{0:0}, at: process_one_work+0x763/0x1970
 #2: ffffffff8555b528 (dm_bufio_clients_lock){....}-{3:3}, at: do_global_cleanup+0x1ce/0x710
 #3: ffff88801d5820b8 (&amp;c-&gt;spinlock){....}-{2:2}, at: do_global_cleanup+0x2a5/0x710
Preemption disabled at:
[&lt;0000000000000000&gt;] 0x0
CPU: 2 UID: 0 PID: 123 Comm: kworker/2:2 Not tainted 6.16.0-rc3-g90548c634bd0 #305 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
Workqueue: dm_bufio_cache do_global_cleanup
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x53/0x70
 __might_resched+0x360/0x4e0
 do_global_cleanup+0x2f5/0x710
 process_one_work+0x7db/0x1970
 worker_thread+0x518/0xea0
 kthread+0x359/0x690
 ret_from_fork+0xf3/0x1b0
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

That can be reproduced by:

  veritysetup format --data-block-size=4096 --hash-block-size=4096 /dev/vda /dev/vdb
  SIZE=$(blockdev --getsz /dev/vda)
  dmsetup create myverity -r --table "0 $SIZE verity 1 /dev/vda /dev/vdb 4096 4096 &lt;data_blocks&gt; 1 sha256 &lt;root_hash&gt; &lt;salt&gt; 1 try_verify_in_tasklet"
  mount /dev/dm-0 /mnt -o ro
  echo 102400 &gt; /sys/module/dm_bufio/parameters/max_cache_size_bytes
  [read files in /mnt]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38496/">CVE-2025-38496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38496">CVE-2025-38496 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247284">SUSE bug 1247284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38497</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38497" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38497" ref_url="https://www.suse.com/security/cve/CVE-2025-38497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: configfs: Fix OOB read on empty string write

When writing an empty string to either 'qw_sign' or 'landingPage'
sysfs attributes, the store functions attempt to access page[l - 1]
before validating that the length 'l' is greater than zero.

This patch fixes the vulnerability by adding a check at the beginning
of os_desc_qw_sign_store() and webusb_landingPage_store() to handle
the zero-length input case gracefully by returning immediately.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38497/">CVE-2025-38497 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38497">CVE-2025-38497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247347">SUSE bug 1247347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38499</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38499" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38499" ref_url="https://www.suse.com/security/cve/CVE-2025-38499" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03652-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03662-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03663-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03664-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3721-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3740-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns

What we want is to verify there is that clone won't expose something
hidden by a mount we wouldn't be able to undo.  "Wouldn't be able to undo"
may be a result of MNT_LOCKED on a child, but it may also come from
lacking admin rights in the userns of the namespace mount belongs to.

clone_private_mnt() checks the former, but not the latter.

There's a number of rather confusing CAP_SYS_ADMIN checks in various
userns during the mount, especially with the new mount API; they serve
different purposes and in case of clone_private_mnt() they usually,
but not always end up covering the missing check mentioned above.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H" cvss4="6.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-38499/">CVE-2025-38499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38499">CVE-2025-38499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247976">SUSE bug 1247976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248673">SUSE bug 1248673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38500</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38500" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38500" ref_url="https://www.suse.com/security/cve/CVE-2025-38500" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: interface: fix use-after-free after changing collect_md xfrm interface

collect_md property on xfrm interfaces can only be set on device creation,
thus xfrmi_changelink() should fail when called on such interfaces.

The check to enforce this was done only in the case where the xi was
returned from xfrmi_locate() which doesn't look for the collect_md
interface, and thus the validation was never reached.

Calling changelink would thus errornously place the special interface xi
in the xfrmi_net-&gt;xfrmi hash, but since it also exists in the
xfrmi_net-&gt;collect_md_xfrmi pointer it would lead to a double free when
the net namespace was taken down [1].

Change the check to use the xi from netdev_priv which is available earlier
in the function to prevent changes in xfrm collect_md interfaces.

[1] resulting oops:
[    8.516540] kernel BUG at net/core/dev.c:12029!
[    8.516552] Oops: invalid opcode: 0000 [#1] SMP NOPTI
[    8.516559] CPU: 0 UID: 0 PID: 12 Comm: kworker/u80:0 Not tainted 6.15.0-virtme #5 PREEMPT(voluntary)
[    8.516565] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[    8.516569] Workqueue: netns cleanup_net
[    8.516579] RIP: 0010:unregister_netdevice_many_notify+0x101/0xab0
[    8.516590] Code: 90 0f 0b 90 48 8b b0 78 01 00 00 48 8b 90 80 01 00 00 48 89 56 08 48 89 32 4c 89 80 78 01 00 00 48 89 b8 80 01 00 00 eb ac 90 &lt;0f&gt; 0b 48 8b 45 00 4c 8d a0 88 fe ff ff 48 39 c5 74 5c 41 80 bc 24
[    8.516593] RSP: 0018:ffffa93b8006bd30 EFLAGS: 00010206
[    8.516598] RAX: ffff98fe4226e000 RBX: ffffa93b8006bd58 RCX: ffffa93b8006bc60
[    8.516601] RDX: 0000000000000004 RSI: 0000000000000000 RDI: dead000000000122
[    8.516603] RBP: ffffa93b8006bdd8 R08: dead000000000100 R09: ffff98fe4133c100
[    8.516605] R10: 0000000000000000 R11: 00000000000003d2 R12: ffffa93b8006be00
[    8.516608] R13: ffffffff96c1a510 R14: ffffffff96c1a510 R15: ffffa93b8006be00
[    8.516615] FS:  0000000000000000(0000) GS:ffff98fee73b7000(0000) knlGS:0000000000000000
[    8.516619] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    8.516622] CR2: 00007fcd2abd0700 CR3: 000000003aa40000 CR4: 0000000000752ef0
[    8.516625] PKRU: 55555554
[    8.516627] Call Trace:
[    8.516632]  &lt;TASK&gt;
[    8.516635]  ? rtnl_is_locked+0x15/0x20
[    8.516641]  ? unregister_netdevice_queue+0x29/0xf0
[    8.516650]  ops_undo_list+0x1f2/0x220
[    8.516659]  cleanup_net+0x1ad/0x2e0
[    8.516664]  process_one_work+0x160/0x380
[    8.516673]  worker_thread+0x2aa/0x3c0
[    8.516679]  ? __pfx_worker_thread+0x10/0x10
[    8.516686]  kthread+0xfb/0x200
[    8.516690]  ? __pfx_kthread+0x10/0x10
[    8.516693]  ? __pfx_kthread+0x10/0x10
[    8.516697]  ret_from_fork+0x82/0xf0
[    8.516705]  ? __pfx_kthread+0x10/0x10
[    8.516709]  ret_from_fork_asm+0x1a/0x30
[    8.516718]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38500/">CVE-2025-38500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38500">CVE-2025-38500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248088">SUSE bug 1248088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248672">SUSE bug 1248672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040506" comment="kernel-livepatch-6_12_0-160000_5-default-5-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040513" comment="kernel-livepatch-6_12_0-160000_5-rt-4-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38503</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38503" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38503" ref_url="https://www.suse.com/security/cve/CVE-2025-38503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix assertion when building free space tree

When building the free space tree with the block group tree feature
enabled, we can hit an assertion failure like this:

  BTRFS info (device loop0 state M): rebuilding free space tree
  assertion failed: ret == 0, in fs/btrfs/free-space-tree.c:1102
  ------------[ cut here ]------------
  kernel BUG at fs/btrfs/free-space-tree.c:1102!
  Internal error: Oops - BUG: 00000000f2000800 [#1]  SMP
  Modules linked in:
  CPU: 1 UID: 0 PID: 6592 Comm: syz-executor322 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
  pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  pc : populate_free_space_tree+0x514/0x518 fs/btrfs/free-space-tree.c:1102
  lr : populate_free_space_tree+0x514/0x518 fs/btrfs/free-space-tree.c:1102
  sp : ffff8000a4ce7600
  x29: ffff8000a4ce76e0 x28: ffff0000c9bc6000 x27: ffff0000ddfff3d8
  x26: ffff0000ddfff378 x25: dfff800000000000 x24: 0000000000000001
  x23: ffff8000a4ce7660 x22: ffff70001499cecc x21: ffff0000e1d8c160
  x20: ffff0000e1cb7800 x19: ffff0000e1d8c0b0 x18: 00000000ffffffff
  x17: ffff800092f39000 x16: ffff80008ad27e48 x15: ffff700011e740c0
  x14: 1ffff00011e740c0 x13: 0000000000000004 x12: ffffffffffffffff
  x11: ffff700011e740c0 x10: 0000000000ff0100 x9 : 94ef24f55d2dbc00
  x8 : 94ef24f55d2dbc00 x7 : 0000000000000001 x6 : 0000000000000001
  x5 : ffff8000a4ce6f98 x4 : ffff80008f415ba0 x3 : ffff800080548ef0
  x2 : 0000000000000000 x1 : 0000000100000000 x0 : 000000000000003e
  Call trace:
   populate_free_space_tree+0x514/0x518 fs/btrfs/free-space-tree.c:1102 (P)
   btrfs_rebuild_free_space_tree+0x14c/0x54c fs/btrfs/free-space-tree.c:1337
   btrfs_start_pre_rw_mount+0xa78/0xe10 fs/btrfs/disk-io.c:3074
   btrfs_remount_rw fs/btrfs/super.c:1319 [inline]
   btrfs_reconfigure+0x828/0x2418 fs/btrfs/super.c:1543
   reconfigure_super+0x1d4/0x6f0 fs/super.c:1083
   do_remount fs/namespace.c:3365 [inline]
   path_mount+0xb34/0xde0 fs/namespace.c:4200
   do_mount fs/namespace.c:4221 [inline]
   __do_sys_mount fs/namespace.c:4432 [inline]
   __se_sys_mount fs/namespace.c:4409 [inline]
   __arm64_sys_mount+0x3e8/0x468 fs/namespace.c:4409
   __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
   invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
   el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
   do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
   el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767
   el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786
   el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600
  Code: f0047182 91178042 528089c3 9771d47b (d4210000)
  ---[ end trace 0000000000000000 ]---

This happens because we are processing an empty block group, which has
no extents allocated from it, there are no items for this block group,
including the block group item since block group items are stored in a
dedicated tree when using the block group tree feature. It also means
this is the block group with the highest start offset, so there are no
higher keys in the extent root, hence btrfs_search_slot_for_read()
returns 1 (no higher key found).

Fix this by asserting 'ret' is 0 only if the block group tree feature
is not enabled, in which case we should find a block group item for
the block group since it's stored in the extent root and block group
item keys are greater than extent item keys (the value for
BTRFS_BLOCK_GROUP_ITEM_KEY is 192 and for BTRFS_EXTENT_ITEM_KEY and
BTRFS_METADATA_ITEM_KEY the values are 168 and 169 respectively).
In case 'ret' is 1, we just need to add a record to the free space
tree which spans the whole block group, and we can achieve this by
making 'ret == 0' as the while loop's condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38503/">CVE-2025-38503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38503">CVE-2025-38503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248183">SUSE bug 1248183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38505</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38505" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38505" ref_url="https://www.suse.com/security/cve/CVE-2025-38505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: discard erroneous disassoc frames on STA interface

When operating in concurrent STA/AP mode with host MLME enabled,
the firmware incorrectly sends disassociation frames to the STA
interface when clients disconnect from the AP interface.
This causes kernel warnings as the STA interface processes
disconnect events that don't apply to it:

[ 1303.240540] WARNING: CPU: 0 PID: 513 at net/wireless/mlme.c:141 cfg80211_process_disassoc+0x78/0xec [cfg80211]
[ 1303.250861] Modules linked in: 8021q garp stp mrp llc rfcomm bnep btnxpuart nls_iso8859_1 nls_cp437 onboard_us
[ 1303.327651] CPU: 0 UID: 0 PID: 513 Comm: kworker/u9:2 Not tainted 6.16.0-rc1+ #3 PREEMPT
[ 1303.335937] Hardware name: Toradex Verdin AM62 WB on Verdin Development Board (DT)
[ 1303.343588] Workqueue: MWIFIEX_RX_WORK_QUEUE mwifiex_rx_work_queue [mwifiex]
[ 1303.350856] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 1303.357904] pc : cfg80211_process_disassoc+0x78/0xec [cfg80211]
[ 1303.364065] lr : cfg80211_process_disassoc+0x70/0xec [cfg80211]
[ 1303.370221] sp : ffff800083053be0
[ 1303.373590] x29: ffff800083053be0 x28: 0000000000000000 x27: 0000000000000000
[ 1303.380855] x26: 0000000000000000 x25: 00000000ffffffff x24: ffff000002c5b8ae
[ 1303.388120] x23: ffff000002c5b884 x22: 0000000000000001 x21: 0000000000000008
[ 1303.395382] x20: ffff000002c5b8ae x19: ffff0000064dd408 x18: 0000000000000006
[ 1303.402646] x17: 3a36333a61623a30 x16: 32206d6f72662063 x15: ffff800080bfe048
[ 1303.409910] x14: ffff000003625300 x13: 0000000000000001 x12: 0000000000000000
[ 1303.417173] x11: 0000000000000002 x10: ffff000003958600 x9 : ffff000003625300
[ 1303.424434] x8 : ffff00003fd9ef40 x7 : ffff0000039fc280 x6 : 0000000000000002
[ 1303.431695] x5 : ffff0000038976d4 x4 : 0000000000000000 x3 : 0000000000003186
[ 1303.438956] x2 : 000000004836ba20 x1 : 0000000000006986 x0 : 00000000d00479de
[ 1303.446221] Call trace:
[ 1303.448722]  cfg80211_process_disassoc+0x78/0xec [cfg80211] (P)
[ 1303.454894]  cfg80211_rx_mlme_mgmt+0x64/0xf8 [cfg80211]
[ 1303.460362]  mwifiex_process_mgmt_packet+0x1ec/0x460 [mwifiex]
[ 1303.466380]  mwifiex_process_sta_rx_packet+0x1bc/0x2a0 [mwifiex]
[ 1303.472573]  mwifiex_handle_rx_packet+0xb4/0x13c [mwifiex]
[ 1303.478243]  mwifiex_rx_work_queue+0x158/0x198 [mwifiex]
[ 1303.483734]  process_one_work+0x14c/0x28c
[ 1303.487845]  worker_thread+0x2cc/0x3d4
[ 1303.491680]  kthread+0x12c/0x208
[ 1303.495014]  ret_from_fork+0x10/0x20

Add validation in the STA receive path to verify that disassoc/deauth
frames originate from the connected AP. Frames that fail this check
are discarded early, preventing them from reaching the MLME layer and
triggering WARN_ON().

This filtering logic is similar with that used in the
ieee80211_rx_mgmt_disassoc() function in mac80211, which drops
disassoc frames that don't match the current BSSID
(!ether_addr_equal(mgmt-&gt;bssid, sdata-&gt;vif.cfg.ap_addr)), ensuring
only relevant frames are processed.

Tested on:
- 8997 with FW 16.68.1.p197
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38505/">CVE-2025-38505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38505">CVE-2025-38505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248185">SUSE bug 1248185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38506</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38506" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38506" ref_url="https://www.suse.com/security/cve/CVE-2025-38506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: Allow CPU to reschedule while setting per-page memory attributes

When running an SEV-SNP guest with a sufficiently large amount of memory (1TB+),
the host can experience CPU soft lockups when running an operation in
kvm_vm_set_mem_attributes() to set memory attributes on the whole
range of guest memory.

watchdog: BUG: soft lockup - CPU#8 stuck for 26s! [qemu-kvm:6372]
CPU: 8 UID: 0 PID: 6372 Comm: qemu-kvm Kdump: loaded Not tainted 6.15.0-rc7.20250520.el9uek.rc1.x86_64 #1 PREEMPT(voluntary)
Hardware name: Oracle Corporation ORACLE SERVER E4-2c/Asm,MB Tray,2U,E4-2c, BIOS 78016600 11/13/2024
RIP: 0010:xas_create+0x78/0x1f0
Code: 00 00 00 41 80 fc 01 0f 84 82 00 00 00 ba 06 00 00 00 bd 06 00 00 00 49 8b 45 08 4d 8d 65 08 41 39 d6 73 20 83 ed 06 48 85 c0 &lt;74&gt; 67 48 89 c2 83 e2 03 48 83 fa 02 75 0c 48 3d 00 10 00 00 0f 87
RSP: 0018:ffffad890a34b940 EFLAGS: 00000286
RAX: ffff96f30b261daa RBX: ffffad890a34b9c8 RCX: 0000000000000000
RDX: 000000000000001e RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000018 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffffad890a356868
R13: ffffad890a356860 R14: 0000000000000000 R15: ffffad890a356868
FS:  00007f5578a2a400(0000) GS:ffff97ed317e1000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f015c70fb18 CR3: 00000001109fd006 CR4: 0000000000f70ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 xas_store+0x58/0x630
 __xa_store+0xa5/0x130
 xa_store+0x2c/0x50
 kvm_vm_set_mem_attributes+0x343/0x710 [kvm]
 kvm_vm_ioctl+0x796/0xab0 [kvm]
 __x64_sys_ioctl+0xa3/0xd0
 do_syscall_64+0x8c/0x7a0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7f5578d031bb
Code: ff ff ff 85 c0 79 9b 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa b8 10 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 2d 4c 0f 00 f7 d8 64 89 01 48
RSP: 002b:00007ffe0a742b88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 000000004020aed2 RCX: 00007f5578d031bb
RDX: 00007ffe0a742c80 RSI: 000000004020aed2 RDI: 000000000000000b
RBP: 0000010000000000 R08: 0000010000000000 R09: 0000017680000000
R10: 0000000000000080 R11: 0000000000000246 R12: 00005575e5f95120
R13: 00007ffe0a742c80 R14: 0000000000000008 R15: 00005575e5f961e0

While looping through the range of memory setting the attributes,
call cond_resched() to give the scheduler a chance to run a higher
priority task on the runqueue if necessary and avoid staying in
kernel mode long enough to trigger the lockup.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38506/">CVE-2025-38506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38506">CVE-2025-38506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248186">SUSE bug 1248186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38507</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38507" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38507" ref_url="https://www.suse.com/security/cve/CVE-2025-38507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: nintendo: avoid bluetooth suspend/resume stalls

Ensure we don't stall or panic the kernel when using bluetooth-connected
controllers. This was reported as an issue on android devices using
kernel 6.6 due to the resume hook which had been added for usb joycons.

First, set a new state value to JOYCON_CTLR_STATE_SUSPENDED in a
newly-added nintendo_hid_suspend. This makes sure we will not stall out
the kernel waiting for input reports during led classdev suspend. The
stalls could happen if connectivity is unreliable or lost to the
controller prior to suspend.

Second, since we lose connectivity during suspend, do not try
joycon_init() for bluetooth controllers in the nintendo_hid_resume path.

Tested via multiple suspend/resume flows when using the controller both
in USB and bluetooth modes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38507/">CVE-2025-38507 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38507">CVE-2025-38507 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248188">SUSE bug 1248188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38508</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38508" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38508" ref_url="https://www.suse.com/security/cve/CVE-2025-38508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation

When using Secure TSC, the GUEST_TSC_FREQ MSR reports a frequency based on
the nominal P0 frequency, which deviates slightly (typically ~0.2%) from
the actual mean TSC frequency due to clocking parameters.

Over extended VM uptime, this discrepancy accumulates, causing clock skew
between the hypervisor and a SEV-SNP VM, leading to early timer interrupts as
perceived by the guest.

The guest kernel relies on the reported nominal frequency for TSC-based
timekeeping, while the actual frequency set during SNP_LAUNCH_START may
differ. This mismatch results in inaccurate time calculations, causing the
guest to perceive hrtimers as firing earlier than expected.

Utilize the TSC_FACTOR from the SEV firmware's secrets page (see "Secrets
Page Format" in the SNP Firmware ABI Specification) to calculate the mean
TSC frequency, ensuring accurate timekeeping and mitigating clock skew in
SEV-SNP VMs.

Use early_ioremap_encrypted() to map the secrets page as
ioremap_encrypted() uses kmalloc() which is not available during early TSC
initialization and causes a panic.

  [ bp: Drop the silly dummy var:
    https://lore.kernel.org/r/20250630192726.GBaGLlHl84xIopx4Pt@fat_crate.local ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38508/">CVE-2025-38508 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38508">CVE-2025-38508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248190">SUSE bug 1248190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38510</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38510" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38510" ref_url="https://www.suse.com/security/cve/CVE-2025-38510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kasan: remove kasan_find_vm_area() to prevent possible deadlock

find_vm_area() couldn't be called in atomic_context.  If find_vm_area() is
called to reports vm area information, kasan can trigger deadlock like:

CPU0                                CPU1
vmalloc();
 alloc_vmap_area();
  spin_lock(&amp;vn-&gt;busy.lock)
                                    spin_lock_bh(&amp;some_lock);
   &lt;interrupt occurs&gt;
   &lt;in softirq&gt;
   spin_lock(&amp;some_lock);
                                    &lt;access invalid address&gt;
                                    kasan_report();
                                     print_report();
                                      print_address_description();
                                       kasan_find_vm_area();
                                        find_vm_area();
                                         spin_lock(&amp;vn-&gt;busy.lock) // deadlock!

To prevent possible deadlock while kasan reports, remove kasan_find_vm_area().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38510/">CVE-2025-38510 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38510">CVE-2025-38510 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248166">SUSE bug 1248166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38511</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38511" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38511" ref_url="https://www.suse.com/security/cve/CVE-2025-38511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/pf: Clear all LMTT pages on alloc

Our LMEM buffer objects are not cleared by default on alloc
and during VF provisioning we only setup LMTT PTEs for the
actually provisioned LMEM range. But beyond that valid range
we might leave some stale data that could either point to some
other VFs allocations or even to the PF pages.

Explicitly clear all new LMTT page to avoid the risk that a
malicious VF would try to exploit that gap.

While around add asserts to catch any undesired PTE overwrites
and low-level debug traces to track LMTT PT life-cycle.

(cherry picked from commit 3fae6918a3e27cce20ded2551f863fb05d4bef8d)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38511/">CVE-2025-38511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38511">CVE-2025-38511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248175">SUSE bug 1248175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248176">SUSE bug 1248176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38512</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38512" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38512" ref_url="https://www.suse.com/security/cve/CVE-2025-38512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: prevent A-MSDU attacks in mesh networks

This patch is a mitigation to prevent the A-MSDU spoofing vulnerability
for mesh networks. The initial update to the IEEE 802.11 standard, in
response to the FragAttacks, missed this case (CVE-2025-27558). It can
be considered a variant of CVE-2020-24588 but for mesh networks.

This patch tries to detect if a standard MSDU was turned into an A-MSDU
by an adversary. This is done by parsing a received A-MSDU as a standard
MSDU, calculating the length of the Mesh Control header, and seeing if
the 6 bytes after this header equal the start of an rfc1042 header. If
equal, this is a strong indication of an ongoing attack attempt.

This defense was tested with mac80211_hwsim against a mesh network that
uses an empty Mesh Address Extension field, i.e., when four addresses
are used, and when using a 12-byte Mesh Address Extension field, i.e.,
when six addresses are used. Functionality of normal MSDUs and A-MSDUs
was also tested, and confirmed working, when using both an empty and
12-byte Mesh Address Extension field.

It was also tested with mac80211_hwsim that A-MSDU attacks in non-mesh
networks keep being detected and prevented.

Note that the vulnerability being patched, and the defense being
implemented, was also discussed in the following paper and in the
following IEEE 802.11 presentation:

https://papers.mathyvanhoef.com/wisec2025.pdf
https://mentor.ieee.org/802.11/dcn/25/11-25-0949-00-000m-a-msdu-mesh-spoof-protection.docx
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38512/">CVE-2025-38512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38512">CVE-2025-38512 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248178">SUSE bug 1248178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38513</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38513" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38513" ref_url="https://www.suse.com/security/cve/CVE-2025-38513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev()

There is a potential NULL pointer dereference in zd_mac_tx_to_dev(). For
example, the following is possible:

    	T0			    		T1
zd_mac_tx_to_dev()
  /* len == skb_queue_len(q) */
  while (len &gt; ZD_MAC_MAX_ACK_WAITERS) {

					  filter_ack()
					    spin_lock_irqsave(&amp;q-&gt;lock, flags);
					    /* position == skb_queue_len(q) */
					    for (i=1; i&lt;position; i++)
				    	      skb = __skb_dequeue(q)

					    if (mac-&gt;type == NL80211_IFTYPE_AP)
					      skb = __skb_dequeue(q);
					    spin_unlock_irqrestore(&amp;q-&gt;lock, flags);

    skb_dequeue() -&gt; NULL

Since there is a small gap between checking skb queue length and skb being
unconditionally dequeued in zd_mac_tx_to_dev(), skb_dequeue() can return NULL.
Then the pointer is passed to zd_mac_tx_status() where it is dereferenced.

In order to avoid potential NULL pointer dereference due to situations like
above, check if skb is not NULL before passing it to zd_mac_tx_status().

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38513/">CVE-2025-38513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38513">CVE-2025-38513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248179">SUSE bug 1248179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38514</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38514" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38514" ref_url="https://www.suse.com/security/cve/CVE-2025-38514" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix oops due to non-existence of prealloc backlog struct

If an AF_RXRPC service socket is opened and bound, but calls are
preallocated, then rxrpc_alloc_incoming_call() will oops because the
rxrpc_backlog struct doesn't get allocated until the first preallocation is
made.

Fix this by returning NULL from rxrpc_alloc_incoming_call() if there is no
backlog struct.  This will cause the incoming call to be aborted.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38514/">CVE-2025-38514 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38514">CVE-2025-38514 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248202">SUSE bug 1248202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38515</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38515" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38515" ref_url="https://www.suse.com/security/cve/CVE-2025-38515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/sched: Increment job count before swapping tail spsc queue

A small race exists between spsc_queue_push and the run-job worker, in
which spsc_queue_push may return not-first while the run-job worker has
already idled due to the job count being zero. If this race occurs, job
scheduling stops, leading to hangs while waiting on the job's DMA
fences.

Seal this race by incrementing the job count before appending to the
SPSC queue.

This race was observed on a drm-tip 6.16-rc1 build with the Xe driver in
an SVM test case.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38515/">CVE-2025-38515 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38515">CVE-2025-38515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248212">SUSE bug 1248212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38516</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38516" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38516" ref_url="https://www.suse.com/security/cve/CVE-2025-38516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: qcom: msm: mark certain pins as invalid for interrupts

On some platforms, the UFS-reset pin has no interrupt logic in TLMM but
is nevertheless registered as a GPIO in the kernel. This enables the
user-space to trigger a BUG() in the pinctrl-msm driver by running, for
example: `gpiomon -c 0 113` on RB2.

The exact culprit is requesting pins whose intr_detection_width setting
is not 1 or 2 for interrupts. This hits a BUG() in
msm_gpio_irq_set_type(). Potentially crashing the kernel due to an
invalid request from user-space is not optimal, so let's go through the
pins and mark those that would fail the check as invalid for the irq chip
as we should not even register them as available irqs.

This function can be extended if we determine that there are more
corner-cases like this.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38516/">CVE-2025-38516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38516">CVE-2025-38516 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248209">SUSE bug 1248209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38520</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38520" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38520" ref_url="https://www.suse.com/security/cve/CVE-2025-38520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Don't call mmput from MMU notifier callback

If the process is exiting, the mmput inside mmu notifier callback from
compactd or fork or numa balancing could release the last reference
of mm struct to call exit_mmap and free_pgtable, this triggers deadlock
with below backtrace.

The deadlock will leak kfd process as mmu notifier release is not called
and cause VRAM leaking.

The fix is to take mm reference mmget_non_zero when adding prange to the
deferred list to pair with mmput in deferred list work.

If prange split and add into pchild list, the pchild work_item.mm is not
used, so remove the mm parameter from svm_range_unmap_split and
svm_range_add_child.

The backtrace of hung task:

 INFO: task python:348105 blocked for more than 64512 seconds.
 Call Trace:
  __schedule+0x1c3/0x550
  schedule+0x46/0xb0
  rwsem_down_write_slowpath+0x24b/0x4c0
  unlink_anon_vmas+0xb1/0x1c0
  free_pgtables+0xa9/0x130
  exit_mmap+0xbc/0x1a0
  mmput+0x5a/0x140
  svm_range_cpu_invalidate_pagetables+0x2b/0x40 [amdgpu]
  mn_itree_invalidate+0x72/0xc0
  __mmu_notifier_invalidate_range_start+0x48/0x60
  try_to_unmap_one+0x10fa/0x1400
  rmap_walk_anon+0x196/0x460
  try_to_unmap+0xbb/0x210
  migrate_page_unmap+0x54d/0x7e0
  migrate_pages_batch+0x1c3/0xae0
  migrate_pages_sync+0x98/0x240
  migrate_pages+0x25c/0x520
  compact_zone+0x29d/0x590
  compact_zone_order+0xb6/0xf0
  try_to_compact_pages+0xbe/0x220
  __alloc_pages_direct_compact+0x96/0x1a0
  __alloc_pages_slowpath+0x410/0x930
  __alloc_pages_nodemask+0x3a9/0x3e0
  do_huge_pmd_anonymous_page+0xd7/0x3e0
  __handle_mm_fault+0x5e3/0x5f0
  handle_mm_fault+0xf7/0x2e0
  hmm_vma_fault.isra.0+0x4d/0xa0
  walk_pmd_range.isra.0+0xa8/0x310
  walk_pud_range+0x167/0x240
  walk_pgd_range+0x55/0x100
  __walk_page_range+0x87/0x90
  walk_page_range+0xf6/0x160
  hmm_range_fault+0x4f/0x90
  amdgpu_hmm_range_get_pages+0x123/0x230 [amdgpu]
  amdgpu_ttm_tt_get_user_pages+0xb1/0x150 [amdgpu]
  init_user_pages+0xb1/0x2a0 [amdgpu]
  amdgpu_amdkfd_gpuvm_alloc_memory_of_gpu+0x543/0x7d0 [amdgpu]
  kfd_ioctl_alloc_memory_of_gpu+0x24c/0x4e0 [amdgpu]
  kfd_ioctl+0x29d/0x500 [amdgpu]

(cherry picked from commit a29e067bd38946f752b0ef855f3dfff87e77bec7)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38520/">CVE-2025-38520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38520">CVE-2025-38520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248217">SUSE bug 1248217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38521</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38521" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38521" ref_url="https://www.suse.com/security/cve/CVE-2025-38521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/imagination: Fix kernel crash when hard resetting the GPU

The GPU hard reset sequence calls pm_runtime_force_suspend() and
pm_runtime_force_resume(), which according to their documentation should
only be used during system-wide PM transitions to sleep states.

The main issue though is that depending on some internal runtime PM
state as seen by pm_runtime_force_suspend() (whether the usage count is
&lt;= 1), pm_runtime_force_resume() might not resume the device unless
needed. If that happens, the runtime PM resume callback
pvr_power_device_resume() is not called, the GPU clocks are not
re-enabled, and the kernel crashes on the next attempt to access GPU
registers as part of the power-on sequence.

Replace calls to pm_runtime_force_suspend() and
pm_runtime_force_resume() with direct calls to the driver's runtime PM
callbacks, pvr_power_device_suspend() and pvr_power_device_resume(),
to ensure clocks are re-enabled and avoid the kernel crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38521/">CVE-2025-38521 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38521">CVE-2025-38521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248232">SUSE bug 1248232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38524</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38524" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38524" ref_url="https://www.suse.com/security/cve/CVE-2025-38524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix recv-recv race of completed call

If a call receives an event (such as incoming data), the call gets placed
on the socket's queue and a thread in recvmsg can be awakened to go and
process it.  Once the thread has picked up the call off of the queue,
further events will cause it to be requeued, and once the socket lock is
dropped (recvmsg uses call-&gt;user_mutex to allow the socket to be used in
parallel), a second thread can come in and its recvmsg can pop the call off
the socket queue again.

In such a case, the first thread will be receiving stuff from the call and
the second thread will be blocked on call-&gt;user_mutex.  The first thread
can, at this point, process both the event that it picked call for and the
event that the second thread picked the call for and may see the call
terminate - in which case the call will be "released", decoupling the call
from the user call ID assigned to it (RXRPC_USER_CALL_ID in the control
message).

The first thread will return okay, but then the second thread will wake up
holding the user_mutex and, if it sees that the call has been released by
the first thread, it will BUG thusly:

	kernel BUG at net/rxrpc/recvmsg.c:474!

Fix this by just dequeuing the call and ignoring it if it is seen to be
already released.  We can't tell userspace about it anyway as the user call
ID has become stale.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38524/">CVE-2025-38524 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38524">CVE-2025-38524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248194">SUSE bug 1248194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38526</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38526" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38526" ref_url="https://www.suse.com/security/cve/CVE-2025-38526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: add NULL check in eswitch lag check

The function ice_lag_is_switchdev_running() is being called from outside of
the LAG event handler code.  This results in the lag-&gt;upper_netdev being
NULL sometimes.  To avoid a NULL-pointer dereference, there needs to be a
check before it is dereferenced.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38526/">CVE-2025-38526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38526">CVE-2025-38526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248192">SUSE bug 1248192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38527</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38527" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38527" ref_url="https://www.suse.com/security/cve/CVE-2025-38527" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002048.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17397" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free in cifs_oplock_break

A race condition can occur in cifs_oplock_break() leading to a
use-after-free of the cinode structure when unmounting:

  cifs_oplock_break()
    _cifsFileInfo_put(cfile)
      cifsFileInfo_put_final()
        cifs_sb_deactive()
          [last ref, start releasing sb]
            kill_sb()
              kill_anon_super()
                generic_shutdown_super()
                  evict_inodes()
                    dispose_list()
                      evict()
                        destroy_inode()
                          call_rcu(&amp;inode-&gt;i_rcu, i_callback)
    spin_lock(&amp;cinode-&gt;open_file_lock)  &lt;- OK
                            [later] i_callback()
                              cifs_free_inode()
                                kmem_cache_free(cinode)
    spin_unlock(&amp;cinode-&gt;open_file_lock)  &lt;- UAF
    cifs_done_oplock_break(cinode)       &lt;- UAF

The issue occurs when umount has already released its reference to the
superblock. When _cifsFileInfo_put() calls cifs_sb_deactive(), this
releases the last reference, triggering the immediate cleanup of all
inodes under RCU. However, cifs_oplock_break() continues to access the
cinode after this point, resulting in use-after-free.

Fix this by holding an extra reference to the superblock during the
entire oplock break operation. This ensures that the superblock and
its inodes remain valid until the oplock break completes.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38527/">CVE-2025-38527 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38527">CVE-2025-38527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248199">SUSE bug 1248199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38528</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38528" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38528" ref_url="https://www.suse.com/security/cve/CVE-2025-38528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Reject %p% format string in bprintf-like helpers

static const char fmt[] = "%p%";
    bpf_trace_printk(fmt, sizeof(fmt));

The above BPF program isn't rejected and causes a kernel warning at
runtime:

    Please remove unsupported %\x00 in format string
    WARNING: CPU: 1 PID: 7244 at lib/vsprintf.c:2680 format_decode+0x49c/0x5d0

This happens because bpf_bprintf_prepare skips over the second %,
detected as punctuation, while processing %p. This patch fixes it by
not skipping over punctuation. %\x00 is then processed in the next
iteration and rejected.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38528/">CVE-2025-38528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38528">CVE-2025-38528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248198">SUSE bug 1248198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38529</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38529" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38529" ref_url="https://www.suse.com/security/cve/CVE-2025-38529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: aio_iiro_16: Fix bit shift out of bounds

When checking for a supported IRQ number, the following test is used:

	if ((1 &lt;&lt; it-&gt;options[1]) &amp; 0xdcfc) {

However, `it-&gt;options[i]` is an unchecked `int` value from userspace, so
the shift amount could be negative or out of bounds.  Fix the test by
requiring `it-&gt;options[1]` to be within bounds before proceeding with
the original test.  Valid `it-&gt;options[1]` values that select the IRQ
will be in the range [1,15]. The value 0 explicitly disables the use of
interrupts.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38529/">CVE-2025-38529 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38529">CVE-2025-38529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248196">SUSE bug 1248196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38530</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38530" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38530" ref_url="https://www.suse.com/security/cve/CVE-2025-38530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: pcl812: Fix bit shift out of bounds

When checking for a supported IRQ number, the following test is used:

	if ((1 &lt;&lt; it-&gt;options[1]) &amp; board-&gt;irq_bits) {

However, `it-&gt;options[i]` is an unchecked `int` value from userspace, so
the shift amount could be negative or out of bounds.  Fix the test by
requiring `it-&gt;options[1]` to be within bounds before proceeding with
the original test.  Valid `it-&gt;options[1]` values that select the IRQ
will be in the range [1,15]. The value 0 explicitly disables the use of
interrupts.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38530/">CVE-2025-38530 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38530">CVE-2025-38530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248206">SUSE bug 1248206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38531</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38531" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38531" ref_url="https://www.suse.com/security/cve/CVE-2025-38531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: common: st_sensors: Fix use of uninitialize device structs

Throughout the various probe functions &amp;indio_dev-&gt;dev is used before it
is initialized. This caused a kernel panic in st_sensors_power_enable()
when the call to devm_regulator_bulk_get_enable() fails and then calls
dev_err_probe() with the uninitialized device.

This seems to only cause a panic with dev_err_probe(), dev_err(),
dev_warn() and dev_info() don't seem to cause a panic, but are fixed
as well.

The issue is reported and traced here: [1]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38531/">CVE-2025-38531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38531">CVE-2025-38531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248205">SUSE bug 1248205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38533</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38533" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38533" ref_url="https://www.suse.com/security/cve/CVE-2025-38533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: libwx: fix the using of Rx buffer DMA

The wx_rx_buffer structure contained two DMA address fields: 'dma' and
'page_dma'. However, only 'page_dma' was actually initialized and used
to program the Rx descriptor. But 'dma' was uninitialized and used in
some paths.

This could lead to undefined behavior, including DMA errors or
use-after-free, if the uninitialized 'dma' was used. Althrough such
error has not yet occurred, it is worth fixing in the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38533/">CVE-2025-38533 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38533">CVE-2025-38533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248200">SUSE bug 1248200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38535</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38535" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38535" ref_url="https://www.suse.com/security/cve/CVE-2025-38535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode

When transitioning from USB_ROLE_DEVICE to USB_ROLE_NONE, the code
assumed that the regulator should be disabled. However, if the regulator
is marked as always-on, regulator_is_enabled() continues to return true,
leading to an incorrect attempt to disable a regulator which is not
enabled.

This can result in warnings such as:

[  250.155624] WARNING: CPU: 1 PID: 7326 at drivers/regulator/core.c:3004
_regulator_disable+0xe4/0x1a0
[  250.155652] unbalanced disables for VIN_SYS_5V0

To fix this, we move the regulator control logic into
tegra186_xusb_padctl_id_override() function since it's directly related
to the ID override state. The regulator is now only disabled when the role
transitions from USB_ROLE_HOST to USB_ROLE_NONE, by checking the VBUS_ID
register. This ensures that regulator enable/disable operations are
properly balanced and only occur when actually transitioning to/from host
mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38535/">CVE-2025-38535 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38535">CVE-2025-38535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248240">SUSE bug 1248240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38537</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38537" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38537" ref_url="https://www.suse.com/security/cve/CVE-2025-38537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: Don't register LEDs for genphy

If a PHY has no driver, the genphy driver is probed/removed directly in
phy_attach/detach. If the PHY's ofnode has an "leds" subnode, then the
LEDs will be (un)registered when probing/removing the genphy driver.
This could occur if the leds are for a non-generic driver that isn't
loaded for whatever reason. Synchronously removing the PHY device in
phy_detach leads to the following deadlock:

rtnl_lock()
ndo_close()
    ...
    phy_detach()
        phy_remove()
            phy_leds_unregister()
                led_classdev_unregister()
                    led_trigger_set()
                        netdev_trigger_deactivate()
                            unregister_netdevice_notifier()
                                rtnl_lock()

There is a corresponding deadlock on the open/register side of things
(and that one is reported by lockdep), but it requires a race while this
one is deterministic.

Generic PHYs do not support LEDs anyway, so don't bother registering
them.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38537/">CVE-2025-38537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38537">CVE-2025-38537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248229">SUSE bug 1248229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38538</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38538" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38538" ref_url="https://www.suse.com/security/cve/CVE-2025-38538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: nbpfaxi: Fix memory corruption in probe()

The nbpf-&gt;chan[] array is allocated earlier in the nbpf_probe() function
and it has "num_channels" elements.  These three loops iterate one
element farther than they should and corrupt memory.

The changes to the second loop are more involved.  In this case, we're
copying data from the irqbuf[] array into the nbpf-&gt;chan[] array.  If
the data in irqbuf[i] is the error IRQ then we skip it, so the iterators
are not in sync.  I added a check to ensure that we don't go beyond the
end of the irqbuf[] array.  I'm pretty sure this can't happen, but it
seemed harmless to add a check.

On the other hand, after the loop has ended there is a check to ensure
that the "chan" iterator is where we expect it to be.  In the original
code we went one element beyond the end of the array so the iterator
wasn't in the correct place and it would always return -EINVAL.  However,
now it will always be in the correct place.  I deleted the check since
we know the result.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38538/">CVE-2025-38538 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38538">CVE-2025-38538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248213">SUSE bug 1248213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38539</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38539" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38539" ref_url="https://www.suse.com/security/cve/CVE-2025-38539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Add down_write(trace_event_sem) when adding trace event

When a module is loaded, it adds trace events defined by the module. It
may also need to modify the modules trace printk formats to replace enum
names with their values.

If two modules are loaded at the same time, the adding of the event to the
ftrace_events list can corrupt the walking of the list in the code that is
modifying the printk format strings and crash the kernel.

The addition of the event should take the trace_event_sem for write while
it adds the new event.

Also add a lockdep_assert_held() on that semaphore in
__trace_add_event_dirs() as it iterates the list.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38539/">CVE-2025-38539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38539">CVE-2025-38539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248211">SUSE bug 1248211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38540</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38540" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38540" ref_url="https://www.suse.com/security/cve/CVE-2025-38540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras

The Chicony Electronics HP 5MP Cameras (USB ID 04F2:B824 &amp; 04F2:B82C)
report a HID sensor interface that is not actually implemented.
Attempting to access this non-functional sensor via iio_info causes
system hangs as runtime PM tries to wake up an unresponsive sensor.

Add these 2 devices to the HID ignore list since the sensor interface is
non-functional by design and should not be exposed to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38540/">CVE-2025-38540 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38540">CVE-2025-38540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248208">SUSE bug 1248208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38541</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38541" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38541" ref_url="https://www.suse.com/security/cve/CVE-2025-38541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7925: Fix null-ptr-deref in mt7925_thermal_init()

devm_kasprintf() returns NULL on error. Currently, mt7925_thermal_init()
does not check for this case, which results in a NULL pointer
dereference.

Add NULL check after devm_kasprintf() to prevent this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38541/">CVE-2025-38541 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38541">CVE-2025-38541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248216">SUSE bug 1248216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38542</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38542" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38542" ref_url="https://www.suse.com/security/cve/CVE-2025-38542" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: appletalk: Fix device refcount leak in atrtr_create()

When updating an existing route entry in atrtr_create(), the old device
reference was not being released before assigning the new device,
leading to a device refcount leak. Fix this by calling dev_put() to
release the old device reference before holding the new one.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38542/">CVE-2025-38542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38542">CVE-2025-38542 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248215">SUSE bug 1248215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38543</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38543" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38543" ref_url="https://www.suse.com/security/cve/CVE-2025-38543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/tegra: nvdec: Fix dma_alloc_coherent error check

Check for NULL return value with dma_alloc_coherent, in line with
Robin's fix for vic.c in 'drm/tegra: vic: Fix DMA API misuse'.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38543/">CVE-2025-38543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38543">CVE-2025-38543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248214">SUSE bug 1248214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38544</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38544" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38544" ref_url="https://www.suse.com/security/cve/CVE-2025-38544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix bug due to prealloc collision

When userspace is using AF_RXRPC to provide a server, it has to preallocate
incoming calls and assign to them call IDs that will be used to thread
related recvmsg() and sendmsg() together.  The preallocated call IDs will
automatically be attached to calls as they come in until the pool is empty.

To the kernel, the call IDs are just arbitrary numbers, but userspace can
use the call ID to hold a pointer to prepared structs.  In any case, the
user isn't permitted to create two calls with the same call ID (call IDs
become available again when the call ends) and EBADSLT should result from
sendmsg() if an attempt is made to preallocate a call with an in-use call
ID.

However, the cleanup in the error handling will trigger both assertions in
rxrpc_cleanup_call() because the call isn't marked complete and isn't
marked as having been released.

Fix this by setting the call state in rxrpc_service_prealloc_one() and then
marking it as being released before calling the cleanup function.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38544/">CVE-2025-38544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38544">CVE-2025-38544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248225">SUSE bug 1248225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38545</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38545" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38545" ref_url="https://www.suse.com/security/cve/CVE-2025-38545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: ti: am65-cpsw-nuss: Fix skb size by accounting for skb_shared_info

While transitioning from netdev_alloc_ip_align() to build_skb(), memory
for the "skb_shared_info" member of an "skb" was not allocated. Fix this
by allocating "PAGE_SIZE" as the skb length, accounting for the packet
length, headroom and tailroom, thereby including the required memory space
for skb_shared_info.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38545/">CVE-2025-38545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38545">CVE-2025-38545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248224">SUSE bug 1248224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38546</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38546" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38546" ref_url="https://www.suse.com/security/cve/CVE-2025-38546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: clip: Fix memory leak of struct clip_vcc.

ioctl(ATMARP_MKIP) allocates struct clip_vcc and set it to
vcc-&gt;user_back.

The code assumes that vcc_destroy_socket() passes NULL skb
to vcc-&gt;push() when the socket is close()d, and then clip_push()
frees clip_vcc.

However, ioctl(ATMARPD_CTRL) sets NULL to vcc-&gt;push() in
atm_init_atmarp(), resulting in memory leak.

Let's serialise two ioctl() by lock_sock() and check vcc-&gt;push()
in atm_init_atmarp() to prevent memleak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38546/">CVE-2025-38546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38546">CVE-2025-38546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248223">SUSE bug 1248223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38547</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38547" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38547" ref_url="https://www.suse.com/security/cve/CVE-2025-38547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: axp20x_adc: Add missing sentinel to AXP717 ADC channel maps

The AXP717 ADC channel maps is missing a sentinel entry at the end. This
causes a KASAN warning.

Add the missing sentinel entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38547/">CVE-2025-38547 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38547">CVE-2025-38547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248222">SUSE bug 1248222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38548</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38548" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38548" ref_url="https://www.suse.com/security/cve/CVE-2025-38548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (corsair-cpro) Validate the size of the received input buffer

Add buffer_recv_size to store the size of the received bytes.
Validate buffer_recv_size in send_usb_cmd().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38548/">CVE-2025-38548 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38548">CVE-2025-38548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248228">SUSE bug 1248228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38549</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38549" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38549" ref_url="https://www.suse.com/security/cve/CVE-2025-38549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efivarfs: Fix memory leak of efivarfs_fs_info in fs_context error paths

When processing mount options, efivarfs allocates efivarfs_fs_info (sfi)
early in fs_context initialization. However, sfi is associated with the
superblock and typically freed when the superblock is destroyed. If the
fs_context is released (final put) before fill_super is called-such as
on error paths or during reconfiguration-the sfi structure would leak,
as ownership never transfers to the superblock.

Implement the .free callback in efivarfs_context_ops to ensure any
allocated sfi is properly freed if the fs_context is torn down before
fill_super, preventing this memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38549/">CVE-2025-38549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38549">CVE-2025-38549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248235">SUSE bug 1248235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38550</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38550" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38550" ref_url="https://www.suse.com/security/cve/CVE-2025-38550" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15740" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: mcast: Delay put pmc-&gt;idev in mld_del_delrec()

pmc-&gt;idev is still used in ip6_mc_clear_src(), so as mld_clear_delrec()
does, the reference should be put after ip6_mc_clear_src() return.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38550/">CVE-2025-38550 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38550">CVE-2025-38550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248227">SUSE bug 1248227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38551</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38551" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38551" ref_url="https://www.suse.com/security/cve/CVE-2025-38551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-net: fix recursived rtnl_lock() during probe()

The deadlock appears in a stack trace like:

  virtnet_probe()
    rtnl_lock()
    virtio_config_changed_work()
      netdev_notify_peers()
        rtnl_lock()

It happens if the VMM sends a VIRTIO_NET_S_ANNOUNCE request while the
virtio-net driver is still probing.

The config_work in probe() will get scheduled until virtnet_open() enables
the config change notification via virtio_config_driver_enable().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38551/">CVE-2025-38551 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38551">CVE-2025-38551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248234">SUSE bug 1248234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38552</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38552" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38552" ref_url="https://www.suse.com/security/cve/CVE-2025-38552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: plug races between subflow fail and subflow creation

We have races similar to the one addressed by the previous patch between
subflow failing and additional subflow creation. They are just harder to
trigger.

The solution is similar. Use a separate flag to track the condition
'socket state prevent any additional subflow creation' protected by the
fallback lock.

The socket fallback makes such flag true, and also receiving or sending
an MP_FAIL option.

The field 'allow_infinite_fallback' is now always touched under the
relevant lock, we can drop the ONCE annotation on write.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38552/">CVE-2025-38552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38552">CVE-2025-38552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248230">SUSE bug 1248230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38553</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38553" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38553" ref_url="https://www.suse.com/security/cve/CVE-2025-38553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Restrict conditions for adding duplicating netems to qdisc tree

netem_enqueue's duplication prevention logic breaks when a netem
resides in a qdisc tree with other netems - this can lead to a
soft lockup and OOM loop in netem_dequeue, as seen in [1].
Ensure that a duplicating netem cannot exist in a tree with other
netems.

Previous approaches suggested in discussions in chronological order:

1) Track duplication status or ttl in the sk_buff struct. Considered
too specific a use case to extend such a struct, though this would
be a resilient fix and address other previous and potential future
DOS bugs like the one described in loopy fun [2].

2) Restrict netem_enqueue recursion depth like in act_mirred with a
per cpu variable. However, netem_dequeue can call enqueue on its
child, and the depth restriction could be bypassed if the child is a
netem.

3) Use the same approach as in 2, but add metadata in netem_skb_cb
to handle the netem_dequeue case and track a packet's involvement
in duplication. This is an overly complex approach, and Jamal
notes that the skb cb can be overwritten to circumvent this
safeguard.

4) Prevent the addition of a netem to a qdisc tree if its ancestral
path contains a netem. However, filters and actions can cause a
packet to change paths when re-enqueued to the root from netem
duplication, leading us to the current solution: prevent a
duplicating netem from inhabiting the same tree as other netems.

[1] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/
[2] https://lwn.net/Articles/719297/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38553/">CVE-2025-38553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38553">CVE-2025-38553 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248255">SUSE bug 1248255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38554</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38554" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38554" ref_url="https://www.suse.com/security/cve/CVE-2025-38554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: fix a UAF when vma-&gt;mm is freed after vma-&gt;vm_refcnt got dropped

By inducing delays in the right places, Jann Horn created a reproducer for
a hard to hit UAF issue that became possible after VMAs were allowed to be
recycled by adding SLAB_TYPESAFE_BY_RCU to their cache.

Race description is borrowed from Jann's discovery report:
lock_vma_under_rcu() looks up a VMA locklessly with mas_walk() under
rcu_read_lock().  At that point, the VMA may be concurrently freed, and it
can be recycled by another process.  vma_start_read() then increments the
vma-&gt;vm_refcnt (if it is in an acceptable range), and if this succeeds,
vma_start_read() can return a recycled VMA.

In this scenario where the VMA has been recycled, lock_vma_under_rcu()
will then detect the mismatching -&gt;vm_mm pointer and drop the VMA through
vma_end_read(), which calls vma_refcount_put().  vma_refcount_put() drops
the refcount and then calls rcuwait_wake_up() using a copy of vma-&gt;vm_mm. 
This is wrong: It implicitly assumes that the caller is keeping the VMA's
mm alive, but in this scenario the caller has no relation to the VMA's mm,
so the rcuwait_wake_up() can cause UAF.

The diagram depicting the race:
T1         T2         T3
==         ==         ==
lock_vma_under_rcu
  mas_walk
          &lt;VMA gets removed from mm&gt;
                      mmap
                        &lt;the same VMA is reallocated&gt;
  vma_start_read
    __refcount_inc_not_zero_limited_acquire
                      munmap
                        __vma_enter_locked
                          refcount_add_not_zero
  vma_end_read
    vma_refcount_put
      __refcount_dec_and_test
                          rcuwait_wait_event
                            &lt;finish operation&gt;
      rcuwait_wake_up [UAF]

Note that rcuwait_wait_event() in T3 does not block because refcount was
already dropped by T1.  At this point T3 can exit and free the mm causing
UAF in T1.

To avoid this we move vma-&gt;vm_mm verification into vma_start_read() and
grab vma-&gt;vm_mm to stabilize it before vma_refcount_put() operation.

[surenb@google.com: v3]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38554/">CVE-2025-38554 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38554">CVE-2025-38554 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248299">SUSE bug 1248299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248301">SUSE bug 1248301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040506" comment="kernel-livepatch-6_12_0-160000_5-default-5-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040513" comment="kernel-livepatch-6_12_0-160000_5-rt-4-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38555</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38555" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38555" ref_url="https://www.suse.com/security/cve/CVE-2025-38555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03317-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03370-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03387-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03392-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03396-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03397-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03403-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03411-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03412-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03418-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20723-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20728-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20737-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20785-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20787-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20790-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20791-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget : fix use-after-free in composite_dev_cleanup()

1. In func configfs_composite_bind() -&gt; composite_os_desc_req_prepare():
if kmalloc fails, the pointer cdev-&gt;os_desc_req will be freed but not
set to NULL. Then it will return a failure to the upper-level function.
2. in func configfs_composite_bind() -&gt; composite_dev_cleanup():
it will checks whether cdev-&gt;os_desc_req is NULL. If it is not NULL, it
will attempt to use it.This will lead to a use-after-free issue.

BUG: KASAN: use-after-free in composite_dev_cleanup+0xf4/0x2c0
Read of size 8 at addr 0000004827837a00 by task init/1

CPU: 10 PID: 1 Comm: init Tainted: G           O      5.10.97-oh #1
 kasan_report+0x188/0x1cc
 __asan_load8+0xb4/0xbc
 composite_dev_cleanup+0xf4/0x2c0
 configfs_composite_bind+0x210/0x7ac
 udc_bind_to_driver+0xb4/0x1ec
 usb_gadget_probe_driver+0xec/0x21c
 gadget_dev_desc_UDC_store+0x264/0x27c
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38555/">CVE-2025-38555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38555">CVE-2025-38555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248297">SUSE bug 1248297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248298">SUSE bug 1248298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38556</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38556" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38556" ref_url="https://www.suse.com/security/cve/CVE-2025-38556" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16372" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002043.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002101.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: core: Harden s32ton() against conversion to 0 bits

Testing by the syzbot fuzzer showed that the HID core gets a
shift-out-of-bounds exception when it tries to convert a 32-bit
quantity to a 0-bit quantity.  Ideally this should never occur, but
there are buggy devices and some might have a report field with size
set to zero; we shouldn't reject the report or the device just because
of that.

Instead, harden the s32ton() routine so that it returns a reasonable
result instead of crashing when it is called with the number of bits
set to 0 -- the same as what snto32() does.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38556/">CVE-2025-38556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38556">CVE-2025-38556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248296">SUSE bug 1248296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38557</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38557" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38557" ref_url="https://www.suse.com/security/cve/CVE-2025-38557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: apple: validate feature-report field count to prevent NULL pointer dereference

A malicious HID device with quirk APPLE_MAGIC_BACKLIGHT can trigger a NULL
pointer dereference whilst the power feature-report is toggled and sent to
the device in apple_magic_backlight_report_set(). The power feature-report
is expected to have two data fields, but if the descriptor declares one
field then accessing field[1] and dereferencing it in
apple_magic_backlight_report_set() becomes invalid
since field[1] will be NULL.

An example of a minimal descriptor which can cause the crash is something
like the following where the report with ID 3 (power report) only
references a single 1-byte field. When hid core parses the descriptor it
will encounter the final feature tag, allocate a hid_report (all members
of field[] will be zeroed out), create field structure and populate it,
increasing the maxfield to 1. The subsequent field[1] access and
dereference causes the crash.

  Usage Page (Vendor Defined 0xFF00)
  Usage (0x0F)
  Collection (Application)
    Report ID (1)
    Usage (0x01)
    Logical Minimum (0)
    Logical Maximum (255)
    Report Size (8)
    Report Count (1)
    Feature (Data,Var,Abs)

    Usage (0x02)
    Logical Maximum (32767)
    Report Size (16)
    Report Count (1)
    Feature (Data,Var,Abs)

    Report ID (3)
    Usage (0x03)
    Logical Minimum (0)
    Logical Maximum (1)
    Report Size (8)
    Report Count (1)
    Feature (Data,Var,Abs)
  End Collection

Here we see the KASAN splat when the kernel dereferences the
NULL pointer and crashes:

  [   15.164723] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] SMP KASAN NOPTI
  [   15.165691] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
  [   15.165691] CPU: 0 UID: 0 PID: 10 Comm: kworker/0:1 Not tainted 6.15.0 #31 PREEMPT(voluntary)
  [   15.165691] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
  [   15.165691] RIP: 0010:apple_magic_backlight_report_set+0xbf/0x210
  [   15.165691] Call Trace:
  [   15.165691]  &lt;TASK&gt;
  [   15.165691]  apple_probe+0x571/0xa20
  [   15.165691]  hid_device_probe+0x2e2/0x6f0
  [   15.165691]  really_probe+0x1ca/0x5c0
  [   15.165691]  __driver_probe_device+0x24f/0x310
  [   15.165691]  driver_probe_device+0x4a/0xd0
  [   15.165691]  __device_attach_driver+0x169/0x220
  [   15.165691]  bus_for_each_drv+0x118/0x1b0
  [   15.165691]  __device_attach+0x1d5/0x380
  [   15.165691]  device_initial_probe+0x12/0x20
  [   15.165691]  bus_probe_device+0x13d/0x180
  [   15.165691]  device_add+0xd87/0x1510
  [...]

To fix this issue we should validate the number of fields that the
backlight and power reports have and if they do not have the required
number of fields then bail.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38557/">CVE-2025-38557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38557">CVE-2025-38557 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248304">SUSE bug 1248304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38559</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38559" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38559" ref_url="https://www.suse.com/security/cve/CVE-2025-38559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86/intel/pmt: fix a crashlog NULL pointer access

Usage of the intel_pmt_read() for binary sysfs, requires a pcidev. The
current use of the endpoint value is only valid for telemetry endpoint
usage.

Without the ep, the crashlog usage causes the following NULL pointer
exception:

BUG: kernel NULL pointer dereference, address: 0000000000000000
Oops: Oops: 0000 [#1] SMP NOPTI
RIP: 0010:intel_pmt_read+0x3b/0x70 [pmt_class]
Code:
Call Trace:
 &lt;TASK&gt;
 ? sysfs_kf_bin_read+0xc0/0xe0
 kernfs_fop_read_iter+0xac/0x1a0
 vfs_read+0x26d/0x350
 ksys_read+0x6b/0xe0
 __x64_sys_read+0x1d/0x30
 x64_sys_call+0x1bc8/0x1d70
 do_syscall_64+0x6d/0x110

Augment struct intel_pmt_entry with a pointer to the pcidev to avoid
the NULL pointer exception.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38559/">CVE-2025-38559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38559">CVE-2025-38559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248302">SUSE bug 1248302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38560</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38560" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38560" ref_url="https://www.suse.com/security/cve/CVE-2025-38560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/sev: Evict cache lines during SNP memory validation

An SNP cache coherency vulnerability requires a cache line eviction
mitigation when validating memory after a page state change to private.
The specific mitigation is to touch the first and last byte of each 4K
page that is being validated. There is no need to perform the mitigation
when performing a page state change to shared and rescinding validation.

CPUID bit Fn8000001F_EBX[31] defines the COHERENCY_SFW_NO CPUID bit
that, when set, indicates that the software mitigation for this
vulnerability is not needed.

Implement the mitigation and invoke it when validating memory (making it
private) and the COHERENCY_SFW_NO bit is not set, indicating the SNP
guest is vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" cvss4="5/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-38560/">CVE-2025-38560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38560">CVE-2025-38560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248312">SUSE bug 1248312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248313">SUSE bug 1248313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38563</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38563" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38563" ref_url="https://www.suse.com/security/cve/CVE-2025-38563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/core: Prevent VMA split of buffer mappings

The perf mmap code is careful about mmap()'ing the user page with the
ringbuffer and additionally the auxiliary buffer, when the event supports
it. Once the first mapping is established, subsequent mapping have to use
the same offset and the same size in both cases. The reference counting for
the ringbuffer and the auxiliary buffer depends on this being correct.

Though perf does not prevent that a related mapping is split via mmap(2),
munmap(2) or mremap(2). A split of a VMA results in perf_mmap_open() calls,
which take reference counts, but then the subsequent perf_mmap_close()
calls are not longer fulfilling the offset and size checks. This leads to
reference count leaks.

As perf already has the requirement for subsequent mappings to match the
initial mapping, the obvious consequence is that VMA splits, caused by
resizing of a mapping or partial unmapping, have to be prevented.

Implement the vm_operations_struct::may_split() callback and return
unconditionally -EINVAL.

That ensures that the mapping offsets and sizes cannot be changed after the
fact. Remapping to a different fixed address with the same size is still
possible as it takes the references for the new mapping and drops those of
the old mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38563/">CVE-2025-38563 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38563">CVE-2025-38563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248306">SUSE bug 1248306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248307">SUSE bug 1248307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38564</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38564" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38564" ref_url="https://www.suse.com/security/cve/CVE-2025-38564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/core: Handle buffer mapping fail correctly in perf_mmap()

After successful allocation of a buffer or a successful attachment to an
existing buffer perf_mmap() tries to map the buffer read only into the page
table. If that fails, the already set up page table entries are zapped, but
the other perf specific side effects of that failure are not handled.  The
calling code just cleans up the VMA and does not invoke perf_mmap_close().

This leaks reference counts, corrupts user-&gt;vm accounting and also results
in an unbalanced invocation of event::event_mapped().

Cure this by moving the event::event_mapped() invocation before the
map_range() call so that on map_range() failure perf_mmap_close() can be
invoked without causing an unbalanced event::event_unmapped() call.

perf_mmap_close() undoes the reference counts and eventually frees buffers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38564/">CVE-2025-38564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38564">CVE-2025-38564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248367">SUSE bug 1248367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38565</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38565" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38565" ref_url="https://www.suse.com/security/cve/CVE-2025-38565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/core: Exit early on perf_mmap() fail

When perf_mmap() fails to allocate a buffer, it still invokes the
event_mapped() callback of the related event. On X86 this might increase
the perf_rdpmc_allowed reference counter. But nothing undoes this as
perf_mmap_close() is never called in this case, which causes another
reference count leak.

Return early on failure to prevent that.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38565/">CVE-2025-38565 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38565">CVE-2025-38565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248377">SUSE bug 1248377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38566</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38566" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38566" ref_url="https://www.suse.com/security/cve/CVE-2025-38566" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sunrpc: fix handling of server side tls alerts

Scott Mayhew discovered a security exploit in NFS over TLS in
tls_alert_recv() due to its assumption it can read data from
the msg iterator's kvec..

kTLS implementation splits TLS non-data record payload between
the control message buffer (which includes the type such as TLS
aler or TLS cipher change) and the rest of the payload (say TLS
alert's level/description) which goes into the msg payload buffer.

This patch proposes to rework how control messages are setup and
used by sock_recvmsg().

If no control message structure is setup, kTLS layer will read and
process TLS data record types. As soon as it encounters a TLS control
message, it would return an error. At that point, NFS can setup a
kvec backed msg buffer and read in the control message such as a
TLS alert. Msg iterator can advance the kvec pointer as a part of
the copy process thus we need to revert the iterator before calling
into the tls_alert_recv.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38566/">CVE-2025-38566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38566">CVE-2025-38566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248374">SUSE bug 1248374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248376">SUSE bug 1248376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38568</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38568" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38568" ref_url="https://www.suse.com/security/cve/CVE-2025-38568" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003184.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing

TCA_MQPRIO_TC_ENTRY_INDEX is validated using
NLA_POLICY_MAX(NLA_U32, TC_QOPT_MAX_QUEUE), which allows the value
TC_QOPT_MAX_QUEUE (16). This leads to a 4-byte out-of-bounds stack
write in the fp[] array, which only has room for 16 elements (0-15).

Fix this by changing the policy to allow only up to TC_QOPT_MAX_QUEUE - 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38568/">CVE-2025-38568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38568">CVE-2025-38568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248386">SUSE bug 1248386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38569</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38569" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38569" ref_url="https://www.suse.com/security/cve/CVE-2025-38569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

benet: fix BUG when creating VFs

benet crashes as soon as SRIOV VFs are created:

 kernel BUG at mm/vmalloc.c:3457!
 Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI
 CPU: 4 UID: 0 PID: 7408 Comm: test.sh Kdump: loaded Not tainted 6.16.0+ #1 PREEMPT(voluntary)
 [...]
 RIP: 0010:vunmap+0x5f/0x70
 [...]
 Call Trace:
  &lt;TASK&gt;
  __iommu_dma_free+0xe8/0x1c0
  be_cmd_set_mac_list+0x3fe/0x640 [be2net]
  be_cmd_set_mac+0xaf/0x110 [be2net]
  be_vf_eth_addr_config+0x19f/0x330 [be2net]
  be_vf_setup+0x4f7/0x990 [be2net]
  be_pci_sriov_configure+0x3a1/0x470 [be2net]
  sriov_numvfs_store+0x20b/0x380
  kernfs_fop_write_iter+0x354/0x530
  vfs_write+0x9b9/0xf60
  ksys_write+0xf3/0x1d0
  do_syscall_64+0x8c/0x3d0

be_cmd_set_mac_list() calls dma_free_coherent() under a spin_lock_bh.
Fix it by freeing only after the lock has been released.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38569/">CVE-2025-38569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38569">CVE-2025-38569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248384">SUSE bug 1248384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38571</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38571" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38571" ref_url="https://www.suse.com/security/cve/CVE-2025-38571" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sunrpc: fix client side handling of tls alerts

A security exploit was discovered in NFS over TLS in tls_alert_recv
due to its assumption that there is valid data in the msghdr's
iterator's kvec.

Instead, this patch proposes the rework how control messages are
setup and used by sock_recvmsg().

If no control message structure is setup, kTLS layer will read and
process TLS data record types. As soon as it encounters a TLS control
message, it would return an error. At that point, NFS can setup a kvec
backed control buffer and read in the control message such as a TLS
alert. Scott found that a msg iterator can advance the kvec pointer
as a part of the copy process thus we need to revert the iterator
before calling into the tls_alert_recv.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38571/">CVE-2025-38571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38571">CVE-2025-38571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248401">SUSE bug 1248401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248402">SUSE bug 1248402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38572</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38572" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38572" ref_url="https://www.suse.com/security/cve/CVE-2025-38572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: reject malicious packets in ipv6_gso_segment()

syzbot was able to craft a packet with very long IPv6 extension headers
leading to an overflow of skb-&gt;transport_header.

This 16bit field has a limited range.

Add skb_reset_transport_header_careful() helper and use it
from ipv6_gso_segment()

WARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 skb_reset_transport_header include/linux/skbuff.h:3032 [inline]
WARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151
Modules linked in:
CPU: 0 UID: 0 PID: 5871 Comm: syz-executor211 Not tainted 6.16.0-rc6-syzkaller-g7abc678e3084 #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
 RIP: 0010:skb_reset_transport_header include/linux/skbuff.h:3032 [inline]
 RIP: 0010:ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151
Call Trace:
 &lt;TASK&gt;
  skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53
  nsh_gso_segment+0x54a/0xe10 net/nsh/nsh.c:110
  skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53
  __skb_gso_segment+0x342/0x510 net/core/gso.c:124
  skb_gso_segment include/net/gso.h:83 [inline]
  validate_xmit_skb+0x857/0x11b0 net/core/dev.c:3950
  validate_xmit_skb_list+0x84/0x120 net/core/dev.c:4000
  sch_direct_xmit+0xd3/0x4b0 net/sched/sch_generic.c:329
  __dev_xmit_skb net/core/dev.c:4102 [inline]
  __dev_queue_xmit+0x17b6/0x3a70 net/core/dev.c:4679
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38572/">CVE-2025-38572 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38572">CVE-2025-38572 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248399">SUSE bug 1248399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248400">SUSE bug 1248400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040506" comment="kernel-livepatch-6_12_0-160000_5-default-5-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040513" comment="kernel-livepatch-6_12_0-160000_5-rt-4-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38573</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38573" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38573" ref_url="https://www.suse.com/security/cve/CVE-2025-38573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: cs42l43: Property entry should be a null-terminated array

The software node does not specify a count of property entries, so the
array must be null-terminated.

When unterminated, this can lead to a fault in the downstream cs35l56
amplifier driver, because the node parse walks off the end of the
array into unknown memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38573/">CVE-2025-38573 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38573">CVE-2025-38573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248396">SUSE bug 1248396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38574</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38574" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38574" ref_url="https://www.suse.com/security/cve/CVE-2025-38574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pptp: ensure minimal skb length in pptp_xmit()

Commit aabc6596ffb3 ("net: ppp: Add bound checking for skb data
on ppp_sync_txmung") fixed ppp_sync_txmunge()

We need a similar fix in pptp_xmit(), otherwise we might
read uninit data as reported by syzbot.

BUG: KMSAN: uninit-value in pptp_xmit+0xc34/0x2720 drivers/net/ppp/pptp.c:193
  pptp_xmit+0xc34/0x2720 drivers/net/ppp/pptp.c:193
  ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2290 [inline]
  ppp_input+0x1d6/0xe60 drivers/net/ppp/ppp_generic.c:2314
  pppoe_rcv_core+0x1e8/0x760 drivers/net/ppp/pppoe.c:379
  sk_backlog_rcv+0x142/0x420 include/net/sock.h:1148
  __release_sock+0x1d3/0x330 net/core/sock.c:3213
  release_sock+0x6b/0x270 net/core/sock.c:3767
  pppoe_sendmsg+0x15d/0xcb0 drivers/net/ppp/pppoe.c:904
  sock_sendmsg_nosec net/socket.c:712 [inline]
  __sock_sendmsg+0x330/0x3d0 net/socket.c:727
  ____sys_sendmsg+0x893/0xd80 net/socket.c:2566
  ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620
  __sys_sendmmsg+0x2d9/0x7c0 net/socket.c:2709
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38574/">CVE-2025-38574 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38574">CVE-2025-38574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248365">SUSE bug 1248365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38576</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38576" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38576" ref_url="https://www.suse.com/security/cve/CVE-2025-38576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/eeh: Make EEH driver device hotplug safe

Multiple race conditions existed between the PCIe hotplug driver and the
EEH driver, leading to a variety of kernel oopses of the same general
nature:

&lt;pcie device unplug&gt;
&lt;eeh driver trigger&gt;
&lt;hotplug removal trigger&gt;
&lt;pcie tree reconfiguration&gt;
&lt;eeh recovery next step&gt;
&lt;oops in EEH driver bus iteration loop&gt;

A second class of oops is also seen when the underlying bus disappears
during device recovery.

Refactor the EEH module to be PCI rescan and remove safe.  Also clean
up a few minor formatting / readability issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38576/">CVE-2025-38576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38576">CVE-2025-38576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248354">SUSE bug 1248354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38581</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38581" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38581" ref_url="https://www.suse.com/security/cve/CVE-2025-38581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: ccp - Fix crash when rebind ccp device for ccp.ko

When CONFIG_CRYPTO_DEV_CCP_DEBUGFS is enabled, rebinding
the ccp device causes the following crash:

$ echo '0000:0a:00.2' &gt; /sys/bus/pci/drivers/ccp/unbind
$ echo '0000:0a:00.2' &gt; /sys/bus/pci/drivers/ccp/bind

[  204.976930] BUG: kernel NULL pointer dereference, address: 0000000000000098
[  204.978026] #PF: supervisor write access in kernel mode
[  204.979126] #PF: error_code(0x0002) - not-present page
[  204.980226] PGD 0 P4D 0
[  204.981317] Oops: Oops: 0002 [#1] SMP NOPTI
...
[  204.997852] Call Trace:
[  204.999074]  &lt;TASK&gt;
[  205.000297]  start_creating+0x9f/0x1c0
[  205.001533]  debugfs_create_dir+0x1f/0x170
[  205.002769]  ? srso_return_thunk+0x5/0x5f
[  205.004000]  ccp5_debugfs_setup+0x87/0x170 [ccp]
[  205.005241]  ccp5_init+0x8b2/0x960 [ccp]
[  205.006469]  ccp_dev_init+0xd4/0x150 [ccp]
[  205.007709]  sp_init+0x5f/0x80 [ccp]
[  205.008942]  sp_pci_probe+0x283/0x2e0 [ccp]
[  205.010165]  ? srso_return_thunk+0x5/0x5f
[  205.011376]  local_pci_probe+0x4f/0xb0
[  205.012584]  pci_device_probe+0xdb/0x230
[  205.013810]  really_probe+0xed/0x380
[  205.015024]  __driver_probe_device+0x7e/0x160
[  205.016240]  device_driver_attach+0x2f/0x60
[  205.017457]  bind_store+0x7c/0xb0
[  205.018663]  drv_attr_store+0x28/0x40
[  205.019868]  sysfs_kf_write+0x5f/0x70
[  205.021065]  kernfs_fop_write_iter+0x145/0x1d0
[  205.022267]  vfs_write+0x308/0x440
[  205.023453]  ksys_write+0x6d/0xe0
[  205.024616]  __x64_sys_write+0x1e/0x30
[  205.025778]  x64_sys_call+0x16ba/0x2150
[  205.026942]  do_syscall_64+0x56/0x1e0
[  205.028108]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  205.029276] RIP: 0033:0x7fbc36f10104
[  205.030420] Code: 89 02 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 8d 05 e1 08 2e 00 8b 00 85 c0 75 13 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 54 f3 c3 66 90 41 54 55 49 89 d4 53 48 89 f5

This patch sets ccp_debugfs_dir to NULL after destroying it in
ccp5_debugfs_destroy, allowing the directory dentry to be
recreated when rebinding the ccp device.

Tested on AMD Ryzen 7 1700X.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38581/">CVE-2025-38581 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38581">CVE-2025-38581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248345">SUSE bug 1248345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38582</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38582" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38582" ref_url="https://www.suse.com/security/cve/CVE-2025-38582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix double destruction of rsv_qp

rsv_qp may be double destroyed in error flow, first in free_mr_init(),
and then in hns_roce_exit(). Fix it by moving the free_mr_init() call
into hns_roce_v2_init().

list_del corruption, ffff589732eb9b50-&gt;next is LIST_POISON1 (dead000000000100)
WARNING: CPU: 8 PID: 1047115 at lib/list_debug.c:53 __list_del_entry_valid+0x148/0x240
...
Call trace:
 __list_del_entry_valid+0x148/0x240
 hns_roce_qp_remove+0x4c/0x3f0 [hns_roce_hw_v2]
 hns_roce_v2_destroy_qp_common+0x1dc/0x5f4 [hns_roce_hw_v2]
 hns_roce_v2_destroy_qp+0x22c/0x46c [hns_roce_hw_v2]
 free_mr_exit+0x6c/0x120 [hns_roce_hw_v2]
 hns_roce_v2_exit+0x170/0x200 [hns_roce_hw_v2]
 hns_roce_exit+0x118/0x350 [hns_roce_hw_v2]
 __hns_roce_hw_v2_init_instance+0x1c8/0x304 [hns_roce_hw_v2]
 hns_roce_hw_v2_reset_notify_init+0x170/0x21c [hns_roce_hw_v2]
 hns_roce_hw_v2_reset_notify+0x6c/0x190 [hns_roce_hw_v2]
 hclge_notify_roce_client+0x6c/0x160 [hclge]
 hclge_reset_rebuild+0x150/0x5c0 [hclge]
 hclge_reset+0x10c/0x140 [hclge]
 hclge_reset_subtask+0x80/0x104 [hclge]
 hclge_reset_service_task+0x168/0x3ac [hclge]
 hclge_service_task+0x50/0x100 [hclge]
 process_one_work+0x250/0x9a0
 worker_thread+0x324/0x990
 kthread+0x190/0x210
 ret_from_fork+0x10/0x18
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38582/">CVE-2025-38582 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38582">CVE-2025-38582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248349">SUSE bug 1248349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38583</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38583" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38583" ref_url="https://www.suse.com/security/cve/CVE-2025-38583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: xilinx: vcu: unregister pll_post only if registered correctly

If registration of pll_post is failed, it will be set to NULL or ERR,
unregistering same will fail with following call trace:

Unable to handle kernel NULL pointer dereference at virtual address 008
pc : clk_hw_unregister+0xc/0x20
lr : clk_hw_unregister_fixed_factor+0x18/0x30
sp : ffff800011923850
...
Call trace:
 clk_hw_unregister+0xc/0x20
 clk_hw_unregister_fixed_factor+0x18/0x30
 xvcu_unregister_clock_provider+0xcc/0xf4 [xlnx_vcu]
 xvcu_probe+0x2bc/0x53c [xlnx_vcu]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38583/">CVE-2025-38583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38583">CVE-2025-38583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248350">SUSE bug 1248350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38584</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38584" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38584" ref_url="https://www.suse.com/security/cve/CVE-2025-38584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

padata: Fix pd UAF once and for all

There is a race condition/UAF in padata_reorder that goes back
to the initial commit.  A reference count is taken at the start
of the process in padata_do_parallel, and released at the end in
padata_serial_worker.

This reference count is (and only is) required for padata_replace
to function correctly.  If padata_replace is never called then
there is no issue.

In the function padata_reorder which serves as the core of padata,
as soon as padata is added to queue-&gt;serial.list, and the associated
spin lock released, that padata may be processed and the reference
count on pd would go away.

Fix this by getting the next padata before the squeue-&gt;serial lock
is released.

In order to make this possible, simplify padata_reorder by only
calling it once the next padata arrives.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38584/">CVE-2025-38584 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38584">CVE-2025-38584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248343">SUSE bug 1248343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38585</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38585" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38585" ref_url="https://www.suse.com/security/cve/CVE-2025-38585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int()

When gmin_get_config_var() calls efi.get_variable() and the EFI variable
is larger than the expected buffer size, two behaviors combine to create
a stack buffer overflow:

1. gmin_get_config_var() does not return the proper error code when
   efi.get_variable() fails. It returns the stale 'ret' value from
   earlier operations instead of indicating the EFI failure.

2. When efi.get_variable() returns EFI_BUFFER_TOO_SMALL, it updates
   *out_len to the required buffer size but writes no data to the output
   buffer. However, due to bug #1, gmin_get_var_int() believes the call
   succeeded.

The caller gmin_get_var_int() then performs:
- Allocates val[CFG_VAR_NAME_MAX + 1] (65 bytes) on stack
- Calls gmin_get_config_var(dev, is_gmin, var, val, &amp;len) with len=64
- If EFI variable is &gt;64 bytes, efi.get_variable() sets len=required_size
- Due to bug #1, thinks call succeeded with len=required_size
- Executes val[len] = 0, writing past end of 65-byte stack buffer

This creates a stack buffer overflow when EFI variables are larger than
64 bytes. Since EFI variables can be controlled by firmware or system
configuration, this could potentially be exploited for code execution.

Fix the bug by returning proper error codes from gmin_get_config_var()
based on EFI status instead of stale 'ret' value.

The gmin_get_var_int() function is called during device initialization
for camera sensor configuration on Intel Bay Trail and Cherry Trail
platforms using the atomisp camera stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-04"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38585/">CVE-2025-38585 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38585">CVE-2025-38585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248355">SUSE bug 1248355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248671">SUSE bug 1248671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38586</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38586" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38586" ref_url="https://www.suse.com/security/cve/CVE-2025-38586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, arm64: Fix fp initialization for exception boundary

In the ARM64 BPF JIT when prog-&gt;aux-&gt;exception_boundary is set for a BPF
program, find_used_callee_regs() is not called because for a program
acting as exception boundary, all callee saved registers are saved.
find_used_callee_regs() sets `ctx-&gt;fp_used = true;` when it sees FP
being used in any of the instructions.

For programs acting as exception boundary, ctx-&gt;fp_used remains false
even if frame pointer is used by the program and therefore, FP is not
set-up for such programs in the prologue. This can cause the kernel to
crash due to a pagefault.

Fix it by setting ctx-&gt;fp_used = true for exception boundary programs as
fp is always saved in such programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38586/">CVE-2025-38586 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38586">CVE-2025-38586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248359">SUSE bug 1248359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38587</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38587" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38587" ref_url="https://www.suse.com/security/cve/CVE-2025-38587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix possible infinite loop in fib6_info_uses_dev()

fib6_info_uses_dev() seems to rely on RCU without an explicit
protection.

Like the prior fix in rt6_nlmsg_size(),
we need to make sure fib6_del_route() or fib6_add_rt2node()
have not removed the anchor from the list, or we risk an infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38587/">CVE-2025-38587 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38587">CVE-2025-38587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248361">SUSE bug 1248361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38588</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38588" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38588" ref_url="https://www.suse.com/security/cve/CVE-2025-38588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent infinite loop in rt6_nlmsg_size()

While testing prior patch, I was able to trigger
an infinite loop in rt6_nlmsg_size() in the following place:

list_for_each_entry_rcu(sibling, &amp;f6i-&gt;fib6_siblings,
			fib6_siblings) {
	rt6_nh_nlmsg_size(sibling-&gt;fib6_nh, &amp;nexthop_len);
}

This is because fib6_del_route() and fib6_add_rt2node()
uses list_del_rcu(), which can confuse rcu readers,
because they might no longer see the head of the list.

Restart the loop if f6i-&gt;fib6_nsiblings is zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38588/">CVE-2025-38588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38588">CVE-2025-38588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248368">SUSE bug 1248368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249241">SUSE bug 1249241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040506" comment="kernel-livepatch-6_12_0-160000_5-default-5-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040513" comment="kernel-livepatch-6_12_0-160000_5-rt-4-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38589</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38589" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38589" ref_url="https://www.suse.com/security/cve/CVE-2025-38589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

neighbour: Fix null-ptr-deref in neigh_flush_dev().

kernel test robot reported null-ptr-deref in neigh_flush_dev(). [0]

The cited commit introduced per-netdev neighbour list and converted
neigh_flush_dev() to use it instead of the global hash table.

One thing we missed is that neigh_table_clear() calls neigh_ifdown()
with NULL dev.

Let's restore the hash table iteration.

Note that IPv6 module is no longer unloadable, so neigh_table_clear()
is called only when IPv6 fails to initialise, which is unlikely to
happen.

[0]:
IPv6: Attempt to unregister permanent protocol 136
IPv6: Attempt to unregister permanent protocol 17
Oops: general protection fault, probably for non-canonical address 0xdffffc00000001a0: 0000 [#1] SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000d00-0x0000000000000d07]
CPU: 1 UID: 0 PID: 1 Comm: systemd Tainted: G                T  6.12.0-rc6-01246-gf7f52738637f #1
Tainted: [T]=RANDSTRUCT
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
RIP: 0010:neigh_flush_dev.llvm.6395807810224103582+0x52/0x570
Code: c1 e8 03 42 8a 04 38 84 c0 0f 85 15 05 00 00 31 c0 41 83 3e 0a 0f 94 c0 48 8d 1c c3 48 81 c3 f8 0c 00 00 48 89 d8 48 c1 e8 03 &lt;42&gt; 80 3c 38 00 74 08 48 89 df e8 f7 49 93 fe 4c 8b 3b 4d 85 ff 0f
RSP: 0000:ffff88810026f408 EFLAGS: 00010206
RAX: 00000000000001a0 RBX: 0000000000000d00 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffc0631640
RBP: ffff88810026f470 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: ffffffffc0625250 R14: ffffffffc0631640 R15: dffffc0000000000
FS:  00007f575cb83940(0000) GS:ffff8883aee00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f575db40008 CR3: 00000002bf936000 CR4: 00000000000406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 __neigh_ifdown.llvm.6395807810224103582+0x44/0x390
 neigh_table_clear+0xb1/0x268
 ndisc_cleanup+0x21/0x38 [ipv6]
 init_module+0x2f5/0x468 [ipv6]
 do_one_initcall+0x1ba/0x628
 do_init_module+0x21a/0x530
 load_module+0x2550/0x2ea0
 __se_sys_finit_module+0x3d2/0x620
 __x64_sys_finit_module+0x76/0x88
 x64_sys_call+0x7ff/0xde8
 do_syscall_64+0xfb/0x1e8
 entry_SYSCALL_64_after_hwframe+0x67/0x6f
RIP: 0033:0x7f575d6f2719
Code: 08 89 e8 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d b7 06 0d 00 f7 d8 64 89 01 48
RSP: 002b:00007fff82a2a268 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
RAX: ffffffffffffffda RBX: 0000557827b45310 RCX: 00007f575d6f2719
RDX: 0000000000000000 RSI: 00007f575d584efd RDI: 0000000000000004
RBP: 00007f575d584efd R08: 0000000000000000 R09: 0000557827b47b00
R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000020000
R13: 0000000000000000 R14: 0000557827b470e0 R15: 00007f575dbb4270
 &lt;/TASK&gt;
Modules linked in: ipv6(+)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38589/">CVE-2025-38589 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38589">CVE-2025-38589 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248366">SUSE bug 1248366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38590</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38590" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38590" ref_url="https://www.suse.com/security/cve/CVE-2025-38590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Remove skb secpath if xfrm state is not found

Hardware returns a unique identifier for a decrypted packet's xfrm
state, this state is looked up in an xarray. However, the state might
have been freed by the time of this lookup.

Currently, if the state is not found, only a counter is incremented.
The secpath (sp) extension on the skb is not removed, resulting in
sp-&gt;len becoming 0.

Subsequently, functions like __xfrm_policy_check() attempt to access
fields such as xfrm_input_state(skb)-&gt;xso.type (which dereferences
sp-&gt;xvec[sp-&gt;len - 1]) without first validating sp-&gt;len. This leads to
a crash when dereferencing an invalid state pointer.

This patch prevents the crash by explicitly removing the secpath
extension from the skb if the xfrm state is not found after hardware
decryption. This ensures downstream functions do not operate on a
zero-length secpath.

 BUG: unable to handle page fault for address: ffffffff000002c8
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 282e067 P4D 282e067 PUD 0
 Oops: Oops: 0000 [#1] SMP
 CPU: 12 UID: 0 PID: 0 Comm: swapper/12 Not tainted 6.15.0-rc7_for_upstream_min_debug_2025_05_27_22_44 #1 NONE
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
 RIP: 0010:__xfrm_policy_check+0x61a/0xa30
 Code: b6 77 7f 83 e6 02 74 14 4d 8b af d8 00 00 00 41 0f b6 45 05 c1 e0 03 48 98 49 01 c5 41 8b 45 00 83 e8 01 48 98 49 8b 44 c5 10 &lt;0f&gt; b6 80 c8 02 00 00 83 e0 0c 3c 04 0f 84 0c 02 00 00 31 ff 80 fa
 RSP: 0018:ffff88885fb04918 EFLAGS: 00010297
 RAX: ffffffff00000000 RBX: 0000000000000002 RCX: 0000000000000000
 RDX: 0000000000000002 RSI: 0000000000000002 RDI: 0000000000000000
 RBP: ffffffff8311af80 R08: 0000000000000020 R09: 00000000c2eda353
 R10: ffff88812be2bbc8 R11: 000000001faab533 R12: ffff88885fb049c8
 R13: ffff88812be2bbc8 R14: 0000000000000000 R15: ffff88811896ae00
 FS:  0000000000000000(0000) GS:ffff8888dca82000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: ffffffff000002c8 CR3: 0000000243050002 CR4: 0000000000372eb0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;IRQ&gt;
  ? try_to_wake_up+0x108/0x4c0
  ? udp4_lib_lookup2+0xbe/0x150
  ? udp_lib_lport_inuse+0x100/0x100
  ? __udp4_lib_lookup+0x2b0/0x410
  __xfrm_policy_check2.constprop.0+0x11e/0x130
  udp_queue_rcv_one_skb+0x1d/0x530
  udp_unicast_rcv_skb+0x76/0x90
  __udp4_lib_rcv+0xa64/0xe90
  ip_protocol_deliver_rcu+0x20/0x130
  ip_local_deliver_finish+0x75/0xa0
  ip_local_deliver+0xc1/0xd0
  ? ip_protocol_deliver_rcu+0x130/0x130
  ip_sublist_rcv+0x1f9/0x240
  ? ip_rcv_finish_core+0x430/0x430
  ip_list_rcv+0xfc/0x130
  __netif_receive_skb_list_core+0x181/0x1e0
  netif_receive_skb_list_internal+0x200/0x360
  ? mlx5e_build_rx_skb+0x1bc/0xda0 [mlx5_core]
  gro_receive_skb+0xfd/0x210
  mlx5e_handle_rx_cqe_mpwrq+0x141/0x280 [mlx5_core]
  mlx5e_poll_rx_cq+0xcc/0x8e0 [mlx5_core]
  ? mlx5e_handle_rx_dim+0x91/0xd0 [mlx5_core]
  mlx5e_napi_poll+0x114/0xab0 [mlx5_core]
  __napi_poll+0x25/0x170
  net_rx_action+0x32d/0x3a0
  ? mlx5_eq_comp_int+0x8d/0x280 [mlx5_core]
  ? notifier_call_chain+0x33/0xa0
  handle_softirqs+0xda/0x250
  irq_exit_rcu+0x6d/0xc0
  common_interrupt+0x81/0xa0
  &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38590/">CVE-2025-38590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38590">CVE-2025-38590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248360">SUSE bug 1248360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38591</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38591" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38591" ref_url="https://www.suse.com/security/cve/CVE-2025-38591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Reject narrower access to pointer ctx fields

The following BPF program, simplified from a syzkaller repro, causes a
kernel warning:

    r0 = *(u8 *)(r1 + 169);
    exit;

With pointer field sk being at offset 168 in __sk_buff. This access is
detected as a narrower read in bpf_skb_is_valid_access because it
doesn't match offsetof(struct __sk_buff, sk). It is therefore allowed
and later proceeds to bpf_convert_ctx_access. Note that for the
"is_narrower_load" case in the convert_ctx_accesses(), the insn-&gt;off
is aligned, so the cnt may not be 0 because it matches the
offsetof(struct __sk_buff, sk) in the bpf_convert_ctx_access. However,
the target_size stays 0 and the verifier errors with a kernel warning:

    verifier bug: error during ctx access conversion(1)

This patch fixes that to return a proper "invalid bpf_context access
off=X size=Y" error on the load instruction.

The same issue affects multiple other fields in context structures that
allow narrow access. Some other non-affected fields (for sk_msg,
sk_lookup, and sockopt) were also changed to use bpf_ctx_range_ptr for
consistency.

Note this syzkaller crash was reported in the "Closes" link below, which
used to be about a different bug, fixed in
commit fce7bd8e385a ("bpf/verifier: Handle BPF_LOAD_ACQ instructions
in insn_def_regno()"). Because syzbot somehow confused the two bugs,
the new crash and repro didn't get reported to the mailing list.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38591/">CVE-2025-38591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38591">CVE-2025-38591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248363">SUSE bug 1248363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38593</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38593" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38593" ref_url="https://www.suse.com/security/cve/CVE-2025-38593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_sync: fix double free in 'hci_discovery_filter_clear()'

Function 'hci_discovery_filter_clear()' frees 'uuids' array and then
sets it to NULL. There is a tiny chance of the following race:

'hci_cmd_sync_work()'

 'update_passive_scan_sync()'

   'hci_update_passive_scan_sync()'

     'hci_discovery_filter_clear()'
       kfree(uuids);

       &lt;-------------------------preempted--------------------------------&gt;
                                           'start_service_discovery()'

                                             'hci_discovery_filter_clear()'
                                               kfree(uuids); // DOUBLE FREE

       &lt;-------------------------preempted--------------------------------&gt;

      uuids = NULL;

To fix it let's add locking around 'kfree()' call and NULL pointer
assignment. Otherwise the following backtrace fires:

[ ] ------------[ cut here ]------------
[ ] kernel BUG at mm/slub.c:547!
[ ] Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
[ ] CPU: 3 UID: 0 PID: 246 Comm: bluetoothd Tainted: G O 6.12.19-kernel #1
[ ] Tainted: [O]=OOT_MODULE
[ ] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ ] pc : __slab_free+0xf8/0x348
[ ] lr : __slab_free+0x48/0x348
...
[ ] Call trace:
[ ]  __slab_free+0xf8/0x348
[ ]  kfree+0x164/0x27c
[ ]  start_service_discovery+0x1d0/0x2c0
[ ]  hci_sock_sendmsg+0x518/0x924
[ ]  __sock_sendmsg+0x54/0x60
[ ]  sock_write_iter+0x98/0xf8
[ ]  do_iter_readv_writev+0xe4/0x1c8
[ ]  vfs_writev+0x128/0x2b0
[ ]  do_writev+0xfc/0x118
[ ]  __arm64_sys_writev+0x20/0x2c
[ ]  invoke_syscall+0x68/0xf0
[ ]  el0_svc_common.constprop.0+0x40/0xe0
[ ]  do_el0_svc+0x1c/0x28
[ ]  el0_svc+0x30/0xd0
[ ]  el0t_64_sync_handler+0x100/0x12c
[ ]  el0t_64_sync+0x194/0x198
[ ] Code: 8b0002e6 eb17031f 54fffbe1 d503201f (d4210000)
[ ] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38593/">CVE-2025-38593 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38593">CVE-2025-38593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248357">SUSE bug 1248357</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38595</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38595" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38595" ref_url="https://www.suse.com/security/cve/CVE-2025-38595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen: fix UAF in dmabuf_exp_from_pages()

[dma_buf_fd() fixes; no preferences regarding the tree it goes through -
up to xen folks]

As soon as we'd inserted a file reference into descriptor table, another
thread could close it.  That's fine for the case when all we are doing is
returning that descriptor to userland (it's a race, but it's a userland
race and there's nothing the kernel can do about it).  However, if we
follow fd_install() with any kind of access to objects that would be
destroyed on close (be it the struct file itself or anything destroyed
by its -&gt;release()), we have a UAF.

dma_buf_fd() is a combination of reserving a descriptor and fd_install().
gntdev dmabuf_exp_from_pages() calls it and then proceeds to access the
objects destroyed on close - starting with gntdev_dmabuf itself.

Fix that by doing reserving descriptor before anything else and do
fd_install() only when everything had been set up.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38595/">CVE-2025-38595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38595">CVE-2025-38595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248380">SUSE bug 1248380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38597</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38597" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38597" ref_url="https://www.suse.com/security/cve/CVE-2025-38597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port

Each window of a vop2 is usable by a specific set of video ports, so while
binding the vop2, we look through the list of available windows trying to
find one designated as primary-plane and usable by that specific port.

The code later wants to use drm_crtc_init_with_planes with that found
primary plane, but nothing has checked so far if a primary plane was
actually found.

For whatever reason, the rk3576 vp2 does not have a usable primary window
(if vp0 is also in use) which brought the issue to light and ended in a
null-pointer dereference further down.

As we expect a primary-plane to exist for a video-port, add a check at
the end of the window-iteration and fail probing if none was found.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38597/">CVE-2025-38597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38597">CVE-2025-38597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248378">SUSE bug 1248378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38601</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38601" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38601" ref_url="https://www.suse.com/security/cve/CVE-2025-38601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: clear initialized flag for deinit-ed srng lists

In a number of cases we see kernel panics on resume due
to ath11k kernel page fault, which happens under the
following circumstances:

1) First ath11k_hal_dump_srng_stats() call

 Last interrupt received for each group:
 ath11k_pci 0000:01:00.0: group_id 0 22511ms before
 ath11k_pci 0000:01:00.0: group_id 1 14440788ms before
 [..]
 ath11k_pci 0000:01:00.0: failed to receive control response completion, polling..
 ath11k_pci 0000:01:00.0: Service connect timeout
 ath11k_pci 0000:01:00.0: failed to connect to HTT: -110
 ath11k_pci 0000:01:00.0: failed to start core: -110
 ath11k_pci 0000:01:00.0: firmware crashed: MHI_CB_EE_RDDM
 ath11k_pci 0000:01:00.0: already resetting count 2
 ath11k_pci 0000:01:00.0: failed to wait wlan mode request (mode 4): -110
 ath11k_pci 0000:01:00.0: qmi failed to send wlan mode off: -110
 ath11k_pci 0000:01:00.0: failed to reconfigure driver on crash recovery
 [..]

2) At this point reconfiguration fails (we have 2 resets) and
  ath11k_core_reconfigure_on_crash() calls ath11k_hal_srng_deinit()
  which destroys srng lists.  However, it does not reset per-list
  -&gt;initialized flag.

3) Second ath11k_hal_dump_srng_stats() call sees stale -&gt;initialized
  flag and attempts to dump srng stats:

 Last interrupt received for each group:
 ath11k_pci 0000:01:00.0: group_id 0 66785ms before
 ath11k_pci 0000:01:00.0: group_id 1 14485062ms before
 ath11k_pci 0000:01:00.0: group_id 2 14485062ms before
 ath11k_pci 0000:01:00.0: group_id 3 14485062ms before
 ath11k_pci 0000:01:00.0: group_id 4 14780845ms before
 ath11k_pci 0000:01:00.0: group_id 5 14780845ms before
 ath11k_pci 0000:01:00.0: group_id 6 14485062ms before
 ath11k_pci 0000:01:00.0: group_id 7 66814ms before
 ath11k_pci 0000:01:00.0: group_id 8 68997ms before
 ath11k_pci 0000:01:00.0: group_id 9 67588ms before
 ath11k_pci 0000:01:00.0: group_id 10 69511ms before
 BUG: unable to handle page fault for address: ffffa007404eb010
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 100000067 P4D 100000067 PUD 10022d067 PMD 100b01067 PTE 0
 Oops: 0000 [#1] PREEMPT SMP NOPTI
 RIP: 0010:ath11k_hal_dump_srng_stats+0x2b4/0x3b0 [ath11k]
 Call Trace:
 &lt;TASK&gt;
 ? __die_body+0xae/0xb0
 ? page_fault_oops+0x381/0x3e0
 ? exc_page_fault+0x69/0xa0
 ? asm_exc_page_fault+0x22/0x30
 ? ath11k_hal_dump_srng_stats+0x2b4/0x3b0 [ath11k (HASH:6cea 4)]
 ath11k_qmi_driver_event_work+0xbd/0x1050 [ath11k (HASH:6cea 4)]
 worker_thread+0x389/0x930
 kthread+0x149/0x170

Clear per-list -&gt;initialized flag in ath11k_hal_srng_deinit().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38601/">CVE-2025-38601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38601">CVE-2025-38601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248340">SUSE bug 1248340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38602</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38602" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38602" ref_url="https://www.suse.com/security/cve/CVE-2025-38602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iwlwifi: Add missing check for alloc_ordered_workqueue

Add check for the return value of alloc_ordered_workqueue since it may
return NULL pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38602/">CVE-2025-38602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38602">CVE-2025-38602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248341">SUSE bug 1248341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38604</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38604" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38604" ref_url="https://www.suse.com/security/cve/CVE-2025-38604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtl818x: Kill URBs before clearing tx status queue

In rtl8187_stop() move the call of usb_kill_anchored_urbs() before clearing
b_tx_status.queue. This change prevents callbacks from using already freed
skb due to anchor was not killed before freeing such skb.

 BUG: kernel NULL pointer dereference, address: 0000000000000080
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: Oops: 0000 [#1] SMP NOPTI
 CPU: 7 UID: 0 PID: 0 Comm: swapper/7 Not tainted 6.15.0 #8 PREEMPT(voluntary)
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015
 RIP: 0010:ieee80211_tx_status_irqsafe+0x21/0xc0 [mac80211]
 Call Trace:
  &lt;IRQ&gt;
  rtl8187_tx_cb+0x116/0x150 [rtl8187]
  __usb_hcd_giveback_urb+0x9d/0x120
  usb_giveback_urb_bh+0xbb/0x140
  process_one_work+0x19b/0x3c0
  bh_worker+0x1a7/0x210
  tasklet_action+0x10/0x30
  handle_softirqs+0xf0/0x340
  __irq_exit_rcu+0xcd/0xf0
  common_interrupt+0x85/0xa0
  &lt;/IRQ&gt;

Tested on RTL8187BvE device.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38604/">CVE-2025-38604 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38604">CVE-2025-38604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248333">SUSE bug 1248333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38605</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38605" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38605" ref_url="https://www.suse.com/security/cve/CVE-2025-38605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type()

In ath12k_dp_tx_get_encap_type(), the arvif parameter is only used to
retrieve the ab pointer. In vdev delete sequence the arvif-&gt;ar could
become NULL and that would trigger kernel panic.
Since the caller ath12k_dp_tx() already has a valid ab pointer, pass it
directly to avoid panic and unnecessary dereferencing.

PC points to "ath12k_dp_tx+0x228/0x988 [ath12k]"
LR points to "ath12k_dp_tx+0xc8/0x988 [ath12k]".
The Backtrace obtained is as follows:
ath12k_dp_tx+0x228/0x988 [ath12k]
ath12k_mac_tx_check_max_limit+0x608/0x920 [ath12k]
ieee80211_process_measurement_req+0x320/0x348 [mac80211]
ieee80211_tx_dequeue+0x9ac/0x1518 [mac80211]
ieee80211_tx_dequeue+0xb14/0x1518 [mac80211]
ieee80211_tx_prepare_skb+0x224/0x254 [mac80211]
ieee80211_xmit+0xec/0x100 [mac80211]
__ieee80211_subif_start_xmit+0xc50/0xf40 [mac80211]
ieee80211_subif_start_xmit+0x2e8/0x308 [mac80211]
netdev_start_xmit+0x150/0x18c
dev_hard_start_xmit+0x74/0xc0

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38605/">CVE-2025-38605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38605">CVE-2025-38605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248334">SUSE bug 1248334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38608</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38608" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38608" ref_url="https://www.suse.com/security/cve/CVE-2025-38608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls

When sending plaintext data, we initially calculated the corresponding
ciphertext length. However, if we later reduced the plaintext data length
via socket policy, we failed to recalculate the ciphertext length.

This results in transmitting buffers containing uninitialized data during
ciphertext transmission.

This causes uninitialized bytes to be appended after a complete
"Application Data" packet, leading to errors on the receiving end when
parsing TLS record.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38608/">CVE-2025-38608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38608">CVE-2025-38608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248338">SUSE bug 1248338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248670">SUSE bug 1248670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040506" comment="kernel-livepatch-6_12_0-160000_5-default-5-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040513" comment="kernel-livepatch-6_12_0-160000_5-rt-4-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38609</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38609" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38609" ref_url="https://www.suse.com/security/cve/CVE-2025-38609" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM / devfreq: Check governor before using governor-&gt;name

Commit 96ffcdf239de ("PM / devfreq: Remove redundant governor_name from
struct devfreq") removes governor_name and uses governor-&gt;name to replace
it. But devfreq-&gt;governor may be NULL and directly using
devfreq-&gt;governor-&gt;name may cause null pointer exception. Move the check of
governor to before using governor-&gt;name.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38609/">CVE-2025-38609 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38609">CVE-2025-38609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248337">SUSE bug 1248337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38610</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38610" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38610" ref_url="https://www.suse.com/security/cve/CVE-2025-38610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw()

The get_pd_power_uw() function can crash with a NULL pointer dereference
when em_cpu_get() returns NULL. This occurs when a CPU becomes impossible
during runtime, causing get_cpu_device() to return NULL, which propagates
through em_cpu_get() and leads to a crash when em_span_cpus() dereferences
the NULL pointer.

Add a NULL check after em_cpu_get() and return 0 if unavailable,
matching the existing fallback behavior in __dtpm_cpu_setup().

[ rjw: Drop an excess empty code line ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38610/">CVE-2025-38610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38610">CVE-2025-38610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248395">SUSE bug 1248395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38612</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38612" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38612" ref_url="https://www.suse.com/security/cve/CVE-2025-38612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc()

In the error paths after fb_info structure is successfully allocated,
the memory allocated in fb_deferred_io_init() for info-&gt;pagerefs is not
freed. Fix that by adding the cleanup function on the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38612/">CVE-2025-38612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38612">CVE-2025-38612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248390">SUSE bug 1248390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38614</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38614" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38614" ref_url="https://www.suse.com/security/cve/CVE-2025-38614" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

eventpoll: Fix semi-unbounded recursion

Ensure that epoll instances can never form a graph deeper than
EP_MAX_NESTS+1 links.

Currently, ep_loop_check_proc() ensures that the graph is loop-free and
does some recursion depth checks, but those recursion depth checks don't
limit the depth of the resulting tree for two reasons:

 - They don't look upwards in the tree.
 - If there are multiple downwards paths of different lengths, only one of
   the paths is actually considered for the depth check since commit
   28d82dc1c4ed ("epoll: limit paths").

Essentially, the current recursion depth check in ep_loop_check_proc() just
serves to prevent it from recursing too deeply while checking for loops.

A more thorough check is done in reverse_path_check() after the new graph
edge has already been created; this checks, among other things, that no
paths going upwards from any non-epoll file with a length of more than 5
edges exist. However, this check does not apply to non-epoll files.

As a result, it is possible to recurse to a depth of at least roughly 500,
tested on v6.15. (I am unsure if deeper recursion is possible; and this may
have changed with commit 8c44dac8add7 ("eventpoll: Fix priority inversion
problem").)

To fix it:

1. In ep_loop_check_proc(), note the subtree depth of each visited node,
and use subtree depths for the total depth calculation even when a subtree
has already been visited.
2. Add ep_get_upwards_depth_proc() for similarly determining the maximum
depth of an upwards walk.
3. In ep_loop_check(), use these values to limit the total path length
between epoll nodes to EP_MAX_NESTS edges.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38614/">CVE-2025-38614 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38614">CVE-2025-38614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248392">SUSE bug 1248392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38616</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38616" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38616" ref_url="https://www.suse.com/security/cve/CVE-2025-38616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: handle data disappearing from under the TLS ULP

TLS expects that it owns the receive queue of the TCP socket.
This cannot be guaranteed in case the reader of the TCP socket
entered before the TLS ULP was installed, or uses some non-standard
read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy
early exit (which leaves anchor pointing to a freed skb) with real
error handling. Wipe the parsing state and tell the reader to retry.

We already reload the anchor every time we (re)acquire the socket lock,
so the only condition we need to avoid is an out of bounds read
(not having enough bytes in the socket for previously parsed record len).

If some data was read from under TLS but there's enough in the queue
we'll reload and decrypt what is most likely not a valid TLS record.
Leading to some undefined behavior from TLS perspective (corrupting
a stream? missing an alert? missing an attack?) but no kernel crash
should take place.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38616/">CVE-2025-38616 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38616">CVE-2025-38616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248512">SUSE bug 1248512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249537">SUSE bug 1249537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040506" comment="kernel-livepatch-6_12_0-160000_5-default-5-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040513" comment="kernel-livepatch-6_12_0-160000_5-rt-4-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38617</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38617" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38617" ref_url="https://www.suse.com/security/cve/CVE-2025-38617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4050-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/packet: fix a race in packet_set_ring() and packet_notifier()

When packet_set_ring() releases po-&gt;bind_lock, another thread can
run packet_notifier() and process an NETDEV_UP event.

This race and the fix are both similar to that of commit 15fe076edea7
("net/packet: fix a race in packet_bind() and packet_notifier()").

There too the packet_notifier NETDEV_UP event managed to run while a
po-&gt;bind_lock critical section had to be temporarily released. And
the fix was similarly to temporarily set po-&gt;num to zero to keep
the socket unhooked until the lock is retaken.

The po-&gt;bind_lock in packet_set_ring and packet_notifier precede the
introduction of git history.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38617/">CVE-2025-38617 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38617">CVE-2025-38617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248621">SUSE bug 1248621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249208">SUSE bug 1249208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253291">SUSE bug 1253291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040506" comment="kernel-livepatch-6_12_0-160000_5-default-5-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040513" comment="kernel-livepatch-6_12_0-160000_5-rt-4-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38618</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38618" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38618" ref_url="https://www.suse.com/security/cve/CVE-2025-38618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20986-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4050-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: Do not allow binding to VMADDR_PORT_ANY

It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can
cause a use-after-free when a connection is made to the bound socket.
The socket returned by accept() also has port VMADDR_PORT_ANY but is not
on the list of unbound sockets. Binding it will result in an extra
refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep
the binding until socket destruction).

Modify the check in __vsock_bind_connectible() to also prevent binding
to VMADDR_PORT_ANY.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38618/">CVE-2025-38618 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38618">CVE-2025-38618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248511">SUSE bug 1248511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249207">SUSE bug 1249207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040506" comment="kernel-livepatch-6_12_0-160000_5-default-5-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040513" comment="kernel-livepatch-6_12_0-160000_5-rt-4-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38619</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38619" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38619" ref_url="https://www.suse.com/security/cve/CVE-2025-38619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: ti: j721e-csi2rx: fix list_del corruption

If ti_csi2rx_start_dma() fails in ti_csi2rx_dma_callback(), the buffer is
marked done with VB2_BUF_STATE_ERROR but is not removed from the DMA queue.
This causes the same buffer to be retried in the next iteration, resulting
in a double list_del() and eventual list corruption.

Fix this by removing the buffer from the queue before calling
vb2_buffer_done() on error.

This resolves a crash due to list_del corruption:
[   37.811243] j721e-csi2rx 30102000.ticsi2rx: Failed to queue the next buffer for DMA
[   37.832187]  slab kmalloc-2k start ffff00000255b000 pointer offset 1064 size 2048
[   37.839761] list_del corruption. next-&gt;prev should be ffff00000255bc28, but was ffff00000255d428. (next=ffff00000255b428)
[   37.850799] ------------[ cut here ]------------
[   37.855424] kernel BUG at lib/list_debug.c:65!
[   37.859876] Internal error: Oops - BUG: 00000000f2000800 [#1]  SMP
[   37.866061] Modules linked in: i2c_dev usb_f_rndis u_ether libcomposite dwc3 udc_core usb_common aes_ce_blk aes_ce_cipher ghash_ce gf128mul sha1_ce cpufreq_dt dwc3_am62 phy_gmii_sel sa2ul
[   37.882830] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.16.0-rc3+ #28 VOLUNTARY
[   37.890851] Hardware name: Bosch STLA-GSRV2-B0 (DT)
[   37.895737] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   37.902703] pc : __list_del_entry_valid_or_report+0xdc/0x114
[   37.908390] lr : __list_del_entry_valid_or_report+0xdc/0x114
[   37.914059] sp : ffff800080003db0
[   37.917375] x29: ffff800080003db0 x28: 0000000000000007 x27: ffff800080e50000
[   37.924521] x26: 0000000000000000 x25: ffff0000016abb50 x24: dead000000000122
[   37.931666] x23: ffff0000016abb78 x22: ffff0000016ab080 x21: ffff800080003de0
[   37.938810] x20: ffff00000255bc00 x19: ffff00000255b800 x18: 000000000000000a
[   37.945956] x17: 20747562202c3832 x16: 6362353532303030 x15: 0720072007200720
[   37.953101] x14: 0720072007200720 x13: 0720072007200720 x12: 00000000ffffffea
[   37.960248] x11: ffff800080003b18 x10: 00000000ffffefff x9 : ffff800080f5b568
[   37.967396] x8 : ffff800080f5b5c0 x7 : 0000000000017fe8 x6 : c0000000ffffefff
[   37.974542] x5 : ffff00000fea6688 x4 : 0000000000000000 x3 : 0000000000000000
[   37.981686] x2 : 0000000000000000 x1 : ffff800080ef2b40 x0 : 000000000000006d
[   37.988832] Call trace:
[   37.991281]  __list_del_entry_valid_or_report+0xdc/0x114 (P)
[   37.996959]  ti_csi2rx_dma_callback+0x84/0x1c4
[   38.001419]  udma_vchan_complete+0x1e0/0x344
[   38.005705]  tasklet_action_common+0x118/0x310
[   38.010163]  tasklet_action+0x30/0x3c
[   38.013832]  handle_softirqs+0x10c/0x2e0
[   38.017761]  __do_softirq+0x14/0x20
[   38.021256]  ____do_softirq+0x10/0x20
[   38.024931]  call_on_irq_stack+0x24/0x60
[   38.028873]  do_softirq_own_stack+0x1c/0x40
[   38.033064]  __irq_exit_rcu+0x130/0x15c
[   38.036909]  irq_exit_rcu+0x10/0x20
[   38.040403]  el1_interrupt+0x38/0x60
[   38.043987]  el1h_64_irq_handler+0x18/0x24
[   38.048091]  el1h_64_irq+0x6c/0x70
[   38.051501]  default_idle_call+0x34/0xe0 (P)
[   38.055783]  do_idle+0x1f8/0x250
[   38.059021]  cpu_startup_entry+0x34/0x3c
[   38.062951]  rest_init+0xb4/0xc0
[   38.066186]  console_on_rootfs+0x0/0x6c
[   38.070031]  __primary_switched+0x88/0x90
[   38.074059] Code: b00037e0 91378000 f9400462 97e9bf49 (d4210000)
[   38.080168] ---[ end trace 0000000000000000 ]---
[   38.084795] Kernel panic - not syncing: Oops - BUG: Fatal exception in interrupt
[   38.092197] SMP: stopping secondary CPUs
[   38.096139] Kernel Offset: disabled
[   38.099631] CPU features: 0x0000,00002000,02000801,0400420b
[   38.105202] Memory Limit: none
[   38.108260] ---[ end Kernel panic - not syncing: Oops - BUG: Fatal exception in interrupt ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38619/">CVE-2025-38619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38619">CVE-2025-38619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248664">SUSE bug 1248664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248665">SUSE bug 1248665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38621</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38621" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38621" ref_url="https://www.suse.com/security/cve/CVE-2025-38621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: make rdev_addable usable for rcu mode

Our testcase trigger panic:

BUG: kernel NULL pointer dereference, address: 00000000000000e0
...
Oops: Oops: 0000 [#1] SMP NOPTI
CPU: 2 UID: 0 PID: 85 Comm: kworker/2:1 Not tainted 6.16.0+ #94
PREEMPT(none)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.1-2.fc37 04/01/2014
Workqueue: md_misc md_start_sync
RIP: 0010:rdev_addable+0x4d/0xf0
...
Call Trace:
 &lt;TASK&gt;
 md_start_sync+0x329/0x480
 process_one_work+0x226/0x6d0
 worker_thread+0x19e/0x340
 kthread+0x10f/0x250
 ret_from_fork+0x14d/0x180
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
Modules linked in: raid10
CR2: 00000000000000e0
---[ end trace 0000000000000000 ]---
RIP: 0010:rdev_addable+0x4d/0xf0

md_spares_need_change in md_start_sync will call rdev_addable which
protected by rcu_read_lock/rcu_read_unlock. This rcu context will help
protect rdev won't be released, but rdev-&gt;mddev will be set to NULL
before we call synchronize_rcu in md_kick_rdev_from_array. Fix this by
using READ_ONCE and check does rdev-&gt;mddev still alive.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38621/">CVE-2025-38621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38621">CVE-2025-38621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248609">SUSE bug 1248609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38622</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38622" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38622" ref_url="https://www.suse.com/security/cve/CVE-2025-38622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: drop UFO packets in udp_rcv_segment()

When sending a packet with virtio_net_hdr to tun device, if the gso_type
in virtio_net_hdr is SKB_GSO_UDP and the gso_size is less than udphdr
size, below crash may happen.

  ------------[ cut here ]------------
  kernel BUG at net/core/skbuff.c:4572!
  Oops: invalid opcode: 0000 [#1] SMP NOPTI
  CPU: 0 UID: 0 PID: 62 Comm: mytest Not tainted 6.16.0-rc7 #203 PREEMPT(voluntary)
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
  RIP: 0010:skb_pull_rcsum+0x8e/0xa0
  Code: 00 00 5b c3 cc cc cc cc 8b 93 88 00 00 00 f7 da e8 37 44 38 00 f7 d8 89 83 88 00 00 00 48 8b 83 c8 00 00 00 5b c3 cc cc cc cc &lt;0f&gt; 0b 0f 0b 66 66 2e 0f 1f 84 00 000
  RSP: 0018:ffffc900001fba38 EFLAGS: 00000297
  RAX: 0000000000000004 RBX: ffff8880040c1000 RCX: ffffc900001fb948
  RDX: ffff888003e6d700 RSI: 0000000000000008 RDI: ffff88800411a062
  RBP: ffff8880040c1000 R08: 0000000000000000 R09: 0000000000000001
  R10: ffff888003606c00 R11: 0000000000000001 R12: 0000000000000000
  R13: ffff888004060900 R14: ffff888004050000 R15: ffff888004060900
  FS:  000000002406d3c0(0000) GS:ffff888084a19000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000020000040 CR3: 0000000004007000 CR4: 00000000000006f0
  Call Trace:
   &lt;TASK&gt;
   udp_queue_rcv_one_skb+0x176/0x4b0 net/ipv4/udp.c:2445
   udp_queue_rcv_skb+0x155/0x1f0 net/ipv4/udp.c:2475
   udp_unicast_rcv_skb+0x71/0x90 net/ipv4/udp.c:2626
   __udp4_lib_rcv+0x433/0xb00 net/ipv4/udp.c:2690
   ip_protocol_deliver_rcu+0xa6/0x160 net/ipv4/ip_input.c:205
   ip_local_deliver_finish+0x72/0x90 net/ipv4/ip_input.c:233
   ip_sublist_rcv_finish+0x5f/0x70 net/ipv4/ip_input.c:579
   ip_sublist_rcv+0x122/0x1b0 net/ipv4/ip_input.c:636
   ip_list_rcv+0xf7/0x130 net/ipv4/ip_input.c:670
   __netif_receive_skb_list_core+0x21d/0x240 net/core/dev.c:6067
   netif_receive_skb_list_internal+0x186/0x2b0 net/core/dev.c:6210
   napi_complete_done+0x78/0x180 net/core/dev.c:6580
   tun_get_user+0xa63/0x1120 drivers/net/tun.c:1909
   tun_chr_write_iter+0x65/0xb0 drivers/net/tun.c:1984
   vfs_write+0x300/0x420 fs/read_write.c:593
   ksys_write+0x60/0xd0 fs/read_write.c:686
   do_syscall_64+0x50/0x1c0 arch/x86/entry/syscall_64.c:63
   &lt;/TASK&gt;

To trigger gso segment in udp_queue_rcv_skb(), we should also set option
UDP_ENCAP_ESPINUDP to enable udp_sk(sk)-&gt;encap_rcv. When the encap_rcv
hook return 1 in udp_queue_rcv_one_skb(), udp_csum_pull_header() will try
to pull udphdr, but the skb size has been segmented to gso size, which
leads to this crash.

Previous commit cf329aa42b66 ("udp: cope with UDP GRO packet misdirection")
introduces segmentation in UDP receive path only for GRO, which was never
intended to be used for UFO, so drop UFO packets in udp_rcv_segment().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38622/">CVE-2025-38622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38622">CVE-2025-38622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248619">SUSE bug 1248619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38623</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38623" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38623" ref_url="https://www.suse.com/security/cve/CVE-2025-38623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: pnv_php: Fix surprise plug detection and recovery

The existing PowerNV hotplug code did not handle surprise plug events
correctly, leading to a complete failure of the hotplug system after device
removal and a required reboot to detect new devices.

This comes down to two issues:

 1) When a device is surprise removed, often the bridge upstream
    port will cause a PE freeze on the PHB.  If this freeze is not
    cleared, the MSI interrupts from the bridge hotplug notification
    logic will not be received by the kernel, stalling all plug events
    on all slots associated with the PE.

 2) When a device is removed from a slot, regardless of surprise or
    programmatic removal, the associated PHB/PE ls left frozen.
    If this freeze is not cleared via a fundamental reset, skiboot
    is unable to clear the freeze and cannot retrain / rescan the
    slot.  This also requires a reboot to clear the freeze and redetect
    the device in the slot.

Issue the appropriate unfreeze and rescan commands on hotplug events,
and don't oops on hotplug if pci_bus_to_OF_node() returns NULL.

[bhelgaas: tidy comments]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38623/">CVE-2025-38623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38623">CVE-2025-38623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248610">SUSE bug 1248610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38624</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38624" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38624" ref_url="https://www.suse.com/security/cve/CVE-2025-38624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: pnv_php: Clean up allocated IRQs on unplug

When the root of a nested PCIe bridge configuration is unplugged, the
pnv_php driver leaked the allocated IRQ resources for the child bridges'
hotplug event notifications, resulting in a panic.

Fix this by walking all child buses and deallocating all its IRQ resources
before calling pci_hp_remove_devices().

Also modify the lifetime of the workqueue at struct pnv_php_slot::wq so
that it is only destroyed in pnv_php_free_slot(), instead of
pnv_php_disable_irq(). This is required since pnv_php_disable_irq() will
now be called by workers triggered by hot unplug interrupts, so the
workqueue needs to stay allocated.

The abridged kernel panic that occurs without this patch is as follows:

  WARNING: CPU: 0 PID: 687 at kernel/irq/msi.c:292 msi_device_data_release+0x6c/0x9c
  CPU: 0 UID: 0 PID: 687 Comm: bash Not tainted 6.14.0-rc5+ #2
  Call Trace:
   msi_device_data_release+0x34/0x9c (unreliable)
   release_nodes+0x64/0x13c
   devres_release_all+0xc0/0x140
   device_del+0x2d4/0x46c
   pci_destroy_dev+0x5c/0x194
   pci_hp_remove_devices+0x90/0x128
   pci_hp_remove_devices+0x44/0x128
   pnv_php_disable_slot+0x54/0xd4
   power_write_file+0xf8/0x18c
   pci_slot_attr_store+0x40/0x5c
   sysfs_kf_write+0x64/0x78
   kernfs_fop_write_iter+0x1b0/0x290
   vfs_write+0x3bc/0x50c
   ksys_write+0x84/0x140
   system_call_exception+0x124/0x230
   system_call_vectored_common+0x15c/0x2ec

[bhelgaas: tidy comments]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38624/">CVE-2025-38624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38624">CVE-2025-38624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248617">SUSE bug 1248617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38628</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38628" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38628" ref_url="https://www.suse.com/security/cve/CVE-2025-38628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa/mlx5: Fix release of uninitialized resources on error path

The commit in the fixes tag made sure that mlx5_vdpa_free()
is the single entrypoint for removing the vdpa device resources
added in mlx5_vdpa_dev_add(), even in the cleanup path of
mlx5_vdpa_dev_add().

This means that all functions from mlx5_vdpa_free() should be able to
handle uninitialized resources. This was not the case though:
mlx5_vdpa_destroy_mr_resources() and mlx5_cmd_cleanup_async_ctx()
were not able to do so. This caused the splat below when adding
a vdpa device without a MAC address.

This patch fixes these remaining issues:

- Makes mlx5_vdpa_destroy_mr_resources() return early if called on
  uninitialized resources.

- Moves mlx5_cmd_init_async_ctx() early on during device addition
  because it can't fail. This means that mlx5_cmd_cleanup_async_ctx()
  also can't fail. To mirror this, move the call site of
  mlx5_cmd_cleanup_async_ctx() in mlx5_vdpa_free().

An additional comment was added in mlx5_vdpa_free() to document
the expectations of functions called from this context.

Splat:

  mlx5_core 0000:b5:03.2: mlx5_vdpa_dev_add:3950:(pid 2306) warning: No mac address provisioned?
  ------------[ cut here ]------------
  WARNING: CPU: 13 PID: 2306 at kernel/workqueue.c:4207 __flush_work+0x9a/0xb0
  [...]
  Call Trace:
   &lt;TASK&gt;
   ? __try_to_del_timer_sync+0x61/0x90
   ? __timer_delete_sync+0x2b/0x40
   mlx5_vdpa_destroy_mr_resources+0x1c/0x40 [mlx5_vdpa]
   mlx5_vdpa_free+0x45/0x160 [mlx5_vdpa]
   vdpa_release_dev+0x1e/0x50 [vdpa]
   device_release+0x31/0x90
   kobject_cleanup+0x37/0x130
   mlx5_vdpa_dev_add+0x327/0x890 [mlx5_vdpa]
   vdpa_nl_cmd_dev_add_set_doit+0x2c1/0x4d0 [vdpa]
   genl_family_rcv_msg_doit+0xd8/0x130
   genl_family_rcv_msg+0x14b/0x220
   ? __pfx_vdpa_nl_cmd_dev_add_set_doit+0x10/0x10 [vdpa]
   genl_rcv_msg+0x47/0xa0
   ? __pfx_genl_rcv_msg+0x10/0x10
   netlink_rcv_skb+0x53/0x100
   genl_rcv+0x24/0x40
   netlink_unicast+0x27b/0x3b0
   netlink_sendmsg+0x1f7/0x430
   __sys_sendto+0x1fa/0x210
   ? ___pte_offset_map+0x17/0x160
   ? next_uptodate_folio+0x85/0x2b0
   ? percpu_counter_add_batch+0x51/0x90
   ? filemap_map_pages+0x515/0x660
   __x64_sys_sendto+0x20/0x30
   do_syscall_64+0x7b/0x2c0
   ? do_read_fault+0x108/0x220
   ? do_pte_missing+0x14a/0x3e0
   ? __handle_mm_fault+0x321/0x730
   ? count_memcg_events+0x13f/0x180
   ? handle_mm_fault+0x1fb/0x2d0
   ? do_user_addr_fault+0x20c/0x700
   ? syscall_exit_work+0x104/0x140
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
  RIP: 0033:0x7f0c25b0feca
  [...]
  ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38628/">CVE-2025-38628 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38628">CVE-2025-38628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248616">SUSE bug 1248616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38630</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38630" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38630" ref_url="https://www.suse.com/security/cve/CVE-2025-38630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref

fb_add_videomode() can fail with -ENOMEM when its internal kmalloc() cannot
allocate a struct fb_modelist.  If that happens, the modelist stays empty but
the driver continues to register.  Add a check for its return value to prevent
poteintial null-ptr-deref, which is similar to the commit 17186f1f90d3 ("fbdev:
Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var").
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38630/">CVE-2025-38630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38630">CVE-2025-38630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248575">SUSE bug 1248575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38631</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38631" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38631" ref_url="https://www.suse.com/security/cve/CVE-2025-38631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: imx95-blk-ctl: Fix synchronous abort

When enabling runtime PM for clock suppliers that also belong to a power
domain, the following crash is thrown:
error: synchronous external abort: 0000000096000010 [#1] PREEMPT SMP
Workqueue: events_unbound deferred_probe_work_func
pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : clk_mux_get_parent+0x60/0x90
lr : clk_core_reparent_orphans_nolock+0x58/0xd8
  Call trace:
   clk_mux_get_parent+0x60/0x90
   clk_core_reparent_orphans_nolock+0x58/0xd8
   of_clk_add_hw_provider.part.0+0x90/0x100
   of_clk_add_hw_provider+0x1c/0x38
   imx95_bc_probe+0x2e0/0x3f0
   platform_probe+0x70/0xd8

Enabling runtime PM without explicitly resuming the device caused
the power domain cut off after clk_register() is called. As a result,
a crash happens when the clock hardware provider is added and attempts
to access the BLK_CTL register.

Fix this by using devm_pm_runtime_enable() instead of pm_runtime_enable()
and getting rid of the pm_runtime_disable() in the cleanup path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38631/">CVE-2025-38631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38631">CVE-2025-38631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248662">SUSE bug 1248662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38632</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38632" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38632" ref_url="https://www.suse.com/security/cve/CVE-2025-38632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinmux: fix race causing mux_owner NULL with active mux_usecount

commit 5a3e85c3c397 ("pinmux: Use sequential access to access
desc-&gt;pinmux data") tried to address the issue when two client of the
same gpio calls pinctrl_select_state() for the same functionality, was
resulting in NULL pointer issue while accessing desc-&gt;mux_owner.
However, issue was not completely fixed due to the way it was handled
and it can still result in the same NULL pointer.

The issue occurs due to the following interleaving:

     cpu0 (process A)                   cpu1 (process B)

      pin_request() {                   pin_free() {

                                         mutex_lock()
                                         desc-&gt;mux_usecount--; //becomes 0
                                         ..
                                         mutex_unlock()

  mutex_lock(desc-&gt;mux)
  desc-&gt;mux_usecount++; // becomes 1
  desc-&gt;mux_owner = owner;
  mutex_unlock(desc-&gt;mux)

                                         mutex_lock(desc-&gt;mux)
                                         desc-&gt;mux_owner = NULL;
                                         mutex_unlock(desc-&gt;mux)

This sequence leads to a state where the pin appears to be in use
(`mux_usecount == 1`) but has no owner (`mux_owner == NULL`), which can
cause NULL pointer on next pin_request on the same pin.

Ensure that updates to mux_usecount and mux_owner are performed
atomically under the same lock. Only clear mux_owner when mux_usecount
reaches zero and no new owner has been assigned.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38632/">CVE-2025-38632 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38632">CVE-2025-38632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248669">SUSE bug 1248669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38634</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38634" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38634" ref_url="https://www.suse.com/security/cve/CVE-2025-38634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

power: supply: cpcap-charger: Fix null check for power_supply_get_by_name

In the cpcap_usb_detect() function, the power_supply_get_by_name()
function may return `NULL` instead of an error pointer.
To prevent potential null pointer dereferences, Added a null check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38634/">CVE-2025-38634 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38634">CVE-2025-38634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248666">SUSE bug 1248666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38635</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38635" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38635" ref_url="https://www.suse.com/security/cve/CVE-2025-38635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: davinci: Add NULL check in davinci_lpsc_clk_register()

devm_kasprintf() returns NULL when memory allocation fails. Currently,
davinci_lpsc_clk_register() does not check for this case, which results
in a NULL pointer dereference.

Add NULL check after devm_kasprintf() to prevent this issue and ensuring
no resources are left allocated.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38635/">CVE-2025-38635 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38635">CVE-2025-38635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248573">SUSE bug 1248573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38639</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38639" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38639" ref_url="https://www.suse.com/security/cve/CVE-2025-38639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: xt_nfacct: don't assume acct name is null-terminated

BUG: KASAN: slab-out-of-bounds in .. lib/vsprintf.c:721
Read of size 1 at addr ffff88801eac95c8 by task syz-executor183/5851
[..]
 string+0x231/0x2b0 lib/vsprintf.c:721
 vsnprintf+0x739/0xf00 lib/vsprintf.c:2874
 [..]
 nfacct_mt_checkentry+0xd2/0xe0 net/netfilter/xt_nfacct.c:41
 xt_check_match+0x3d1/0xab0 net/netfilter/x_tables.c:523

nfnl_acct_find_get() handles non-null input, but the error
printk relied on its presence.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38639/">CVE-2025-38639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38639">CVE-2025-38639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248674">SUSE bug 1248674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38640</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38640" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38640" ref_url="https://www.suse.com/security/cve/CVE-2025-38640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Disable migration in nf_hook_run_bpf().

syzbot reported that the netfilter bpf prog can be called without
migration disabled in xmit path.

Then the assertion in __bpf_prog_run() fails, triggering the splat
below. [0]

Let's use bpf_prog_run_pin_on_cpu() in nf_hook_run_bpf().

[0]:
BUG: assuming non migratable context at ./include/linux/filter.h:703
in_atomic(): 0, irqs_disabled(): 0, migration_disabled() 0 pid: 5829, name: sshd-session
3 locks held by sshd-session/5829:
 #0: ffff88807b4e4218 (sk_lock-AF_INET){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1667 [inline]
 #0: ffff88807b4e4218 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sendmsg+0x20/0x50 net/ipv4/tcp.c:1395
 #1: ffffffff8e5c4e00 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 #1: ffffffff8e5c4e00 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline]
 #1: ffffffff8e5c4e00 (rcu_read_lock){....}-{1:3}, at: __ip_queue_xmit+0x69/0x26c0 net/ipv4/ip_output.c:470
 #2: ffffffff8e5c4e00 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 #2: ffffffff8e5c4e00 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline]
 #2: ffffffff8e5c4e00 (rcu_read_lock){....}-{1:3}, at: nf_hook+0xb2/0x680 include/linux/netfilter.h:241
CPU: 0 UID: 0 PID: 5829 Comm: sshd-session Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
 __cant_migrate kernel/sched/core.c:8860 [inline]
 __cant_migrate+0x1c7/0x250 kernel/sched/core.c:8834
 __bpf_prog_run include/linux/filter.h:703 [inline]
 bpf_prog_run include/linux/filter.h:725 [inline]
 nf_hook_run_bpf+0x83/0x1e0 net/netfilter/nf_bpf_link.c:20
 nf_hook_entry_hookfn include/linux/netfilter.h:157 [inline]
 nf_hook_slow+0xbb/0x200 net/netfilter/core.c:623
 nf_hook+0x370/0x680 include/linux/netfilter.h:272
 NF_HOOK_COND include/linux/netfilter.h:305 [inline]
 ip_output+0x1bc/0x2a0 net/ipv4/ip_output.c:433
 dst_output include/net/dst.h:459 [inline]
 ip_local_out net/ipv4/ip_output.c:129 [inline]
 __ip_queue_xmit+0x1d7d/0x26c0 net/ipv4/ip_output.c:527
 __tcp_transmit_skb+0x2686/0x3e90 net/ipv4/tcp_output.c:1479
 tcp_transmit_skb net/ipv4/tcp_output.c:1497 [inline]
 tcp_write_xmit+0x1274/0x84e0 net/ipv4/tcp_output.c:2838
 __tcp_push_pending_frames+0xaf/0x390 net/ipv4/tcp_output.c:3021
 tcp_push+0x225/0x700 net/ipv4/tcp.c:759
 tcp_sendmsg_locked+0x1870/0x42b0 net/ipv4/tcp.c:1359
 tcp_sendmsg+0x2e/0x50 net/ipv4/tcp.c:1396
 inet_sendmsg+0xb9/0x140 net/ipv4/af_inet.c:851
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg net/socket.c:727 [inline]
 sock_write_iter+0x4aa/0x5b0 net/socket.c:1131
 new_sync_write fs/read_write.c:593 [inline]
 vfs_write+0x6c7/0x1150 fs/read_write.c:686
 ksys_write+0x1f8/0x250 fs/read_write.c:738
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fe7d365d407
Code: 48 89 fa 4c 89 df e8 38 aa 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 &lt;5b&gt; c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff
RSP:
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38640/">CVE-2025-38640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38640">CVE-2025-38640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248622">SUSE bug 1248622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38643</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38643" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38643" ref_url="https://www.suse.com/security/cve/CVE-2025-38643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac()

Callers of wdev_chandef() must hold the wiphy mutex.

But the worker cfg80211_propagate_cac_done_wk() never takes the lock.
Which triggers the warning below with the mesh_peer_connected_dfs
test from hostapd and not (yet) released mac80211 code changes:

WARNING: CPU: 0 PID: 495 at net/wireless/chan.c:1552 wdev_chandef+0x60/0x165
Modules linked in:
CPU: 0 UID: 0 PID: 495 Comm: kworker/u4:2 Not tainted 6.14.0-rc5-wt-g03960e6f9d47 #33 13c287eeabfe1efea01c0bcc863723ab082e17cf
Workqueue: cfg80211 cfg80211_propagate_cac_done_wk
Stack:
 00000000 00000001 ffffff00 6093267c
 00000000 6002ec30 6d577c50 60037608
 00000000 67e8d108 6063717b 00000000
Call Trace:
 [&lt;6002ec30&gt;] ? _printk+0x0/0x98
 [&lt;6003c2b3&gt;] show_stack+0x10e/0x11a
 [&lt;6002ec30&gt;] ? _printk+0x0/0x98
 [&lt;60037608&gt;] dump_stack_lvl+0x71/0xb8
 [&lt;6063717b&gt;] ? wdev_chandef+0x60/0x165
 [&lt;6003766d&gt;] dump_stack+0x1e/0x20
 [&lt;6005d1b7&gt;] __warn+0x101/0x20f
 [&lt;6005d3a8&gt;] warn_slowpath_fmt+0xe3/0x15d
 [&lt;600b0c5c&gt;] ? mark_lock.part.0+0x0/0x4ec
 [&lt;60751191&gt;] ? __this_cpu_preempt_check+0x0/0x16
 [&lt;600b11a2&gt;] ? mark_held_locks+0x5a/0x6e
 [&lt;6005d2c5&gt;] ? warn_slowpath_fmt+0x0/0x15d
 [&lt;60052e53&gt;] ? unblock_signals+0x3a/0xe7
 [&lt;60052f2d&gt;] ? um_set_signals+0x2d/0x43
 [&lt;60751191&gt;] ? __this_cpu_preempt_check+0x0/0x16
 [&lt;607508b2&gt;] ? lock_is_held_type+0x207/0x21f
 [&lt;6063717b&gt;] wdev_chandef+0x60/0x165
 [&lt;605f89b4&gt;] regulatory_propagate_dfs_state+0x247/0x43f
 [&lt;60052f00&gt;] ? um_set_signals+0x0/0x43
 [&lt;605e6bfd&gt;] cfg80211_propagate_cac_done_wk+0x3a/0x4a
 [&lt;6007e460&gt;] process_scheduled_works+0x3bc/0x60e
 [&lt;6007d0ec&gt;] ? move_linked_works+0x4d/0x81
 [&lt;6007d120&gt;] ? assign_work+0x0/0xaa
 [&lt;6007f81f&gt;] worker_thread+0x220/0x2dc
 [&lt;600786ef&gt;] ? set_pf_worker+0x0/0x57
 [&lt;60087c96&gt;] ? to_kthread+0x0/0x43
 [&lt;6008ab3c&gt;] kthread+0x2d3/0x2e2
 [&lt;6007f5ff&gt;] ? worker_thread+0x0/0x2dc
 [&lt;6006c05b&gt;] ? calculate_sigpending+0x0/0x56
 [&lt;6003b37d&gt;] new_thread_handler+0x4a/0x64
irq event stamp: 614611
hardirqs last  enabled at (614621): [&lt;00000000600bc96b&gt;] __up_console_sem+0x82/0xaf
hardirqs last disabled at (614630): [&lt;00000000600bc92c&gt;] __up_console_sem+0x43/0xaf
softirqs last  enabled at (614268): [&lt;00000000606c55c6&gt;] __ieee80211_wake_queue+0x933/0x985
softirqs last disabled at (614266): [&lt;00000000606c52d6&gt;] __ieee80211_wake_queue+0x643/0x985
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38643/">CVE-2025-38643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38643">CVE-2025-38643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248681">SUSE bug 1248681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38644</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38644" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38644" ref_url="https://www.suse.com/security/cve/CVE-2025-38644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03652-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03662-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03663-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03664-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3721-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3740-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: reject TDLS operations when station is not associated

syzbot triggered a WARN in ieee80211_tdls_oper() by sending
NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT,
before association completed and without prior TDLS setup.

This left internal state like sdata-&gt;u.mgd.tdls_peer uninitialized,
leading to a WARN_ON() in code paths that assumed it was valid.

Reject the operation early if not in station mode or not associated.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38644/">CVE-2025-38644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38644">CVE-2025-38644 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248748">SUSE bug 1248748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248749">SUSE bug 1248749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253291">SUSE bug 1253291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38645</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38645" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38645" ref_url="https://www.suse.com/security/cve/CVE-2025-38645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Check device memory pointer before usage

Add a NULL check before accessing device memory to prevent a crash if
dev-&gt;dm allocation in mlx5_init_once() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38645/">CVE-2025-38645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38645">CVE-2025-38645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248626">SUSE bug 1248626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38646</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38646" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38646" ref_url="https://www.suse.com/security/cve/CVE-2025-38646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: avoid NULL dereference when RX problematic packet on unsupported 6 GHz band

With a quite rare chance, RX report might be problematic to make SW think
a packet is received on 6 GHz band even if the chip does not support 6 GHz
band actually. Since SW won't initialize stuffs for unsupported bands, NULL
dereference will happen then in the sequence, rtw89_vif_rx_stats_iter() -&gt;
rtw89_core_cancel_6ghz_probe_tx(). So, add a check to avoid it.

The following is a crash log for this case.

 BUG: kernel NULL pointer dereference, address: 0000000000000032
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 [#1] PREEMPT SMP NOPTI
 CPU: 1 PID: 1907 Comm: irq/131-rtw89_p Tainted: G     U             6.6.56-05896-g89f5fb0eb30b #1 (HASH:1400 4)
 Hardware name: Google Telith/Telith, BIOS Google_Telith.15217.747.0 11/12/2024
 RIP: 0010:rtw89_vif_rx_stats_iter+0xd2/0x310 [rtw89_core]
 Code: 4c 89 7d c8 48 89 55 c0 49 8d 44 24 02 48 89 45 b8 45 31 ff eb 11
 41 c6 45 3a 01 41 b7 01 4d 8b 6d 00 4d 39 f5 74 42 8b 43 10 &lt;41&gt; 33 45
 32 0f b7 4b 14 66 41 33 4d 36 0f b7 c9 09 c1 74 d8 4d 85
 RSP: 0018:ffff9f3080138ca0 EFLAGS: 00010246
 RAX: 00000000b8bf5770 RBX: ffff91b5e8c639c0 RCX: 0000000000000011
 RDX: ffff91b582de1be8 RSI: 0000000000000000 RDI: ffff91b5e8c639e6
 RBP: ffff9f3080138d00 R08: 0000000000000000 R09: 0000000000000000
 R10: ffff91b59de70000 R11: ffffffffc069be50 R12: ffff91b5e8c639e4
 R13: 0000000000000000 R14: ffff91b5828020b8 R15: 0000000000000000
 FS:  0000000000000000(0000) GS:ffff91b8efa40000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000032 CR3: 00000002bf838000 CR4: 0000000000750ee0
 PKRU: 55555554
 Call Trace:
  &lt;IRQ&gt;
  ? __die_body+0x68/0xb0
  ? page_fault_oops+0x379/0x3e0
  ? exc_page_fault+0x4f/0xa0
  ? asm_exc_page_fault+0x22/0x30
  ? __pfx_rtw89_vif_rx_stats_iter+0x10/0x10 [rtw89_core (HASH:1400 5)]
  ? rtw89_vif_rx_stats_iter+0xd2/0x310 [rtw89_core (HASH:1400 5)]
  __iterate_interfaces+0x59/0x110 [mac80211 (HASH:1400 6)]
  ? __pfx_rtw89_vif_rx_stats_iter+0x10/0x10 [rtw89_core (HASH:1400 5)]
  ? __pfx_rtw89_vif_rx_stats_iter+0x10/0x10 [rtw89_core (HASH:1400 5)]
  ieee80211_iterate_active_interfaces_atomic+0x36/0x50 [mac80211 (HASH:1400 6)]
  rtw89_core_rx_to_mac80211+0xfd/0x1b0 [rtw89_core (HASH:1400 5)]
  rtw89_core_rx+0x43a/0x980 [rtw89_core (HASH:1400 5)]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38646/">CVE-2025-38646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38646">CVE-2025-38646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248577">SUSE bug 1248577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38648</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38648" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38648" ref_url="https://www.suse.com/security/cve/CVE-2025-38648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: stm32: Check for cfg availability in stm32_spi_probe

The stm32_spi_probe function now includes a check to ensure that the
pointer returned by of_device_get_match_data is not NULL before
accessing its members. This resolves a warning where a potential NULL
pointer dereference could occur when accessing cfg-&gt;has_device_mode.

Before accessing the 'has_device_mode' member, we verify that 'cfg' is
not NULL. If 'cfg' is NULL, an error message is logged.

This change ensures that the driver does not attempt to access
configuration data if it is not available, thus preventing a potential
system crash due to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38648/">CVE-2025-38648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38648">CVE-2025-38648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248624">SUSE bug 1248624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38653</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38653" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38653" ref_url="https://www.suse.com/security/cve/CVE-2025-38653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al

Check pde-&gt;proc_ops-&gt;proc_lseek directly may cause UAF in rmmod scenario. 
It's a gap in proc_reg_open() after commit 654b33ada4ab("proc: fix UAF in
proc_get_inode()").  Followed by AI Viro's suggestion, fix it in same
manner.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38653/">CVE-2025-38653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38653">CVE-2025-38653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248630">SUSE bug 1248630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38656</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38656" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38656" ref_url="https://www.suse.com/security/cve/CVE-2025-38656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start()

Preserve the error code if iwl_setup_deferred_work() fails.  The current
code returns ERR_PTR(0) (which is NULL) on this path.  I believe the
missing error code potentially leads to a use after free involving
debugfs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38656/">CVE-2025-38656 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38656">CVE-2025-38656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248643">SUSE bug 1248643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38658</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38658" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38658" ref_url="https://www.suse.com/security/cve/CVE-2025-38658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: pci-epf: Do not complete commands twice if nvmet_req_init() fails

Have nvmet_req_init() and req-&gt;execute() complete failed commands.

Description of the problem:
nvmet_req_init() calls __nvmet_req_complete() internally upon failure,
e.g., unsupported opcode, which calls the "queue_response" callback,
this results in nvmet_pci_epf_queue_response() being called, which will
call nvmet_pci_epf_complete_iod() if data_len is 0 or if dma_dir is
different from DMA_TO_DEVICE. This results in a double completion as
nvmet_pci_epf_exec_iod_work() also calls nvmet_pci_epf_complete_iod()
when nvmet_req_init() fails.

Steps to reproduce:
On the host send a command with an unsupported opcode with nvme-cli,
For example the admin command "security receive"
$ sudo nvme security-recv /dev/nvme0n1 -n1 -x4096

This triggers a double completion as nvmet_req_init() fails and
nvmet_pci_epf_queue_response() is called, here iod-&gt;dma_dir is still
in the default state of "DMA_NONE" as set by default in
nvmet_pci_epf_alloc_iod(), so nvmet_pci_epf_complete_iod() is called.
Because nvmet_req_init() failed nvmet_pci_epf_complete_iod() is also
called in nvmet_pci_epf_exec_iod_work() leading to a double completion.
This not only sends two completions to the host but also corrupts the
state of the PCI NVMe target leading to kernel oops.

This patch lets nvmet_req_init() and req-&gt;execute() complete all failed
commands, and removes the double completion case in
nvmet_pci_epf_exec_iod_work() therefore fixing the edge cases where
double completions occurred.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38658/">CVE-2025-38658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38658">CVE-2025-38658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248627">SUSE bug 1248627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38659</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38659" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38659" ref_url="https://www.suse.com/security/cve/CVE-2025-38659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: No more self recovery

When a node withdraws and it turns out that it is the only node that has
the filesystem mounted, gfs2 currently tries to replay the local journal
to bring the filesystem back into a consistent state.  Not only is that
a very bad idea, it has also never worked because gfs2_recover_func()
will refuse to do anything during a withdraw.

However, before even getting to this point, gfs2_recover_func()
dereferences sdp-&gt;sd_jdesc-&gt;jd_inode.  This was a use-after-free before
commit 04133b607a78 ("gfs2: Prevent double iput for journal on error")
and is a NULL pointer dereference since then.

Simply get rid of self recovery to fix that.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38659/">CVE-2025-38659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38659">CVE-2025-38659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248639">SUSE bug 1248639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248759">SUSE bug 1248759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38660</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38660" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38660" ref_url="https://www.suse.com/security/cve/CVE-2025-38660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

[ceph] parse_longname(): strrchr() expects NUL-terminated string

... and parse_longname() is not guaranteed that.  That's the reason
why it uses kmemdup_nul() to build the argument for kstrtou64();
the problem is, kstrtou64() is not the only thing that need it.

Just get a NUL-terminated copy of the entire thing and be done
with that...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38660/">CVE-2025-38660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38660">CVE-2025-38660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248634">SUSE bug 1248634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38662</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38662" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38662" ref_url="https://www.suse.com/security/cve/CVE-2025-38662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: mediatek: mt8365-dai-i2s: pass correct size to mt8365_dai_set_priv

Given mt8365_dai_set_priv allocate priv_size space to copy priv_data which
means we should pass mt8365_i2s_priv[i] or "struct mtk_afe_i2s_priv"
instead of afe_priv which has the size of "struct mt8365_afe_private".

Otherwise the KASAN complains about.

[   59.389765] BUG: KASAN: global-out-of-bounds in mt8365_dai_set_priv+0xc8/0x168 [snd_soc_mt8365_pcm]
...
[   59.394789] Call trace:
[   59.395167]  dump_backtrace+0xa0/0x128
[   59.395733]  show_stack+0x20/0x38
[   59.396238]  dump_stack_lvl+0xe8/0x148
[   59.396806]  print_report+0x37c/0x5e0
[   59.397358]  kasan_report+0xac/0xf8
[   59.397885]  kasan_check_range+0xe8/0x190
[   59.398485]  asan_memcpy+0x3c/0x98
[   59.399022]  mt8365_dai_set_priv+0xc8/0x168 [snd_soc_mt8365_pcm]
[   59.399928]  mt8365_dai_i2s_register+0x1e8/0x2b0 [snd_soc_mt8365_pcm]
[   59.400893]  mt8365_afe_pcm_dev_probe+0x4d0/0xdf0 [snd_soc_mt8365_pcm]
[   59.401873]  platform_probe+0xcc/0x228
[   59.402442]  really_probe+0x340/0x9e8
[   59.402992]  driver_probe_device+0x16c/0x3f8
[   59.403638]  driver_probe_device+0x64/0x1d8
[   59.404256]  driver_attach+0x1dc/0x4c8
[   59.404840]  bus_for_each_dev+0x100/0x190
[   59.405442]  driver_attach+0x44/0x68
[   59.405980]  bus_add_driver+0x23c/0x500
[   59.406550]  driver_register+0xf8/0x3d0
[   59.407122]  platform_driver_register+0x68/0x98
[   59.407810]  mt8365_afe_pcm_driver_init+0x2c/0xff8 [snd_soc_mt8365_pcm]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38662/">CVE-2025-38662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38662">CVE-2025-38662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248635">SUSE bug 1248635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38664</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38664" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38664" ref_url="https://www.suse.com/security/cve/CVE-2025-38664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20986-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4050-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix a null pointer dereference in ice_copy_and_init_pkg()

Add check for the return value of devm_kmemdup()
to prevent potential null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38664/">CVE-2025-38664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38664">CVE-2025-38664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248628">SUSE bug 1248628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248631">SUSE bug 1248631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040506" comment="kernel-livepatch-6_12_0-160000_5-default-5-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040513" comment="kernel-livepatch-6_12_0-160000_5-rt-4-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38665</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38665" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38665" ref_url="https://www.suse.com/security/cve/CVE-2025-38665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode

Andrei Lalaev reported a NULL pointer deref when a CAN device is
restarted from Bus Off and the driver does not implement the struct
can_priv::do_set_mode callback.

There are 2 code path that call struct can_priv::do_set_mode:
- directly by a manual restart from the user space, via
  can_changelink()
- delayed automatic restart after bus off (deactivated by default)

To prevent the NULL pointer deference, refuse a manual restart or
configure the automatic restart delay in can_changelink() and report
the error via extack to user space.

As an additional safety measure let can_restart() return an error if
can_priv::do_set_mode is not set instead of dereferencing it
unchecked.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38665/">CVE-2025-38665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38665">CVE-2025-38665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248648">SUSE bug 1248648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38668</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38668" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38668" ref_url="https://www.suse.com/security/cve/CVE-2025-38668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: core: fix NULL dereference on unbind due to stale coupling data

Failing to reset coupling_desc.n_coupled after freeing coupled_rdevs can
lead to NULL pointer dereference when regulators are accessed post-unbind.

This can happen during runtime PM or other regulator operations that rely
on coupling metadata.

For example, on ridesx4, unbinding the 'reg-dummy' platform device triggers
a panic in regulator_lock_recursive() due to stale coupling state.

Ensure n_coupled is set to 0 to prevent access to invalid pointers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38668/">CVE-2025-38668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38668">CVE-2025-38668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248647">SUSE bug 1248647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38670</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38670" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38670" ref_url="https://www.suse.com/security/cve/CVE-2025-38670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack()

`cpu_switch_to()` and `call_on_irq_stack()` manipulate SP to change
to different stacks along with the Shadow Call Stack if it is enabled.
Those two stack changes cannot be done atomically and both functions
can be interrupted by SErrors or Debug Exceptions which, though unlikely,
is very much broken : if interrupted, we can end up with mismatched stacks
and Shadow Call Stack leading to clobbered stacks.

In `cpu_switch_to()`, it can happen when SP_EL0 points to the new task,
but x18 stills points to the old task's SCS. When the interrupt handler
tries to save the task's SCS pointer, it will save the old task
SCS pointer (x18) into the new task struct (pointed to by SP_EL0),
clobbering it.

In `call_on_irq_stack()`, it can happen when switching from the task stack
to the IRQ stack and when switching back. In both cases, we can be
interrupted when the SCS pointer points to the IRQ SCS, but SP points to
the task stack. The nested interrupt handler pushes its return addresses
on the IRQ SCS. It then detects that SP points to the task stack,
calls `call_on_irq_stack()` and clobbers the task SCS pointer with
the IRQ SCS pointer, which it will also use !

This leads to tasks returning to addresses on the wrong SCS,
or even on the IRQ SCS, triggering kernel panics via CONFIG_VMAP_STACK
or FPAC if enabled.

This is possible on a default config, but unlikely.
However, when enabling CONFIG_ARM64_PSEUDO_NMI, DAIF is unmasked and
instead the GIC is responsible for filtering what interrupts the CPU
should receive based on priority.
Given the goal of emulating NMIs, pseudo-NMIs can be received by the CPU
even in `cpu_switch_to()` and `call_on_irq_stack()`, possibly *very*
frequently depending on the system configuration and workload, leading
to unpredictable kernel panics.

Completely mask DAIF in `cpu_switch_to()` and restore it when returning.
Do the same in `call_on_irq_stack()`, but restore and mask around
the branch.
Mask DAIF even if CONFIG_SHADOW_CALL_STACK is not enabled for consistency
of behaviour between all configurations.

Introduce and use an assembly macro for saving and masking DAIF,
as the existing one saves but only masks IF.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38670/">CVE-2025-38670 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38670">CVE-2025-38670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248655">SUSE bug 1248655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38671</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38671" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38671" ref_url="https://www.suse.com/security/cve/CVE-2025-38671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: qup: jump out of the loop in case of timeout

Original logic only sets the return value but doesn't jump out of the
loop if the bus is kept active by a client. This is not expected. A
malicious or buggy i2c client can hang the kernel in this case and
should be avoided. This is observed during a long time test with a
PCA953x GPIO extender.

Fix it by changing the logic to not only sets the return value, but also
jumps out of the loop and return to the caller with -ETIMEDOUT.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38671/">CVE-2025-38671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38671">CVE-2025-38671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248652">SUSE bug 1248652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38676</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38676" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38676" ref_url="https://www.suse.com/security/cve/CVE-2025-38676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/amd: Avoid stack buffer overflow from kernel cmdline

While the kernel command line is considered trusted in most environments,
avoid writing 1 byte past the end of "acpiid" if the "str" argument is
maximum length.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38676/">CVE-2025-38676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38676">CVE-2025-38676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248775">SUSE bug 1248775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38678</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38678" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38678" ref_url="https://www.suse.com/security/cve/CVE-2025-38678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3721-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3740-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3741-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: reject duplicate device on updates

A chain/flowtable update with duplicated devices in the same batch is
possible. Unfortunately, netdev event path only removes the first
device that is found, leaving unregistered the hook of the duplicated
device.

Check if a duplicated device exists in the transaction batch, bail out
with EEXIST in such case.

WARNING is hit when unregistering the hook:

 [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150
 [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S                  6.16.0+ #170 PREEMPT(full)
 [...]
 [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38678/">CVE-2025-38678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38678">CVE-2025-38678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249126">SUSE bug 1249126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249534">SUSE bug 1249534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38679</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38679" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38679" ref_url="https://www.suse.com/security/cve/CVE-2025-38679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: venus: Fix OOB read due to missing payload bound check

Currently, The event_seq_changed() handler processes a variable number
of properties sent by the firmware. The number of properties is indicated
by the firmware and used to iterate over the payload. However, the
payload size is not being validated against the actual message length.

This can lead to out-of-bounds memory access if the firmware provides a
property count that exceeds the data available in the payload. Such a
condition can result in kernel crashes or potential information leaks if
memory beyond the buffer is accessed.

Fix this by properly validating the remaining size of the payload before
each property access and updating bounds accordingly as properties are
parsed.

This ensures that property parsing is safely bounded within the received
message buffer and protects against malformed or malicious firmware
behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38679/">CVE-2025-38679 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38679">CVE-2025-38679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249202">SUSE bug 1249202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38680</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38680" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38680" ref_url="https://www.suse.com/security/cve/CVE-2025-38680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()

The buffer length check before calling uvc_parse_format() only ensured
that the buffer has at least 3 bytes (buflen &gt; 2), buf the function
accesses buffer[3], requiring at least 4 bytes.

This can lead to an out-of-bounds read if the buffer has exactly 3 bytes.

Fix it by checking that the buffer has at least 4 bytes in
uvc_parse_format().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38680/">CVE-2025-38680 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38680">CVE-2025-38680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249203">SUSE bug 1249203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38681</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38681" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38681" ref_url="https://www.suse.com/security/cve/CVE-2025-38681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd()

Memory hot remove unmaps and tears down various kernel page table regions
as required.  The ptdump code can race with concurrent modifications of
the kernel page tables.  When leaf entries are modified concurrently, the
dump code may log stale or inconsistent information for a VA range, but
this is otherwise not harmful.

But when intermediate levels of kernel page table are freed, the dump code
will continue to use memory that has been freed and potentially
reallocated for another purpose.  In such cases, the ptdump code may
dereference bogus addresses, leading to a number of potential problems.

To avoid the above mentioned race condition, platforms such as arm64,
riscv and s390 take memory hotplug lock, while dumping kernel page table
via the sysfs interface /sys/kernel/debug/kernel_page_tables.

Similar race condition exists while checking for pages that might have
been marked W+X via /sys/kernel/debug/kernel_page_tables/check_wx_pages
which in turn calls ptdump_check_wx().  Instead of solving this race
condition again, let's just move the memory hotplug lock inside generic
ptdump_check_wx() which will benefit both the scenarios.

Drop get_online_mems() and put_online_mems() combination from all existing
platform ptdump code paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38681/">CVE-2025-38681 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38681">CVE-2025-38681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249204">SUSE bug 1249204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38683</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38683" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38683" ref_url="https://www.suse.com/security/cve/CVE-2025-38683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hv_netvsc: Fix panic during namespace deletion with VF

The existing code move the VF NIC to new namespace when NETDEV_REGISTER is
received on netvsc NIC. During deletion of the namespace,
default_device_exit_batch() &gt;&gt; default_device_exit_net() is called. When
netvsc NIC is moved back and registered to the default namespace, it
automatically brings VF NIC back to the default namespace. This will cause
the default_device_exit_net() &gt;&gt; for_each_netdev_safe loop unable to detect
the list end, and hit NULL ptr:

[  231.449420] mana 7870:00:00.0 enP30832s1: Moved VF to namespace with: eth0
[  231.449656] BUG: kernel NULL pointer dereference, address: 0000000000000010
[  231.450246] #PF: supervisor read access in kernel mode
[  231.450579] #PF: error_code(0x0000) - not-present page
[  231.450916] PGD 17b8a8067 P4D 0
[  231.451163] Oops: Oops: 0000 [#1] SMP NOPTI
[  231.451450] CPU: 82 UID: 0 PID: 1394 Comm: kworker/u768:1 Not tainted 6.16.0-rc4+ #3 VOLUNTARY
[  231.452042] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 11/21/2024
[  231.452692] Workqueue: netns cleanup_net
[  231.452947] RIP: 0010:default_device_exit_batch+0x16c/0x3f0
[  231.453326] Code: c0 0c f5 b3 e8 d5 db fe ff 48 85 c0 74 15 48 c7 c2 f8 fd ca b2 be 10 00 00 00 48 8d 7d c0 e8 7b 77 25 00 49 8b 86 28 01 00 00 &lt;48&gt; 8b 50 10 4c 8b 2a 4c 8d 62 f0 49 83 ed 10 4c 39 e0 0f 84 d6 00
[  231.454294] RSP: 0018:ff75fc7c9bf9fd00 EFLAGS: 00010246
[  231.454610] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 61c8864680b583eb
[  231.455094] RDX: ff1fa9f71462d800 RSI: ff75fc7c9bf9fd38 RDI: 0000000030766564
[  231.455686] RBP: ff75fc7c9bf9fd78 R08: 0000000000000000 R09: 0000000000000000
[  231.456126] R10: 0000000000000001 R11: 0000000000000004 R12: ff1fa9f70088e340
[  231.456621] R13: ff1fa9f70088e340 R14: ffffffffb3f50c20 R15: ff1fa9f7103e6340
[  231.457161] FS:  0000000000000000(0000) GS:ff1faa6783a08000(0000) knlGS:0000000000000000
[  231.457707] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  231.458031] CR2: 0000000000000010 CR3: 0000000179ab2006 CR4: 0000000000b73ef0
[  231.458434] Call Trace:
[  231.458600]  &lt;TASK&gt;
[  231.458777]  ops_undo_list+0x100/0x220
[  231.459015]  cleanup_net+0x1b8/0x300
[  231.459285]  process_one_work+0x184/0x340

To fix it, move the ns change to a workqueue, and take rtnl_lock to avoid
changing the netdev list when default_device_exit_net() is using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38683/">CVE-2025-38683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38683">CVE-2025-38683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249159">SUSE bug 1249159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38684</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38684" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38684" ref_url="https://www.suse.com/security/cve/CVE-2025-38684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: ets: use old 'nbands' while purging unused classes

Shuang reported sch_ets test-case [1] crashing in ets_class_qlen_notify()
after recent changes from Lion [2]. The problem is: in ets_qdisc_change()
we purge unused DWRR queues; the value of 'q-&gt;nbands' is the new one, and
the cleanup should be done with the old one. The problem is here since my
first attempts to fix ets_qdisc_change(), but it surfaced again after the
recent qdisc len accounting fixes. Fix it purging idle DWRR queues before
assigning a new value of 'q-&gt;nbands', so that all purge operations find a
consistent configuration:

 - old 'q-&gt;nbands' because it's needed by ets_class_find()
 - old 'q-&gt;nstrict' because it's needed by ets_class_is_strict()

 BUG: kernel NULL pointer dereference, address: 0000000000000000
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: Oops: 0000 [#1] SMP NOPTI
 CPU: 62 UID: 0 PID: 39457 Comm: tc Kdump: loaded Not tainted 6.12.0-116.el10.x86_64 #1 PREEMPT(voluntary)
 Hardware name: Dell Inc. PowerEdge R640/06DKY5, BIOS 2.12.2 07/09/2021
 RIP: 0010:__list_del_entry_valid_or_report+0x4/0x80
 Code: ff 4c 39 c7 0f 84 39 19 8e ff b8 01 00 00 00 c3 cc cc cc cc 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa &lt;48&gt; 8b 17 48 8b 4f 08 48 85 d2 0f 84 56 19 8e ff 48 85 c9 0f 84 ab
 RSP: 0018:ffffba186009f400 EFLAGS: 00010202
 RAX: 00000000000000d6 RBX: 0000000000000000 RCX: 0000000000000004
 RDX: ffff9f0fa29b69c0 RSI: 0000000000000000 RDI: 0000000000000000
 RBP: ffffffffc12c2400 R08: 0000000000000008 R09: 0000000000000004
 R10: ffffffffffffffff R11: 0000000000000004 R12: 0000000000000000
 R13: ffff9f0f8cfe0000 R14: 0000000000100005 R15: 0000000000000000
 FS:  00007f2154f37480(0000) GS:ffff9f269c1c0000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000000 CR3: 00000001530be001 CR4: 00000000007726f0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 55555554
 Call Trace:
  &lt;TASK&gt;
  ets_class_qlen_notify+0x65/0x90 [sch_ets]
  qdisc_tree_reduce_backlog+0x74/0x110
  ets_qdisc_change+0x630/0xa40 [sch_ets]
  __tc_modify_qdisc.constprop.0+0x216/0x7f0
  tc_modify_qdisc+0x7c/0x120
  rtnetlink_rcv_msg+0x145/0x3f0
  netlink_rcv_skb+0x53/0x100
  netlink_unicast+0x245/0x390
  netlink_sendmsg+0x21b/0x470
  ____sys_sendmsg+0x39d/0x3d0
  ___sys_sendmsg+0x9a/0xe0
  __sys_sendmsg+0x7a/0xd0
  do_syscall_64+0x7d/0x160
  entry_SYSCALL_64_after_hwframe+0x76/0x7e
 RIP: 0033:0x7f2155114084
 Code: 89 02 b8 ff ff ff ff eb bb 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 80 3d 25 f0 0c 00 00 74 13 b8 2e 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89
 RSP: 002b:00007fff1fd7a988 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
 RAX: ffffffffffffffda RBX: 0000560ec063e5e0 RCX: 00007f2155114084
 RDX: 0000000000000000 RSI: 00007fff1fd7a9f0 RDI: 0000000000000003
 RBP: 00007fff1fd7aa60 R08: 0000000000000010 R09: 000000000000003f
 R10: 0000560ee9b3a010 R11: 0000000000000202 R12: 00007fff1fd7aae0
 R13: 000000006891ccde R14: 0000560ec063e5e0 R15: 00007fff1fd7aad0
  &lt;/TASK&gt;

 [1] https://lore.kernel.org/netdev/e08c7f4a6882f260011909a868311c6e9b54f3e4.1639153474.git.dcaratti@redhat.com/
 [2] https://lore.kernel.org/netdev/d912cbd7-193b-4269-9857-525bee8bbb6a@gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38684/">CVE-2025-38684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38684">CVE-2025-38684 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249156">SUSE bug 1249156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38685</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38685" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38685" ref_url="https://www.suse.com/security/cve/CVE-2025-38685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: Fix vmalloc out-of-bounds write in fast_imageblit

This issue triggers when a userspace program does an ioctl
FBIOPUT_CON2FBMAP by passing console number and frame buffer number.
Ideally this maps console to frame buffer and updates the screen if
console is visible.

As part of mapping it has to do resize of console according to frame
buffer info. if this resize fails and returns from vc_do_resize() and
continues further. At this point console and new frame buffer are mapped
and sets display vars. Despite failure still it continue to proceed
updating the screen at later stages where vc_data is related to previous
frame buffer and frame buffer info and display vars are mapped to new
frame buffer and eventully leading to out-of-bounds write in
fast_imageblit(). This bheviour is excepted only when fg_console is
equal to requested console which is a visible console and updates screen
with invalid struct references in fbcon_putcs().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38685/">CVE-2025-38685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38685">CVE-2025-38685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249220">SUSE bug 1249220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249240">SUSE bug 1249240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38686</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38686" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38686" ref_url="https://www.suse.com/security/cve/CVE-2025-38686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

userfaultfd: fix a crash in UFFDIO_MOVE when PMD is a migration entry

When UFFDIO_MOVE encounters a migration PMD entry, it proceeds with
obtaining a folio and accessing it even though the entry is swp_entry_t. 
Add the missing check and let split_huge_pmd() handle migration entries. 
While at it also remove unnecessary folio check.

[surenb@google.com: remove extra folio check, per David]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38686/">CVE-2025-38686 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38686">CVE-2025-38686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249160">SUSE bug 1249160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38687</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38687" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38687" ref_url="https://www.suse.com/security/cve/CVE-2025-38687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: fix race between polling and detaching

syzbot reports a use-after-free in comedi in the below link, which is
due to comedi gladly removing the allocated async area even though poll
requests are still active on the wait_queue_head inside of it. This can
cause a use-after-free when the poll entries are later triggered or
removed, as the memory for the wait_queue_head has been freed.  We need
to check there are no tasks queued on any of the subdevices' wait queues
before allowing the device to be detached by the `COMEDI_DEVCONFIG`
ioctl.

Tasks will read-lock `dev-&gt;attach_lock` before adding themselves to the
subdevice wait queue, so fix the problem in the `COMEDI_DEVCONFIG` ioctl
handler by write-locking `dev-&gt;attach_lock` before checking that all of
the subdevices are safe to be deleted.  This includes testing for any
sleepers on the subdevices' wait queues.  It remains locked until the
device has been detached.  This requires the `comedi_device_detach()`
function to be refactored slightly, moving the bulk of it into new
function `comedi_device_detach_locked()`.

Note that the refactor of `comedi_device_detach()` results in
`comedi_device_cancel_all()` now being called while `dev-&gt;attach_lock`
is write-locked, which wasn't the case previously, but that does not
matter.

Thanks to Jens Axboe for diagnosing the problem and co-developing this
patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38687/">CVE-2025-38687 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38687">CVE-2025-38687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249177">SUSE bug 1249177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38691</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38691" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38691" ref_url="https://www.suse.com/security/cve/CVE-2025-38691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pNFS: Fix uninited ptr deref in block/scsi layout

The error occurs on the third attempt to encode extents. When function
ext_tree_prepare_commit() reallocates a larger buffer to retry encoding
extents, the "layoutupdate_pages" page array is initialized only after the
retry loop. But ext_tree_free_commitdata() is called on every iteration
and tries to put pages in the array, thus dereferencing uninitialized
pointers.

An additional problem is that there is no limit on the maximum possible
buffer_size. When there are too many extents, the client may create a
layoutcommit that is larger than the maximum possible RPC size accepted
by the server.

During testing, we observed two typical scenarios. First, one memory page
for extents is enough when we work with small files, append data to the
end of the file, or preallocate extents before writing. But when we fill
a new large file without preallocating, the number of extents can be huge,
and counting the number of written extents in ext_tree_encode_commit()
does not help much. Since this number increases even more between
unlocking and locking of ext_tree, the reallocated buffer may not be
large enough again and again.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38691/">CVE-2025-38691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38691">CVE-2025-38691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249215">SUSE bug 1249215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38692</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38692" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38692" ref_url="https://www.suse.com/security/cve/CVE-2025-38692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: add cluster chain loop check for dir

An infinite loop may occur if the following conditions occur due to
file system corruption.

(1) Condition for exfat_count_dir_entries() to loop infinitely.
    - The cluster chain includes a loop.
    - There is no UNUSED entry in the cluster chain.

(2) Condition for exfat_create_upcase_table() to loop infinitely.
    - The cluster chain of the root directory includes a loop.
    - There are no UNUSED entry and up-case table entry in the cluster
      chain of the root directory.

(3) Condition for exfat_load_bitmap() to loop infinitely.
    - The cluster chain of the root directory includes a loop.
    - There are no UNUSED entry and bitmap entry in the cluster chain
      of the root directory.

(4) Condition for exfat_find_dir_entry() to loop infinitely.
    - The cluster chain includes a loop.
    - The unused directory entries were exhausted by some operation.

(5) Condition for exfat_check_dir_empty() to loop infinitely.
    - The cluster chain includes a loop.
    - The unused directory entries were exhausted by some operation.
    - All files and sub-directories under the directory are deleted.

This commit adds checks to break the above infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38692/">CVE-2025-38692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38692">CVE-2025-38692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249221">SUSE bug 1249221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249239">SUSE bug 1249239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38693</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38693" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38693" ref_url="https://www.suse.com/security/cve/CVE-2025-38693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar

In w7090p_tuner_write_serpar, msg is controlled by user. When msg[0].buf is null and msg[0].len is zero, former checks on msg[0].buf would be passed. If accessing msg[0].buf[2] without sanity check, null pointer deref would happen. We add
check on msg[0].len to prevent crash.

Similar commit: commit 0ed554fd769a ("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()")
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38693/">CVE-2025-38693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38693">CVE-2025-38693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249190">SUSE bug 1249190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38694</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38694" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38694" ref_url="https://www.suse.com/security/cve/CVE-2025-38694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb()

In dib7090p_rw_on_apb, msg is controlled by user. When msg[0].buf is null and
msg[0].len is zero, former checks on msg[0].buf would be passed. If accessing
msg[0].buf[2] without sanity check, null pointer deref would happen. We add
check on msg[0].len to prevent crash. Similar issue occurs when access
msg[1].buf[0] and msg[1].buf[1].

Similar commit: commit 0ed554fd769a ("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()")
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38694/">CVE-2025-38694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38694">CVE-2025-38694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249272">SUSE bug 1249272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38695</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38695" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38695" ref_url="https://www.suse.com/security/cve/CVE-2025-38695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure

If a call to lpfc_sli4_read_rev() from lpfc_sli4_hba_setup() fails, the
resultant cleanup routine lpfc_sli4_vport_delete_fcp_xri_aborted() may
occur before sli4_hba.hdwqs are allocated.  This may result in a null
pointer dereference when attempting to take the abts_io_buf_list_lock for
the first hardware queue.  Fix by adding a null ptr check on
phba-&gt;sli4_hba.hdwq and early return because this situation means there
must have been an error during port initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-38695/">CVE-2025-38695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38695">CVE-2025-38695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249285">SUSE bug 1249285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38699</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38699" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38699" ref_url="https://www.suse.com/security/cve/CVE-2025-38699" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: bfa: Double-free fix

When the bfad_im_probe() function fails during initialization, the memory
pointed to by bfad-&gt;im is freed without setting bfad-&gt;im to NULL.

Subsequently, during driver uninstallation, when the state machine enters
the bfad_sm_stopping state and calls the bfad_im_probe_undo() function,
it attempts to free the memory pointed to by bfad-&gt;im again, thereby
triggering a double-free vulnerability.

Set bfad-&gt;im to NULL if probing fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-38699/">CVE-2025-38699 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38699">CVE-2025-38699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249224">SUSE bug 1249224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38700</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38700" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38700" ref_url="https://www.suse.com/security/cve/CVE-2025-38700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: libiscsi: Initialize iscsi_conn-&gt;dd_data only if memory is allocated

In case of an ib_fast_reg_mr allocation failure during iSER setup, the
machine hits a panic because iscsi_conn-&gt;dd_data is initialized
unconditionally, even when no memory is allocated (dd_size == 0).  This
leads invalid pointer dereference during connection teardown.

Fix by setting iscsi_conn-&gt;dd_data only if memory is actually allocated.

Panic trace:
------------
 iser: iser_create_fastreg_desc: Failed to allocate ib_fast_reg_mr err=-12
 iser: iser_alloc_rx_descriptors: failed allocating rx descriptors / data buffers
 BUG: unable to handle page fault for address: fffffffffffffff8
 RIP: 0010:swake_up_locked.part.5+0xa/0x40
 Call Trace:
  complete+0x31/0x40
  iscsi_iser_conn_stop+0x88/0xb0 [ib_iser]
  iscsi_stop_conn+0x66/0xc0 [scsi_transport_iscsi]
  iscsi_if_stop_conn+0x14a/0x150 [scsi_transport_iscsi]
  iscsi_if_rx+0x1135/0x1834 [scsi_transport_iscsi]
  ? netlink_lookup+0x12f/0x1b0
  ? netlink_deliver_tap+0x2c/0x200
  netlink_unicast+0x1ab/0x280
  netlink_sendmsg+0x257/0x4f0
  ? _copy_from_user+0x29/0x60
  sock_sendmsg+0x5f/0x70
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38700/">CVE-2025-38700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38700">CVE-2025-38700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249182">SUSE bug 1249182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38701</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38701" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38701" ref_url="https://www.suse.com/security/cve/CVE-2025-38701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr

A syzbot fuzzed image triggered a BUG_ON in ext4_update_inline_data()
when an inode had the INLINE_DATA_FL flag set but was missing the
system.data extended attribute.

Since this can happen due to a maiciouly fuzzed file system, we
shouldn't BUG, but rather, report it as a corrupted file system.

Add similar replacements of BUG_ON with EXT4_ERROR_INODE() ii
ext4_create_inline_data() and ext4_inline_data_truncate().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38701/">CVE-2025-38701 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38701">CVE-2025-38701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249258">SUSE bug 1249258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38702</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38702" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38702" ref_url="https://www.suse.com/security/cve/CVE-2025-38702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: fix potential buffer overflow in do_register_framebuffer()

The current implementation may lead to buffer overflow when:
1.  Unregistration creates NULL gaps in registered_fb[]
2.  All array slots become occupied despite num_registered_fb &lt; FB_MAX
3.  The registration loop exceeds array bounds

Add boundary check to prevent registered_fb[FB_MAX] access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38702/">CVE-2025-38702 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38702">CVE-2025-38702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249254">SUSE bug 1249254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38703</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38703" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38703" ref_url="https://www.suse.com/security/cve/CVE-2025-38703" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Make dma-fences compliant with the safe access rules

Xe can free some of the data pointed to by the dma-fences it exports. Most
notably the timeline name can get freed if userspace closes the associated
submit queue. At the same time the fence could have been exported to a
third party (for example a sync_fence fd) which will then cause an use-
after-free on subsequent access.

To make this safe we need to make the driver compliant with the newly
documented dma-fence rules. Driver has to ensure a RCU grace period
between signalling a fence and freeing any data pointed to by said fence.

For the timeline name we simply make the queue be freed via kfree_rcu and
for the shared lock associated with multiple queues we add a RCU grace
period before freeing the per GT structure holding the lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38703/">CVE-2025-38703 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38703">CVE-2025-38703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249193">SUSE bug 1249193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249763">SUSE bug 1249763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38704</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38704" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38704" ref_url="https://www.suse.com/security/cve/CVE-2025-38704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu/nocb: Fix possible invalid rdp's-&gt;nocb_cb_kthread pointer access

In the preparation stage of CPU online, if the corresponding
the rdp's-&gt;nocb_cb_kthread does not exist, will be created,
there is a situation where the rdp's rcuop kthreads creation fails,
and then de-offload this CPU's rdp, does not assign this CPU's
rdp-&gt;nocb_cb_kthread pointer, but this rdp's-&gt;nocb_gp_rdp and
rdp's-&gt;rdp_gp-&gt;nocb_gp_kthread is still valid.

This will cause the subsequent re-offload operation of this offline
CPU, which will pass the conditional check and the kthread_unpark()
will access invalid rdp's-&gt;nocb_cb_kthread pointer.

This commit therefore use rdp's-&gt;nocb_gp_kthread instead of
rdp_gp's-&gt;nocb_gp_kthread for safety check.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38704/">CVE-2025-38704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38704">CVE-2025-38704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254408">SUSE bug 1254408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38705</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38705" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38705" ref_url="https://www.suse.com/security/cve/CVE-2025-38705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: fix null pointer access

Writing a string without delimiters (' ', '\n', '\0') to the under
gpu_od/fan_ctrl sysfs or pp_power_profile_mode for the CUSTOM profile
will result in a null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38705/">CVE-2025-38705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38705">CVE-2025-38705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249334">SUSE bug 1249334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38706</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38706" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38706" ref_url="https://www.suse.com/security/cve/CVE-2025-38706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()

snd_soc_remove_pcm_runtime() might be called with rtd == NULL which will
leads to null pointer dereference.
This was reproduced with topology loading and marking a link as ignore
due to missing hardware component on the system.
On module removal the soc_tplg_remove_link() would call
snd_soc_remove_pcm_runtime() with rtd == NULL since the link was ignored,
no runtime was created.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38706/">CVE-2025-38706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38706">CVE-2025-38706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249195">SUSE bug 1249195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250193">SUSE bug 1250193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38709</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38709" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38709" ref_url="https://www.suse.com/security/cve/CVE-2025-38709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

loop: Avoid updating block size under exclusive owner

Syzbot came up with a reproducer where a loop device block size is
changed underneath a mounted filesystem. This causes a mismatch between
the block device block size and the block size stored in the superblock
causing confusion in various places such as fs/buffer.c. The particular
issue triggered by syzbot was a warning in __getblk_slow() due to
requested buffer size not matching block device block size.

Fix the problem by getting exclusive hold of the loop device to change
its block size. This fails if somebody (such as filesystem) has already
an exclusive ownership of the block device and thus prevents modifying
the loop device under some exclusive owner which doesn't expect it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38709/">CVE-2025-38709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38709">CVE-2025-38709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249199">SUSE bug 1249199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249535">SUSE bug 1249535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38710</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38710" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38710" ref_url="https://www.suse.com/security/cve/CVE-2025-38710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Validate i_depth for exhash directories

A fuzzer test introduced corruption that ends up with a depth of 0 in
dir_e_read(), causing an undefined shift by 32 at:

  index = hash &gt;&gt; (32 - dip-&gt;i_depth);

As calculated in an open-coded way in dir_make_exhash(), the minimum
depth for an exhash directory is ilog2(sdp-&gt;sd_hash_ptrs) and 0 is
invalid as sdp-&gt;sd_hash_ptrs is fixed as sdp-&gt;bsize / 16 at mount time.

So we can avoid the undefined behaviour by checking for depth values
lower than the minimum in gfs2_dinode_in(). Values greater than the
maximum are already being checked for there.

Also switch the calculation in dir_make_exhash() to use ilog2() to
clarify how the depth is calculated.

Tested with the syzkaller repro.c and xfstests '-g quick'.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38710/">CVE-2025-38710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38710">CVE-2025-38710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249201">SUSE bug 1249201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249536">SUSE bug 1249536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38712</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38712" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38712" ref_url="https://www.suse.com/security/cve/CVE-2025-38712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file()

When the volume header contains erroneous values that do not reflect
the actual state of the filesystem, hfsplus_fill_super() assumes that
the attributes file is not yet created, which later results in hitting
BUG_ON() when hfsplus_create_attributes_file() is called. Replace this
BUG_ON() with -EIO error with a message to suggest running fsck tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38712/">CVE-2025-38712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38712">CVE-2025-38712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249194">SUSE bug 1249194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38717</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38717" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38717" ref_url="https://www.suse.com/security/cve/CVE-2025-38717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: kcm: Fix race condition in kcm_unattach()

syzbot found a race condition when kcm_unattach(psock)
and kcm_release(kcm) are executed at the same time.

kcm_unattach() is missing a check of the flag
kcm-&gt;tx_stopped before calling queue_work().

If the kcm has a reserved psock, kcm_unattach() might get executed
between cancel_work_sync() and unreserve_psock() in kcm_release(),
requeuing kcm-&gt;tx_work right before kcm gets freed in kcm_done().

Remove kcm-&gt;tx_stopped and replace it by the less
error-prone disable_work_sync().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38717/">CVE-2025-38717 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38717">CVE-2025-38717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249167">SUSE bug 1249167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38718</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38718" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38718" ref_url="https://www.suse.com/security/cve/CVE-2025-38718" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002461.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002048.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002052.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22910" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: linearize cloned gso packets in sctp_rcv

A cloned head skb still shares these frag skbs in fraglist with the
original head skb. It's not safe to access these frag skbs.

syzbot reported two use-of-uninitialized-memory bugs caused by this:

  BUG: KMSAN: uninit-value in sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211
   sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211
   sctp_assoc_bh_rcv+0x1a7/0xc50 net/sctp/associola.c:998
   sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88
   sctp_backlog_rcv+0x397/0xdb0 net/sctp/input.c:331
   sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1122
   __release_sock+0x1da/0x330 net/core/sock.c:3106
   release_sock+0x6b/0x250 net/core/sock.c:3660
   sctp_wait_for_connect+0x487/0x820 net/sctp/socket.c:9360
   sctp_sendmsg_to_asoc+0x1ec1/0x1f00 net/sctp/socket.c:1885
   sctp_sendmsg+0x32b9/0x4a80 net/sctp/socket.c:2031
   inet_sendmsg+0x25a/0x280 net/ipv4/af_inet.c:851
   sock_sendmsg_nosec net/socket.c:718 [inline]

and

  BUG: KMSAN: uninit-value in sctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987
   sctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987
   sctp_inq_push+0x2a3/0x350 net/sctp/inqueue.c:88
   sctp_backlog_rcv+0x3c7/0xda0 net/sctp/input.c:331
   sk_backlog_rcv+0x142/0x420 include/net/sock.h:1148
   __release_sock+0x1d3/0x330 net/core/sock.c:3213
   release_sock+0x6b/0x270 net/core/sock.c:3767
   sctp_wait_for_connect+0x458/0x820 net/sctp/socket.c:9367
   sctp_sendmsg_to_asoc+0x223a/0x2260 net/sctp/socket.c:1886
   sctp_sendmsg+0x3910/0x49f0 net/sctp/socket.c:2032
   inet_sendmsg+0x269/0x2a0 net/ipv4/af_inet.c:851
   sock_sendmsg_nosec net/socket.c:712 [inline]

This patch fixes it by linearizing cloned gso packets in sctp_rcv().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38718/">CVE-2025-38718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38718">CVE-2025-38718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249161">SUSE bug 1249161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38721</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38721" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38721" ref_url="https://www.suse.com/security/cve/CVE-2025-38721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: fix refcount leak on table dump

There is a reference count leak in ctnetlink_dump_table():
      if (res &lt; 0) {
                nf_conntrack_get(&amp;ct-&gt;ct_general); // HERE
                cb-&gt;args[1] = (unsigned long)ct;
                ...

While its very unlikely, its possible that ct == last.
If this happens, then the refcount of ct was already incremented.
This 2nd increment is never undone.

This prevents the conntrack object from being released, which in turn
keeps prevents cnet-&gt;count from dropping back to 0.

This will then block the netns dismantle (or conntrack rmmod) as
nf_conntrack_cleanup_net_list() will wait forever.

This can be reproduced by running conntrack_resize.sh selftest in a loop.
It takes ~20 minutes for me on a preemptible kernel on average before
I see a runaway kworker spinning in nf_conntrack_cleanup_net_list.

One fix would to change this to:
        if (res &lt; 0) {
		if (ct != last)
	                nf_conntrack_get(&amp;ct-&gt;ct_general);

But this reference counting isn't needed in the first place.
We can just store a cookie value instead.

A followup patch will do the same for ctnetlink_exp_dump_table,
it looks to me as if this has the same problem and like
ctnetlink_dump_table, we only need a 'skip hint', not the actual
object so we can apply the same cookie strategy there as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38721/">CVE-2025-38721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38721">CVE-2025-38721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249176">SUSE bug 1249176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38722</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38722" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38722" ref_url="https://www.suse.com/security/cve/CVE-2025-38722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

habanalabs: fix UAF in export_dmabuf()

As soon as we'd inserted a file reference into descriptor table, another
thread could close it.  That's fine for the case when all we are doing is
returning that descriptor to userland (it's a race, but it's a userland
race and there's nothing the kernel can do about it).  However, if we
follow fd_install() with any kind of access to objects that would be
destroyed on close (be it the struct file itself or anything destroyed
by its -&gt;release()), we have a UAF.

dma_buf_fd() is a combination of reserving a descriptor and fd_install().
habanalabs export_dmabuf() calls it and then proceeds to access the
objects destroyed on close.  In particular, it grabs an extra reference to
another struct file that will be dropped as part of -&gt;release() for ours;
that "will be" is actually "might have already been".

Fix that by reserving descriptor before anything else and do fd_install()
only when everything had been set up.  As a side benefit, we no longer
have the failure exit with file already created, but reference to
underlying file (as well as -&gt;dmabuf_export_cnt, etc.) not grabbed yet;
unlike dma_buf_fd(), fd_install() can't fail.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38722/">CVE-2025-38722 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38722">CVE-2025-38722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249163">SUSE bug 1249163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38724</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38724" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38724" ref_url="https://www.suse.com/security/cve/CVE-2025-38724" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002268.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()

Lei Lu recently reported that nfsd4_setclientid_confirm() did not check
the return value from get_client_locked(). a SETCLIENTID_CONFIRM could
race with a confirmed client expiring and fail to get a reference. That
could later lead to a UAF.

Fix this by getting a reference early in the case where there is an
extant confirmed client. If that fails then treat it as if there were no
confirmed client found at all.

In the case where the unconfirmed client is expiring, just fail and
return the result from get_client_locked().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38724/">CVE-2025-38724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38724">CVE-2025-38724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249169">SUSE bug 1249169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38725</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38725" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38725" ref_url="https://www.suse.com/security/cve/CVE-2025-38725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: asix_devices: add phy_mask for ax88772 mdio bus

Without setting phy_mask for ax88772 mdio bus, current driver may create
at most 32 mdio phy devices with phy address range from 0x00 ~ 0x1f.
DLink DUB-E100 H/W Ver B1 is such a device. However, only one main phy
device will bind to net phy driver. This is creating issue during system
suspend/resume since phy_polling_mode() in phy_state_machine() will
directly deference member of phydev-&gt;drv for non-main phy devices. Then
NULL pointer dereference issue will occur. Due to only external phy or
internal phy is necessary, add phy_mask for ax88772 mdio bus to workarnoud
the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38725/">CVE-2025-38725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38725">CVE-2025-38725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249170">SUSE bug 1249170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38727</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38727" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38727" ref_url="https://www.suse.com/security/cve/CVE-2025-38727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netlink: avoid infinite retry looping in netlink_unicast()

netlink_attachskb() checks for the socket's read memory allocation
constraints. Firstly, it has:

  rmem &lt; READ_ONCE(sk-&gt;sk_rcvbuf)

to check if the just increased rmem value fits into the socket's receive
buffer. If not, it proceeds and tries to wait for the memory under:

  rmem + skb-&gt;truesize &gt; READ_ONCE(sk-&gt;sk_rcvbuf)

The checks don't cover the case when skb-&gt;truesize + sk-&gt;sk_rmem_alloc is
equal to sk-&gt;sk_rcvbuf. Thus the function neither successfully accepts
these conditions, nor manages to reschedule the task - and is called in
retry loop for indefinite time which is caught as:

  rcu: INFO: rcu_sched self-detected stall on CPU
  rcu:     0-....: (25999 ticks this GP) idle=ef2/1/0x4000000000000000 softirq=262269/262269 fqs=6212
  (t=26000 jiffies g=230833 q=259957)
  NMI backtrace for cpu 0
  CPU: 0 PID: 22 Comm: kauditd Not tainted 5.10.240 #68
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc42 04/01/2014
  Call Trace:
  &lt;IRQ&gt;
  dump_stack lib/dump_stack.c:120
  nmi_cpu_backtrace.cold lib/nmi_backtrace.c:105
  nmi_trigger_cpumask_backtrace lib/nmi_backtrace.c:62
  rcu_dump_cpu_stacks kernel/rcu/tree_stall.h:335
  rcu_sched_clock_irq.cold kernel/rcu/tree.c:2590
  update_process_times kernel/time/timer.c:1953
  tick_sched_handle kernel/time/tick-sched.c:227
  tick_sched_timer kernel/time/tick-sched.c:1399
  __hrtimer_run_queues kernel/time/hrtimer.c:1652
  hrtimer_interrupt kernel/time/hrtimer.c:1717
  __sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1113
  asm_call_irq_on_stack arch/x86/entry/entry_64.S:808
  &lt;/IRQ&gt;

  netlink_attachskb net/netlink/af_netlink.c:1234
  netlink_unicast net/netlink/af_netlink.c:1349
  kauditd_send_queue kernel/audit.c:776
  kauditd_thread kernel/audit.c:897
  kthread kernel/kthread.c:328
  ret_from_fork arch/x86/entry/entry_64.S:304

Restore the original behavior of the check which commit in Fixes
accidentally missed when restructuring the code.

Found by Linux Verification Center (linuxtesting.org).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38727/">CVE-2025-38727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38727">CVE-2025-38727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249166">SUSE bug 1249166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38728</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38728" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38728" ref_url="https://www.suse.com/security/cve/CVE-2025-38728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb3: fix for slab out of bounds on mount to ksmbd

With KASAN enabled, it is possible to get a slab out of bounds
during mount to ksmbd due to missing check in parse_server_interfaces()
(see below):

 BUG: KASAN: slab-out-of-bounds in
 parse_server_interfaces+0x14ee/0x1880 [cifs]
 Read of size 4 at addr ffff8881433dba98 by task mount/9827

 CPU: 5 UID: 0 PID: 9827 Comm: mount Tainted: G
 OE       6.16.0-rc2-kasan #2 PREEMPT(voluntary)
 Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
 Hardware name: Dell Inc. Precision Tower 3620/0MWYPT,
 BIOS 2.13.1 06/14/2019
 Call Trace:
  &lt;TASK&gt;
 dump_stack_lvl+0x9f/0xf0
 print_report+0xd1/0x670
 __virt_addr_valid+0x22c/0x430
 ? parse_server_interfaces+0x14ee/0x1880 [cifs]
 ? kasan_complete_mode_report_info+0x2a/0x1f0
 ? parse_server_interfaces+0x14ee/0x1880 [cifs]
   kasan_report+0xd6/0x110
   parse_server_interfaces+0x14ee/0x1880 [cifs]
   __asan_report_load_n_noabort+0x13/0x20
   parse_server_interfaces+0x14ee/0x1880 [cifs]
 ? __pfx_parse_server_interfaces+0x10/0x10 [cifs]
 ? trace_hardirqs_on+0x51/0x60
 SMB3_request_interfaces+0x1ad/0x3f0 [cifs]
 ? __pfx_SMB3_request_interfaces+0x10/0x10 [cifs]
 ? SMB2_tcon+0x23c/0x15d0 [cifs]
 smb3_qfs_tcon+0x173/0x2b0 [cifs]
 ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]
 ? cifs_get_tcon+0x105d/0x2120 [cifs]
 ? do_raw_spin_unlock+0x5d/0x200
 ? cifs_get_tcon+0x105d/0x2120 [cifs]
 ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]
 cifs_mount_get_tcon+0x369/0xb90 [cifs]
 ? dfs_cache_find+0xe7/0x150 [cifs]
 dfs_mount_share+0x985/0x2970 [cifs]
 ? check_path.constprop.0+0x28/0x50
 ? save_trace+0x54/0x370
 ? __pfx_dfs_mount_share+0x10/0x10 [cifs]
 ? __lock_acquire+0xb82/0x2ba0
 ? __kasan_check_write+0x18/0x20
 cifs_mount+0xbc/0x9e0 [cifs]
 ? __pfx_cifs_mount+0x10/0x10 [cifs]
 ? do_raw_spin_unlock+0x5d/0x200
 ? cifs_setup_cifs_sb+0x29d/0x810 [cifs]
 cifs_smb3_do_mount+0x263/0x1990 [cifs]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38728/">CVE-2025-38728 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38728">CVE-2025-38728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249256">SUSE bug 1249256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38729</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38729" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38729" ref_url="https://www.suse.com/security/cve/CVE-2025-38729" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Validate UAC3 power domain descriptors, too

UAC3 power domain descriptors need to be verified with its variable
bLength for avoiding the unexpected OOB accesses by malicious
firmware, too.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38729/">CVE-2025-38729 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38729">CVE-2025-38729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249164">SUSE bug 1249164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38730</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38730" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38730" ref_url="https://www.suse.com/security/cve/CVE-2025-38730" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/net: commit partial buffers on retry

Ring provided buffers are potentially only valid within the single
execution context in which they were acquired. io_uring deals with this
and invalidates them on retry. But on the networking side, if
MSG_WAITALL is set, or if the socket is of the streaming type and too
little was processed, then it will hang on to the buffer rather than
recycle or commit it. This is problematic for two reasons:

1) If someone unregisters the provided buffer ring before a later retry,
   then the req-&gt;buf_list will no longer be valid.

2) If multiple sockers are using the same buffer group, then multiple
   receives can consume the same memory. This can cause data corruption
   in the application, as either receive could land in the same
   userspace buffer.

Fix this by disallowing partial retries from pinning a provided buffer
across multiple executions, if ring provided buffers are used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38730/">CVE-2025-38730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38730">CVE-2025-38730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249172">SUSE bug 1249172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38732</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38732" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38732" ref_url="https://www.suse.com/security/cve/CVE-2025-38732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_reject: don't leak dst refcount for loopback packets

recent patches to add a WARN() when replacing skb dst entry found an
old bug:

WARNING: include/linux/skbuff.h:1165 skb_dst_check_unset include/linux/skbuff.h:1164 [inline]
WARNING: include/linux/skbuff.h:1165 skb_dst_set include/linux/skbuff.h:1210 [inline]
WARNING: include/linux/skbuff.h:1165 nf_reject_fill_skb_dst+0x2a4/0x330 net/ipv4/netfilter/nf_reject_ipv4.c:234
[..]
Call Trace:
 nf_send_unreach+0x17b/0x6e0 net/ipv4/netfilter/nf_reject_ipv4.c:325
 nft_reject_inet_eval+0x4bc/0x690 net/netfilter/nft_reject_inet.c:27
 expr_call_ops_eval net/netfilter/nf_tables_core.c:237 [inline]
 ..

This is because blamed commit forgot about loopback packets.
Such packets already have a dst_entry attached, even at PRE_ROUTING stage.

Instead of checking hook just check if the skb already has a route
attached to it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38732/">CVE-2025-38732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38732">CVE-2025-38732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249262">SUSE bug 1249262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38733</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38733" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38733" ref_url="https://www.suse.com/security/cve/CVE-2025-38733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/mm: Do not map lowcore with identity mapping

Since the identity mapping is pinned to address zero the lowcore is always
also mapped to address zero, this happens regardless of the relocate_lowcore
command line option. If the option is specified the lowcore is mapped
twice, instead of only once.

This means that NULL pointer accesses will succeed instead of causing an
exception (low address protection still applies, but covers only parts).
To fix this never map the first two pages of physical memory with the
identity mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38733/">CVE-2025-38733 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38733">CVE-2025-38733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249313">SUSE bug 1249313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38734</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38734" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38734" ref_url="https://www.suse.com/security/cve/CVE-2025-38734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix UAF on smcsk after smc_listen_out()

BPF CI testing report a UAF issue:

  [   16.446633] BUG: kernel NULL pointer dereference, address: 000000000000003  0
  [   16.447134] #PF: supervisor read access in kernel mod  e
  [   16.447516] #PF: error_code(0x0000) - not-present pag  e
  [   16.447878] PGD 0 P4D   0
  [   16.448063] Oops: Oops: 0000 [#1] PREEMPT SMP NOPT  I
  [   16.448409] CPU: 0 UID: 0 PID: 9 Comm: kworker/0:1 Tainted: G           OE      6.13.0-rc3-g89e8a75fda73-dirty #4  2
  [   16.449124] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODUL  E
  [   16.449502] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/201  4
  [   16.450201] Workqueue: smc_hs_wq smc_listen_wor  k
  [   16.450531] RIP: 0010:smc_listen_work+0xc02/0x159  0
  [   16.452158] RSP: 0018:ffffb5ab40053d98 EFLAGS: 0001024  6
  [   16.452526] RAX: 0000000000000001 RBX: 0000000000000002 RCX: 000000000000030  0
  [   16.452994] RDX: 0000000000000280 RSI: 00003513840053f0 RDI: 000000000000000  0
  [   16.453492] RBP: ffffa097808e3800 R08: ffffa09782dba1e0 R09: 000000000000000  5
  [   16.453987] R10: 0000000000000000 R11: 0000000000000000 R12: ffffa0978274640  0
  [   16.454497] R13: 0000000000000000 R14: 0000000000000000 R15: ffffa09782d4092  0
  [   16.454996] FS:  0000000000000000(0000) GS:ffffa097bbc00000(0000) knlGS:000000000000000  0
  [   16.455557] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003  3
  [   16.455961] CR2: 0000000000000030 CR3: 0000000102788004 CR4: 0000000000770ef  0
  [   16.456459] PKRU: 5555555  4
  [   16.456654] Call Trace  :
  [   16.456832]  &lt;TASK  &gt;
  [   16.456989]  ? __die+0x23/0x7  0
  [   16.457215]  ? page_fault_oops+0x180/0x4c  0
  [   16.457508]  ? __lock_acquire+0x3e6/0x249  0
  [   16.457801]  ? exc_page_fault+0x68/0x20  0
  [   16.458080]  ? asm_exc_page_fault+0x26/0x3  0
  [   16.458389]  ? smc_listen_work+0xc02/0x159  0
  [   16.458689]  ? smc_listen_work+0xc02/0x159  0
  [   16.458987]  ? lock_is_held_type+0x8f/0x10  0
  [   16.459284]  process_one_work+0x1ea/0x6d  0
  [   16.459570]  worker_thread+0x1c3/0x38  0
  [   16.459839]  ? __pfx_worker_thread+0x10/0x1  0
  [   16.460144]  kthread+0xe0/0x11  0
  [   16.460372]  ? __pfx_kthread+0x10/0x1  0
  [   16.460640]  ret_from_fork+0x31/0x5  0
  [   16.460896]  ? __pfx_kthread+0x10/0x1  0
  [   16.461166]  ret_from_fork_asm+0x1a/0x3  0
  [   16.461453]  &lt;/TASK  &gt;
  [   16.461616] Modules linked in: bpf_testmod(OE) [last unloaded: bpf_testmod(OE)  ]
  [   16.462134] CR2: 000000000000003  0
  [   16.462380] ---[ end trace 0000000000000000 ]---
  [   16.462710] RIP: 0010:smc_listen_work+0xc02/0x1590

The direct cause of this issue is that after smc_listen_out_connected(),
newclcsock-&gt;sk may be NULL since it will releases the smcsk. Therefore,
if the application closes the socket immediately after accept,
newclcsock-&gt;sk can be NULL. A possible execution order could be as
follows:

smc_listen_work                                 | userspace
-----------------------------------------------------------------
lock_sock(sk)                                   |
smc_listen_out_connected()                      |
| \- smc_listen_out                             |
|    | \- release_sock                          |
     | |- sk-&gt;sk_data_ready()                   |
                                                | fd = accept();
                                                | close(fd);
                                                |  \- socket-&gt;sk = NULL;
/* newclcsock-&gt;sk is NULL now */
SMC_STAT_SERV_SUCC_INC(sock_net(newclcsock-&gt;sk))

Since smc_listen_out_connected() will not fail, simply swapping the order
of the code can easily fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38734/">CVE-2025-38734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38734">CVE-2025-38734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249324">SUSE bug 1249324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38735</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38735" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38735" ref_url="https://www.suse.com/security/cve/CVE-2025-38735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gve: prevent ethtool ops after shutdown

A crash can occur if an ethtool operation is invoked
after shutdown() is called.

shutdown() is invoked during system shutdown to stop DMA operations
without performing expensive deallocations. It is discouraged to
unregister the netdev in this path, so the device may still be visible
to userspace and kernel helpers.

In gve, shutdown() tears down most internal data structures. If an
ethtool operation is dispatched after shutdown(), it will dereference
freed or NULL pointers, leading to a kernel panic. While graceful
shutdown normally quiesces userspace before invoking the reboot
syscall, forced shutdowns (as observed on GCP VMs) can still trigger
this path.

Fix by calling netif_device_detach() in shutdown().
This marks the device as detached so the ethtool ioctl handler
will skip dispatching operations to the driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38735/">CVE-2025-38735 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38735">CVE-2025-38735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249288">SUSE bug 1249288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38736</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38736" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38736" ref_url="https://www.suse.com/security/cve/CVE-2025-38736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization

Syzbot reported shift-out-of-bounds exception on MDIO bus initialization.

The PHY address should be masked to 5 bits (0-31). Without this
mask, invalid PHY addresses could be used, potentially causing issues
with MDIO bus operations.

Fix this by masking the PHY address with 0x1f (31 decimal) to ensure
it stays within the valid range.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38736/">CVE-2025-38736 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38736">CVE-2025-38736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249318">SUSE bug 1249318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39673</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39673" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39673" ref_url="https://www.suse.com/security/cve/CVE-2025-39673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ppp: fix race conditions in ppp_fill_forward_path

ppp_fill_forward_path() has two race conditions:

1. The ppp-&gt;channels list can change between list_empty() and
   list_first_entry(), as ppp_lock() is not held. If the only channel
   is deleted in ppp_disconnect_channel(), list_first_entry() may
   access an empty head or a freed entry, and trigger a panic.

2. pch-&gt;chan can be NULL. When ppp_unregister_channel() is called,
   pch-&gt;chan is set to NULL before pch is removed from ppp-&gt;channels.

Fix these by using a lockless RCU approach:
- Use list_first_or_null_rcu() to safely test and access the first list
  entry.
- Convert list modifications on ppp-&gt;channels to their RCU variants and
  add synchronize_net() after removal.
- Check for a NULL pch-&gt;chan before dereferencing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39673/">CVE-2025-39673 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39673">CVE-2025-39673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249320">SUSE bug 1249320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39675</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39675" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39675" ref_url="https://www.suse.com/security/cve/CVE-2025-39675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session()

The function mod_hdcp_hdcp1_create_session() calls the function
get_first_active_display(), but does not check its return value.
The return value is a null pointer if the display list is empty.
This will lead to a null pointer dereference.

Add a null pointer check for get_first_active_display() and return
MOD_HDCP_STATUS_DISPLAY_NOT_FOUND if the function return null.

This is similar to the commit c3e9826a2202
("drm/amd/display: Add null pointer check for get_first_active_display()").

(cherry picked from commit 5e43eb3cd731649c4f8b9134f857be62a416c893)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39675/">CVE-2025-39675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39675">CVE-2025-39675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249263">SUSE bug 1249263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39676</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39676" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39676" ref_url="https://www.suse.com/security/cve/CVE-2025-39676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla4xxx: Prevent a potential error pointer dereference

The qla4xxx_get_ep_fwdb() function is supposed to return NULL on error,
but qla4xxx_ep_connect() returns error pointers.  Propagating the error
pointers will lead to an Oops in the caller, so change the error pointers
to NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39676/">CVE-2025-39676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39676">CVE-2025-39676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249302">SUSE bug 1249302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39677</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39677" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39677" ref_url="https://www.suse.com/security/cve/CVE-2025-39677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Fix backlog accounting in qdisc_dequeue_internal

This issue applies for the following qdiscs: hhf, fq, fq_codel, and
fq_pie, and occurs in their change handlers when adjusting to the new
limit. The problem is the following in the values passed to the
subsequent qdisc_tree_reduce_backlog call given a tbf parent:

   When the tbf parent runs out of tokens, skbs of these qdiscs will
   be placed in gso_skb. Their peek handlers are qdisc_peek_dequeued,
   which accounts for both qlen and backlog. However, in the case of
   qdisc_dequeue_internal, ONLY qlen is accounted for when pulling
   from gso_skb. This means that these qdiscs are missing a
   qdisc_qstats_backlog_dec when dropping packets to satisfy the
   new limit in their change handlers.

   One can observe this issue with the following (with tc patched to
   support a limit of 0):

   export TARGET=fq
   tc qdisc del dev lo root
   tc qdisc add dev lo root handle 1: tbf rate 8bit burst 100b latency 1ms
   tc qdisc replace dev lo handle 3: parent 1:1 $TARGET limit 1000
   echo ''; echo 'add child'; tc -s -d qdisc show dev lo
   ping -I lo -f -c2 -s32 -W0.001 127.0.0.1 2&gt;&amp;1 &gt;/dev/null
   echo ''; echo 'after ping'; tc -s -d qdisc show dev lo
   tc qdisc change dev lo handle 3: parent 1:1 $TARGET limit 0
   echo ''; echo 'after limit drop'; tc -s -d qdisc show dev lo
   tc qdisc replace dev lo handle 2: parent 1:1 sfq
   echo ''; echo 'post graft'; tc -s -d qdisc show dev lo

   The second to last show command shows 0 packets but a positive
   number (74) of backlog bytes. The problem becomes clearer in the
   last show command, where qdisc_purge_queue triggers
   qdisc_tree_reduce_backlog with the positive backlog and causes an
   underflow in the tbf parent's backlog (4096 Mb instead of 0).

To fix this issue, the codepath for all clients of qdisc_dequeue_internal
has been simplified: codel, pie, hhf, fq, fq_pie, and fq_codel.
qdisc_dequeue_internal handles the backlog adjustments for all cases that
do not directly use the dequeue handler.

The old fq_codel_change limit adjustment loop accumulated the arguments to
the subsequent qdisc_tree_reduce_backlog call through the cstats field.
However, this is confusing and error prone as fq_codel_dequeue could also
potentially mutate this field (which qdisc_dequeue_internal calls in the
non gso_skb case), so we have unified the code here with other qdiscs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39677/">CVE-2025-39677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39677">CVE-2025-39677 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249300">SUSE bug 1249300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39678</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39678" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39678" ref_url="https://www.suse.com/security/cve/CVE-2025-39678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86/amd/hsmp: Ensure sock-&gt;metric_tbl_addr is non-NULL

If metric table address is not allocated, accessing metrics_bin will
result in a NULL pointer dereference, so add a check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39678/">CVE-2025-39678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39678">CVE-2025-39678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249290">SUSE bug 1249290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39679</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39679" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39679" ref_url="https://www.suse.com/security/cve/CVE-2025-39679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor().

When the nvif_vmm_type is invalid, we will return error directly
without freeing the args in nvif_vmm_ctor(), which leading a memory
leak. Fix it by setting the ret -EINVAL and goto done.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39679/">CVE-2025-39679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39679">CVE-2025-39679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249338">SUSE bug 1249338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39681</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39681" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39681" ref_url="https://www.suse.com/security/cve/CVE-2025-39681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper

Since

  923f3a2b48bd ("x86/resctrl: Query LLC monitoring properties once during boot")

resctrl_cpu_detect() has been moved from common CPU initialization code to
the vendor-specific BSP init helper, while Hygon didn't put that call in their
code.

This triggers a division by zero fault during early booting stage on our
machines with X86_FEATURE_CQM* supported, where get_rdt_mon_resources() tries
to calculate mon_l3_config with uninitialized boot_cpu_data.x86_cache_occ_scale.

Add the missing resctrl_cpu_detect() in the Hygon BSP init helper.

  [ bp: Massage commit message. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39681/">CVE-2025-39681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39681">CVE-2025-39681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249303">SUSE bug 1249303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39682</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39682" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39682" ref_url="https://www.suse.com/security/cve/CVE-2025-39682" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: fix handling of zero-length records on the rx_list

Each recvmsg() call must process either
 - only contiguous DATA records (any number of them)
 - one non-DATA record

If the next record has different type than what has already been
processed we break out of the main processing loop. If the record
has already been decrypted (which may be the case for TLS 1.3 where
we don't know type until decryption) we queue the pending record
to the rx_list. Next recvmsg() will pick it up from there.

Queuing the skb to rx_list after zero-copy decrypt is not possible,
since in that case we decrypted directly to the user space buffer,
and we don't have an skb to queue (darg.skb points to the ciphertext
skb for access to metadata like length).

Only data records are allowed zero-copy, and we break the processing
loop after each non-data record. So we should never zero-copy and
then find out that the record type has changed. The corner case
we missed is when the initial record comes from rx_list, and it's
zero length.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-39682/">CVE-2025-39682 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39682">CVE-2025-39682 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249284">SUSE bug 1249284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250192">SUSE bug 1250192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040506" comment="kernel-livepatch-6_12_0-160000_5-default-5-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040513" comment="kernel-livepatch-6_12_0-160000_5-rt-4-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39683</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39683" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39683" ref_url="https://www.suse.com/security/cve/CVE-2025-39683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Limit access to parser-&gt;buffer when trace_get_user failed

When the length of the string written to set_ftrace_filter exceeds
FTRACE_BUFF_MAX, the following KASAN alarm will be triggered:

BUG: KASAN: slab-out-of-bounds in strsep+0x18c/0x1b0
Read of size 1 at addr ffff0000d00bd5ba by task ash/165

CPU: 1 UID: 0 PID: 165 Comm: ash Not tainted 6.16.0-g6bcdbd62bd56-dirty
Hardware name: linux,dummy-virt (DT)
Call trace:
 show_stack+0x34/0x50 (C)
 dump_stack_lvl+0xa0/0x158
 print_address_description.constprop.0+0x88/0x398
 print_report+0xb0/0x280
 kasan_report+0xa4/0xf0
 __asan_report_load1_noabort+0x20/0x30
 strsep+0x18c/0x1b0
 ftrace_process_regex.isra.0+0x100/0x2d8
 ftrace_regex_release+0x484/0x618
 __fput+0x364/0xa58
 ____fput+0x28/0x40
 task_work_run+0x154/0x278
 do_notify_resume+0x1f0/0x220
 el0_svc+0xec/0xf0
 el0t_64_sync_handler+0xa0/0xe8
 el0t_64_sync+0x1ac/0x1b0

The reason is that trace_get_user will fail when processing a string
longer than FTRACE_BUFF_MAX, but not set the end of parser-&gt;buffer to 0.
Then an OOB access will be triggered in ftrace_regex_release-&gt;
ftrace_process_regex-&gt;strsep-&gt;strpbrk. We can solve this problem by
limiting access to parser-&gt;buffer when trace_get_user failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39683/">CVE-2025-39683 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39683">CVE-2025-39683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249286">SUSE bug 1249286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39684</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39684" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39684" ref_url="https://www.suse.com/security/cve/CVE-2025-39684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl()

syzbot reports a KMSAN kernel-infoleak in `do_insn_ioctl()`.  A kernel
buffer is allocated to hold `insn-&gt;n` samples (each of which is an
`unsigned int`).  For some instruction types, `insn-&gt;n` samples are
copied back to user-space, unless an error code is being returned.  The
problem is that not all the instruction handlers that need to return
data to userspace fill in the whole `insn-&gt;n` samples, so that there is
an information leak.  There is a similar syzbot report for
`do_insnlist_ioctl()`, although it does not have a reproducer for it at
the time of writing.

One culprit is `insn_rw_emulate_bits()` which is used as the handler for
`INSN_READ` or `INSN_WRITE` instructions for subdevices that do not have
a specific handler for that instruction, but do have an `INSN_BITS`
handler.  For `INSN_READ` it only fills in at most 1 sample, so if
`insn-&gt;n` is greater than 1, the remaining `insn-&gt;n - 1` samples copied
to userspace will be uninitialized kernel data.

Another culprit is `vm80xx_ai_insn_read()` in the "vm80xx" driver.  It
never returns an error, even if it fails to fill the buffer.

Fix it in `do_insn_ioctl()` and `do_insnlist_ioctl()` by making sure
that uninitialized parts of the allocated buffer are zeroed before
handling each instruction.

Thanks to Arnaud Lecomte for their fix to `do_insn_ioctl()`.  That fix
replaced the call to `kmalloc_array()` with `kcalloc()`, but it is not
always necessary to clear the whole buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39684/">CVE-2025-39684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39684">CVE-2025-39684 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249281">SUSE bug 1249281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39685</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39685" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39685" ref_url="https://www.suse.com/security/cve/CVE-2025-39685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: pcl726: Prevent invalid irq number

The reproducer passed in an irq number(0x80008000) that was too large,
which triggered the oob.

Added an interrupt number check to prevent users from passing in an irq
number that was too large.

If `it-&gt;options[1]` is 31, then `1 &lt;&lt; it-&gt;options[1]` is still invalid
because it shifts a 1-bit into the sign bit (which is UB in C).
Possible solutions include reducing the upper bound on the
`it-&gt;options[1]` value to 30 or lower, or using `1U &lt;&lt; it-&gt;options[1]`.

The old code would just not attempt to request the IRQ if the
`options[1]` value were invalid.  And it would still configure the
device without interrupts even if the call to `request_irq` returned an
error.  So it would be better to combine this test with the test below.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39685/">CVE-2025-39685 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39685">CVE-2025-39685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249282">SUSE bug 1249282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39686</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39686" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39686" ref_url="https://www.suse.com/security/cve/CVE-2025-39686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: Make insn_rw_emulate_bits() do insn-&gt;n samples

The `insn_rw_emulate_bits()` function is used as a default handler for
`INSN_READ` instructions for subdevices that have a handler for
`INSN_BITS` but not for `INSN_READ`.  Similarly, it is used as a default
handler for `INSN_WRITE` instructions for subdevices that have a handler
for `INSN_BITS` but not for `INSN_WRITE`. It works by emulating the
`INSN_READ` or `INSN_WRITE` instruction handling with a constructed
`INSN_BITS` instruction.  However, `INSN_READ` and `INSN_WRITE`
instructions are supposed to be able read or write multiple samples,
indicated by the `insn-&gt;n` value, but `insn_rw_emulate_bits()` currently
only handles a single sample.  For `INSN_READ`, the comedi core will
copy `insn-&gt;n` samples back to user-space.  (That triggered KASAN
kernel-infoleak errors when `insn-&gt;n` was greater than 1, but that is
being fixed more generally elsewhere in the comedi core.)

Make `insn_rw_emulate_bits()` either handle `insn-&gt;n` samples, or return
an error, to conform to the general expectation for `INSN_READ` and
`INSN_WRITE` handlers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39686/">CVE-2025-39686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39686">CVE-2025-39686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249312">SUSE bug 1249312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39687</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39687" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39687" ref_url="https://www.suse.com/security/cve/CVE-2025-39687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: light: as73211: Ensure buffer holes are zeroed

Given that the buffer is copied to a kfifo that ultimately user space
can read, ensure we zero it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39687/">CVE-2025-39687 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39687">CVE-2025-39687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249316">SUSE bug 1249316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39689</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39689" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39689" ref_url="https://www.suse.com/security/cve/CVE-2025-39689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ftrace: Also allocate and copy hash for reading of filter files

Currently the reader of set_ftrace_filter and set_ftrace_notrace just adds
the pointer to the global tracer hash to its iterator. Unlike the writer
that allocates a copy of the hash, the reader keeps the pointer to the
filter hashes. This is problematic because this pointer is static across
function calls that release the locks that can update the global tracer
hashes. This can cause UAF and similar bugs.

Allocate and copy the hash for reading the filter files like it is done
for the writers. This not only fixes UAF bugs, but also makes the code a
bit simpler as it doesn't have to differentiate when to free the
iterator's hash between writers and readers.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39689/">CVE-2025-39689 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39689">CVE-2025-39689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249307">SUSE bug 1249307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39691</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39691" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39691" ref_url="https://www.suse.com/security/cve/CVE-2025-39691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/buffer: fix use-after-free when call bh_read() helper

There's issue as follows:
BUG: KASAN: stack-out-of-bounds in end_buffer_read_sync+0xe3/0x110
Read of size 8 at addr ffffc9000168f7f8 by task swapper/3/0
CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Not tainted 6.16.0-862.14.0.6.x86_64
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x55/0x70
 print_address_description.constprop.0+0x2c/0x390
 print_report+0xb4/0x270
 kasan_report+0xb8/0xf0
 end_buffer_read_sync+0xe3/0x110
 end_bio_bh_io_sync+0x56/0x80
 blk_update_request+0x30a/0x720
 scsi_end_request+0x51/0x2b0
 scsi_io_completion+0xe3/0x480
 ? scsi_device_unbusy+0x11e/0x160
 blk_complete_reqs+0x7b/0x90
 handle_softirqs+0xef/0x370
 irq_exit_rcu+0xa5/0xd0
 sysvec_apic_timer_interrupt+0x6e/0x90
 &lt;/IRQ&gt;

 Above issue happens when do ntfs3 filesystem mount, issue may happens
 as follows:
           mount                            IRQ
ntfs_fill_super
  read_cache_page
    do_read_cache_folio
      filemap_read_folio
        mpage_read_folio
	 do_mpage_readpage
	  ntfs_get_block_vbo
	   bh_read
	     submit_bh
	     wait_on_buffer(bh);
	                            blk_complete_reqs
				     scsi_io_completion
				      scsi_end_request
				       blk_update_request
				        end_bio_bh_io_sync
					 end_buffer_read_sync
					  __end_buffer_read_notouch
					   unlock_buffer

            wait_on_buffer(bh);--&gt; return will return to caller

					  put_bh
					    --&gt; trigger stack-out-of-bounds
In the mpage_read_folio() function, the stack variable 'map_bh' is
passed to ntfs_get_block_vbo(). Once unlock_buffer() unlocks and
wait_on_buffer() returns to continue processing, the stack variable
is likely to be reclaimed. Consequently, during the end_buffer_read_sync()
process, calling put_bh() may result in stack overrun.

If the bh is not allocated on the stack, it belongs to a folio.  Freeing
a buffer head which belongs to a folio is done by drop_buffers() which
will fail to free buffers which are still locked.  So it is safe to call
put_bh() before __end_buffer_read_notouch().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-39691/">CVE-2025-39691 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39691">CVE-2025-39691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249374">SUSE bug 1249374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249392">SUSE bug 1249392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39693</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39693" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39693" ref_url="https://www.suse.com/security/cve/CVE-2025-39693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Avoid a NULL pointer dereference

[WHY]
Although unlikely drm_atomic_get_new_connector_state() or
drm_atomic_get_old_connector_state() can return NULL.

[HOW]
Check returns before dereference.

(cherry picked from commit 1e5e8d672fec9f2ab352be121be971877bff2af9)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39693/">CVE-2025-39693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39693">CVE-2025-39693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249279">SUSE bug 1249279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39694</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39694" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39694" ref_url="https://www.suse.com/security/cve/CVE-2025-39694" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16398" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/sclp: Fix SCCB present check

Tracing code called by the SCLP interrupt handler contains early exits
if the SCCB address associated with an interrupt is NULL. This check is
performed after physical to virtual address translation.

If the kernel identity mapping does not start at address zero, the
resulting virtual address is never zero, so that the NULL checks won't
work. Subsequently this may result in incorrect accesses to the first
page of the identity mapping.

Fix this by introducing a function that handles the NULL case before
address translation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39694/">CVE-2025-39694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39694">CVE-2025-39694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249299">SUSE bug 1249299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39695</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39695" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39695" ref_url="https://www.suse.com/security/cve/CVE-2025-39695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Flush delayed SKBs while releasing RXE resources

When skb packets are sent out, these skb packets still depends on
the rxe resources, for example, QP, sk, when these packets are
destroyed.

If these rxe resources are released when the skb packets are destroyed,
the call traces will appear.

To avoid skb packets hang too long time in some network devices,
a timestamp is added when these skb packets are created. If these
skb packets hang too long time in network devices, these network
devices can free these skb packets to release rxe resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39695/">CVE-2025-39695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39695">CVE-2025-39695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249306">SUSE bug 1249306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39697</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39697" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39697" ref_url="https://www.suse.com/security/cve/CVE-2025-39697" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix a race when updating an existing write

After nfs_lock_and_join_requests() tests for whether the request is
still attached to the mapping, nothing prevents a call to
nfs_inode_remove_request() from succeeding until we actually lock the
page group.
The reason is that whoever called nfs_inode_remove_request() doesn't
necessarily have a lock on the page group head.

So in order to avoid races, let's take the page group lock earlier in
nfs_lock_and_join_requests(), and hold it across the removal of the
request in nfs_inode_remove_request().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39697/">CVE-2025-39697 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39697">CVE-2025-39697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249319">SUSE bug 1249319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39698</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39698" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39698" ref_url="https://www.suse.com/security/cve/CVE-2025-39698" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024655.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/futex: ensure io_futex_wait() cleans up properly on failure

The io_futex_data is allocated upfront and assigned to the io_kiocb
async_data field, but the request isn't marked with REQ_F_ASYNC_DATA
at that point. Those two should always go together, as the flag tells
io_uring whether the field is valid or not.

Additionally, on failure cleanup, the futex handler frees the data but
does not clear -&gt;async_data. Clear the data and the flag in the error
path as well.

Thanks to Trend Micro Zero Day Initiative and particularly ReDress for
reporting this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-39698/">CVE-2025-39698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39698">CVE-2025-39698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249322">SUSE bug 1249322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250190">SUSE bug 1250190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047551" comment="kernel-livepatch-6_12_0-160000_5-default-7-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047556" comment="kernel-livepatch-6_12_0-160000_5-rt-5-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39700</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39700" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39700" ref_url="https://www.suse.com/security/cve/CVE-2025-39700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/ops-common: ignore migration request to invalid nodes

damon_migrate_pages() tries migration even if the target node is invalid. 
If users mistakenly make such invalid requests via
DAMOS_MIGRATE_{HOT,COLD} action, the below kernel BUG can happen.

    [ 7831.883495] BUG: unable to handle page fault for address: 0000000000001f48
    [ 7831.884160] #PF: supervisor read access in kernel mode
    [ 7831.884681] #PF: error_code(0x0000) - not-present page
    [ 7831.885203] PGD 0 P4D 0
    [ 7831.885468] Oops: Oops: 0000 [#1] SMP PTI
    [ 7831.885852] CPU: 31 UID: 0 PID: 94202 Comm: kdamond.0 Not tainted 6.16.0-rc5-mm-new-damon+ #93 PREEMPT(voluntary)
    [ 7831.886913] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-4.el9 04/01/2014
    [ 7831.887777] RIP: 0010:__alloc_frozen_pages_noprof (include/linux/mmzone.h:1724 include/linux/mmzone.h:1750 mm/page_alloc.c:4936 mm/page_alloc.c:5137)
    [...]
    [ 7831.895953] Call Trace:
    [ 7831.896195]  &lt;TASK&gt;
    [ 7831.896397] __folio_alloc_noprof (mm/page_alloc.c:5183 mm/page_alloc.c:5192)
    [ 7831.896787] migrate_pages_batch (mm/migrate.c:1189 mm/migrate.c:1851)
    [ 7831.897228] ? __pfx_alloc_migration_target (mm/migrate.c:2137)
    [ 7831.897735] migrate_pages (mm/migrate.c:2078)
    [ 7831.898141] ? __pfx_alloc_migration_target (mm/migrate.c:2137)
    [ 7831.898664] damon_migrate_folio_list (mm/damon/ops-common.c:321 mm/damon/ops-common.c:354)
    [ 7831.899140] damon_migrate_pages (mm/damon/ops-common.c:405)
    [...]

Add a target node validity check in damon_migrate_pages().  The validity
check is stolen from that of do_pages_move(), which is being used for the
move_pages() system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39700/">CVE-2025-39700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39700">CVE-2025-39700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249309">SUSE bug 1249309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39701</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39701" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39701" ref_url="https://www.suse.com/security/cve/CVE-2025-39701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: pfr_update: Fix the driver update version check

The security-version-number check should be used rather
than the runtime version check for driver updates.

Otherwise, the firmware update would fail when the update binary had
a lower runtime version number than the current one.

[ rjw: Changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39701/">CVE-2025-39701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39701">CVE-2025-39701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249308">SUSE bug 1249308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39702</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39702" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39702" ref_url="https://www.suse.com/security/cve/CVE-2025-39702" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19409" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: Fix MAC comparison to be constant-time

To prevent timing attacks, MACs need to be compared in constant time.
Use the appropriate helper function for this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39702/">CVE-2025-39702 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39702">CVE-2025-39702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249317">SUSE bug 1249317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39703</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39703" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39703" ref_url="https://www.suse.com/security/cve/CVE-2025-39703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net, hsr: reject HSR frame if skb can't hold tag

Receiving HSR frame with insufficient space to hold HSR tag in the skb
can result in a crash (kernel BUG):

[   45.390915] skbuff: skb_under_panic: text:ffffffff86f32cac len:26 put:14 head:ffff888042418000 data:ffff888042417ff4 tail:0xe end:0x180 dev:bridge_slave_1
[   45.392559] ------------[ cut here ]------------
[   45.392912] kernel BUG at net/core/skbuff.c:211!
[   45.393276] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI
[   45.393809] CPU: 1 UID: 0 PID: 2496 Comm: reproducer Not tainted 6.15.0 #12 PREEMPT(undef)
[   45.394433] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[   45.395273] RIP: 0010:skb_panic+0x15b/0x1d0

&lt;snip registers, remove unreliable trace&gt;

[   45.402911] Call Trace:
[   45.403105]  &lt;IRQ&gt;
[   45.404470]  skb_push+0xcd/0xf0
[   45.404726]  br_dev_queue_push_xmit+0x7c/0x6c0
[   45.406513]  br_forward_finish+0x128/0x260
[   45.408483]  __br_forward+0x42d/0x590
[   45.409464]  maybe_deliver+0x2eb/0x420
[   45.409763]  br_flood+0x174/0x4a0
[   45.410030]  br_handle_frame_finish+0xc7c/0x1bc0
[   45.411618]  br_handle_frame+0xac3/0x1230
[   45.413674]  __netif_receive_skb_core.constprop.0+0x808/0x3df0
[   45.422966]  __netif_receive_skb_one_core+0xb4/0x1f0
[   45.424478]  __netif_receive_skb+0x22/0x170
[   45.424806]  process_backlog+0x242/0x6d0
[   45.425116]  __napi_poll+0xbb/0x630
[   45.425394]  net_rx_action+0x4d1/0xcc0
[   45.427613]  handle_softirqs+0x1a4/0x580
[   45.427926]  do_softirq+0x74/0x90
[   45.428196]  &lt;/IRQ&gt;

This issue was found by syzkaller.

The panic happens in br_dev_queue_push_xmit() once it receives a
corrupted skb with ETH header already pushed in linear data. When it
attempts the skb_push() call, there's not enough headroom and
skb_push() panics.

The corrupted skb is put on the queue by HSR layer, which makes a
sequence of unintended transformations when it receives a specific
corrupted HSR frame (with incomplete TAG).

Fix it by dropping and consuming frames that are not long enough to
contain both ethernet and hsr headers.

Alternative fix would be to check for enough headroom before skb_push()
in br_dev_queue_push_xmit().

In the reproducer, this is injected via AF_PACKET, but I don't easily
see why it couldn't be sent over the wire from adjacent network.

Further Details:

In the reproducer, the following network interface chain is set up:

 ────────────────┐    ────────────────┐
| veth0_to_hsr   ├───┤  hsr_slave0    ┼───┐
 ────────────────┘    ────────────────┘   |
                                          |  ──────┐
                                          ├─┤ hsr0 ├───┐
                                          |  ──────┘   |
 ────────────────┐    ────────────────┐   |            | ────────┐
| veth1_to_hsr   ┼───┤  hsr_slave1    ├───┘             ┤        |
 ────────────────┘    ────────────────┘                 ┼ bridge |
                                                       ||        |
                                                       | ────────┘
                                                       |
                                         ───────┐      |
                                        |  ...  ├──────┘
                                         ───────┘

To trigger the events leading up to crash, reproducer sends a corrupted
HSR fr
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39703/">CVE-2025-39703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39703">CVE-2025-39703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249315">SUSE bug 1249315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39705</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39705" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39705" ref_url="https://www.suse.com/security/cve/CVE-2025-39705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix a Null pointer dereference vulnerability

[Why]
A null pointer dereference vulnerability exists in the AMD display driver's
(DC module) cleanup function dc_destruct().
When display control context (dc-&gt;ctx) construction fails
(due to memory allocation failure), this pointer remains NULL.
During subsequent error handling when dc_destruct() is called,
there's no NULL check before dereferencing the perf_trace member
(dc-&gt;ctx-&gt;perf_trace), causing a kernel null pointer dereference crash.

[How]
Check if dc-&gt;ctx is non-NULL before dereferencing.

(Updated commit text and removed unnecessary error message)
(cherry picked from commit 9dd8e2ba268c636c240a918e0a31e6feaee19404)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39705/">CVE-2025-39705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39705">CVE-2025-39705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249295">SUSE bug 1249295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39706</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39706" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39706" ref_url="https://www.suse.com/security/cve/CVE-2025-39706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Destroy KFD debugfs after destroy KFD wq

Since KFD proc content was moved to kernel debugfs, we can't destroy KFD
debugfs before kfd_process_destroy_wq. Move kfd_process_destroy_wq prior
to kfd_debugfs_fini to fix a kernel NULL pointer problem. It happens
when /sys/kernel/debug/kfd was already destroyed in kfd_debugfs_fini but
kfd_process_destroy_wq calls kfd_debugfs_remove_process. This line
    debugfs_remove_recursive(entry-&gt;proc_dentry);
tries to remove /sys/kernel/debug/kfd/proc/&lt;pid&gt; while
/sys/kernel/debug/kfd is already gone. It hangs the kernel by kernel
NULL pointer.

(cherry picked from commit 0333052d90683d88531558dcfdbf2525cc37c233)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39706/">CVE-2025-39706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39706">CVE-2025-39706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249413">SUSE bug 1249413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39707</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39707" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39707" ref_url="https://www.suse.com/security/cve/CVE-2025-39707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities

HUBBUB structure is not initialized on DCE hardware, so check if it is NULL
to avoid null dereference while accessing amdgpu_dm_capabilities file in
debugfs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39707/">CVE-2025-39707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39707">CVE-2025-39707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249333">SUSE bug 1249333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39709</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39709" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39709" ref_url="https://www.suse.com/security/cve/CVE-2025-39709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: venus: protect against spurious interrupts during probe

Make sure the interrupt handler is initialized before the interrupt is
registered.

If the IRQ is registered before hfi_create(), it's possible that an
interrupt fires before the handler setup is complete, leading to a NULL
dereference.

This error condition has been observed during system boot on Rb3Gen2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39709/">CVE-2025-39709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39709">CVE-2025-39709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249278">SUSE bug 1249278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39710</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39710" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39710" ref_url="https://www.suse.com/security/cve/CVE-2025-39710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: venus: Add a check for packet size after reading from shared memory

Add a check to ensure that the packet size does not exceed the number of
available words after reading the packet header from shared memory. This
ensures that the size provided by the firmware is safe to process and
prevent potential out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39710/">CVE-2025-39710 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39710">CVE-2025-39710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249304">SUSE bug 1249304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39711</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39711" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39711" ref_url="https://www.suse.com/security/cve/CVE-2025-39711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls

Both the ACE and CSI driver are missing a mei_cldev_disable() call in
their remove() function.

This causes the mei_cl client to stay part of the mei_device-&gt;file_list
list even though its memory is freed by mei_cl_bus_dev_release() calling
kfree(cldev-&gt;cl).

This leads to a use-after-free when mei_vsc_remove() runs mei_stop()
which first removes all mei bus devices calling mei_ace_remove() and
mei_csi_remove() followed by mei_cl_bus_dev_release() and then calls
mei_cl_all_disconnect() which walks over mei_device-&gt;file_list dereferecing
the just freed cldev-&gt;cl.

And mei_vsc_remove() it self is run at shutdown because of the
platform_device_unregister(tp-&gt;pdev) in vsc_tp_shutdown()

When building a kernel with KASAN this leads to the following KASAN report:

[ 106.634504] ==================================================================
[ 106.634623] BUG: KASAN: slab-use-after-free in mei_cl_set_disconnected (drivers/misc/mei/client.c:783) mei
[ 106.634683] Read of size 4 at addr ffff88819cb62018 by task systemd-shutdow/1
[ 106.634729]
[ 106.634767] Tainted: [E]=UNSIGNED_MODULE
[ 106.634770] Hardware name: Dell Inc. XPS 16 9640/09CK4V, BIOS 1.12.0 02/10/2025
[ 106.634773] Call Trace:
[ 106.634777]  &lt;TASK&gt;
...
[ 106.634871] kasan_report (mm/kasan/report.c:221 mm/kasan/report.c:636)
[ 106.634901] mei_cl_set_disconnected (drivers/misc/mei/client.c:783) mei
[ 106.634921] mei_cl_all_disconnect (drivers/misc/mei/client.c:2165 (discriminator 4)) mei
[ 106.634941] mei_reset (drivers/misc/mei/init.c:163) mei
...
[ 106.635042] mei_stop (drivers/misc/mei/init.c:348) mei
[ 106.635062] mei_vsc_remove (drivers/misc/mei/mei_dev.h:784 drivers/misc/mei/platform-vsc.c:393) mei_vsc
[ 106.635066] platform_remove (drivers/base/platform.c:1424)

Add the missing mei_cldev_disable() calls so that the mei_cl gets removed
from mei_device-&gt;file_list before it is freed to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39711/">CVE-2025-39711 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39711">CVE-2025-39711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249274">SUSE bug 1249274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39712</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39712" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39712" ref_url="https://www.suse.com/security/cve/CVE-2025-39712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mt9m114: Fix deadlock in get_frame_interval/set_frame_interval

Getting / Setting the frame interval using the V4L2 subdev pad ops
get_frame_interval/set_frame_interval causes a deadlock, as the
subdev state is locked in the [1] but also in the driver itself.

In [2] it's described that the caller is responsible to acquire and
release the lock in this case. Therefore, acquiring the lock in the
driver is wrong.

Remove the lock acquisitions/releases from mt9m114_ifp_get_frame_interval()
and mt9m114_ifp_set_frame_interval().

[1] drivers/media/v4l2-core/v4l2-subdev.c - line 1129
[2] Documentation/driver-api/media/v4l2-subdev.rst
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39712/">CVE-2025-39712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39712">CVE-2025-39712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249269">SUSE bug 1249269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39713</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39713" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39713" ref_url="https://www.suse.com/security/cve/CVE-2025-39713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt()

In the interrupt handler rain_interrupt(), the buffer full check on
rain-&gt;buf_len is performed before acquiring rain-&gt;buf_lock. This
creates a Time-of-Check to Time-of-Use (TOCTOU) race condition, as
rain-&gt;buf_len is concurrently accessed and modified in the work
handler rain_irq_work_handler() under the same lock.

Multiple interrupt invocations can race, with each reading buf_len
before it becomes full and then proceeding. This can lead to both
interrupts attempting to write to the buffer, incrementing buf_len
beyond its capacity (DATA_SIZE) and causing a buffer overflow.

Fix this bug by moving the spin_lock() to before the buffer full
check. This ensures that the check and the subsequent buffer modification
are performed atomically, preventing the race condition. An corresponding
spin_unlock() is added to the overflow path to correctly release the
lock.

This possible bug was found by an experimental static analysis tool
developed by our team.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39713/">CVE-2025-39713 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39713">CVE-2025-39713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249321">SUSE bug 1249321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39714</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39714" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39714" ref_url="https://www.suse.com/security/cve/CVE-2025-39714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: usbtv: Lock resolution while streaming

When an program is streaming (ffplay) and another program (qv4l2)
changes the TV standard from NTSC to PAL, the kernel crashes due to trying
to copy to unmapped memory.

Changing from NTSC to PAL increases the resolution in the usbtv struct,
but the video plane buffer isn't adjusted, so it overflows.

[hverkuil: call vb2_is_busy instead of vb2_is_streaming]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39714/">CVE-2025-39714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39714">CVE-2025-39714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249273">SUSE bug 1249273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39718</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39718" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39718" ref_url="https://www.suse.com/security/cve/CVE-2025-39718" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19105" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002134.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21398" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: Validate length in packet header before skb_put()

When receiving a vsock packet in the guest, only the virtqueue buffer
size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately,
virtio_vsock_skb_rx_put() uses the length from the packet header as the
length argument to skb_put(), potentially resulting in SKB overflow if
the host has gone wonky.

Validate the length as advertised by the packet header before calling
virtio_vsock_skb_rx_put().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39718/">CVE-2025-39718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39718">CVE-2025-39718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249305">SUSE bug 1249305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39719</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39719" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39719" ref_url="https://www.suse.com/security/cve/CVE-2025-39719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: imu: bno055: fix OOB access of hw_xlate array

Fix a potential out-of-bounds array access of the hw_xlate array in
bno055.c.

In bno055_get_regmask(), hw_xlate was iterated over the length of the
vals array instead of the length of the hw_xlate array. In the case of
bno055_gyr_scale, the vals array is larger than the hw_xlate array,
so this could result in an out-of-bounds access. In practice, this
shouldn't happen though because a match should always be found which
breaks out of the for loop before it iterates beyond the end of the
hw_xlate array.

By adding a new hw_xlate_len field to the bno055_sysfs_attr, we can be
sure we are iterating over the correct length.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39719/">CVE-2025-39719 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39719">CVE-2025-39719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249271">SUSE bug 1249271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39721</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39721" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39721" ref_url="https://www.suse.com/security/cve/CVE-2025-39721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qat - flush misc workqueue during device shutdown

Repeated loading and unloading of a device specific QAT driver, for
example qat_4xxx, in a tight loop can lead to a crash due to a
use-after-free scenario. This occurs when a power management (PM)
interrupt triggers just before the device-specific driver (e.g.,
qat_4xxx.ko) is unloaded, while the core driver (intel_qat.ko) remains
loaded.

Since the driver uses a shared workqueue (`qat_misc_wq`) across all
devices and owned by intel_qat.ko, a deferred routine from the
device-specific driver may still be pending in the queue. If this
routine executes after the driver is unloaded, it can dereference freed
memory, resulting in a page fault and kernel crash like the following:

    BUG: unable to handle page fault for address: ffa000002e50a01c
    #PF: supervisor read access in kernel mode
    RIP: 0010:pm_bh_handler+0x1d2/0x250 [intel_qat]
    Call Trace:
      pm_bh_handler+0x1d2/0x250 [intel_qat]
      process_one_work+0x171/0x340
      worker_thread+0x277/0x3a0
      kthread+0xf0/0x120
      ret_from_fork+0x2d/0x50

To prevent this, flush the misc workqueue during device shutdown to
ensure that all pending work items are completed before the driver is
unloaded.

Note: This approach may slightly increase shutdown latency if the
workqueue contains jobs from other devices, but it ensures correctness
and stability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39721/">CVE-2025-39721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39721">CVE-2025-39721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249323">SUSE bug 1249323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39722</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39722" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39722" ref_url="https://www.suse.com/security/cve/CVE-2025-39722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: caam - Prevent crash on suspend with iMX8QM / iMX8ULP

Since the CAAM on these SoCs is managed by another ARM core, called the
SECO (Security Controller) on iMX8QM and Secure Enclave on iMX8ULP, which
also reserves access to register page 0 suspend operations cannot touch
this page.

This is similar to when running OPTEE, where OPTEE will reserve page 0.

Track this situation using a new state variable no_page0, reflecting if
page 0 is reserved elsewhere, either by other management cores in SoC or
by OPTEE.

Replace the optee_en check in suspend/resume with the new check.

optee_en cannot go away as it's needed elsewhere to gate OPTEE specific
situations.

Fixes the following splat at suspend:

    Internal error: synchronous external abort: 0000000096000010 [#1] SMP
    Hardware name: Freescale i.MX8QXP ACU6C (DT)
    pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
    pc : readl+0x0/0x18
    lr : rd_reg32+0x18/0x3c
    sp : ffffffc08192ba20
    x29: ffffffc08192ba20 x28: ffffff8025190000 x27: 0000000000000000
    x26: ffffffc0808ae808 x25: ffffffc080922338 x24: ffffff8020e89090
    x23: 0000000000000000 x22: ffffffc080922000 x21: ffffff8020e89010
    x20: ffffffc080387ef8 x19: ffffff8020e89010 x18: 000000005d8000d5
    x17: 0000000030f35963 x16: 000000008f785f3f x15: 000000003b8ef57c
    x14: 00000000c418aef8 x13: 00000000f5fea526 x12: 0000000000000001
    x11: 0000000000000002 x10: 0000000000000001 x9 : 0000000000000000
    x8 : ffffff8025190870 x7 : ffffff8021726880 x6 : 0000000000000002
    x5 : ffffff80217268f0 x4 : ffffff8021726880 x3 : ffffffc081200000
    x2 : 0000000000000001 x1 : ffffff8020e89010 x0 : ffffffc081200004
    Call trace:
     readl+0x0/0x18
     caam_ctrl_suspend+0x30/0xdc
     dpm_run_callback.constprop.0+0x24/0x5c
     device_suspend+0x170/0x2e8
     dpm_suspend+0xa0/0x104
     dpm_suspend_start+0x48/0x50
     suspend_devices_and_enter+0x7c/0x45c
     pm_suspend+0x148/0x160
     state_store+0xb4/0xf8
     kobj_attr_store+0x14/0x24
     sysfs_kf_write+0x38/0x48
     kernfs_fop_write_iter+0xb4/0x178
     vfs_write+0x118/0x178
     ksys_write+0x6c/0xd0
     __arm64_sys_write+0x14/0x1c
     invoke_syscall.constprop.0+0x64/0xb0
     do_el0_svc+0x90/0xb0
     el0_svc+0x18/0x44
     el0t_64_sync_handler+0x88/0x124
     el0t_64_sync+0x150/0x154
    Code: 88dffc21 88dffc21 5ac00800 d65f03c0 (b9400000)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39722/">CVE-2025-39722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39722">CVE-2025-39722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249301">SUSE bug 1249301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39723</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39723" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39723" ref_url="https://www.suse.com/security/cve/CVE-2025-39723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfs: Fix unbuffered write error handling

If all the subrequests in an unbuffered write stream fail, the subrequest
collector doesn't update the stream-&gt;transferred value and it retains its
initial LONG_MAX value.  Unfortunately, if all active streams fail, then we
take the smallest value of { LONG_MAX, LONG_MAX, ... } as the value to set
in wreq-&gt;transferred - which is then returned from -&gt;write_iter().

LONG_MAX was chosen as the initial value so that all the streams can be
quickly assessed by taking the smallest value of all stream-&gt;transferred -
but this only works if we've set any of them.

Fix this by adding a flag to indicate whether the value in
stream-&gt;transferred is valid and checking that when we integrate the
values.  stream-&gt;transferred can then be initialised to zero.

This was found by running the generic/750 xfstest against cifs with
cache=none.  It splices data to the target file.  Once (if) it has used up
all the available scratch space, the writes start failing with ENOSPC.
This causes -&gt;write_iter() to fail.  However, it was returning
wreq-&gt;transferred, i.e. LONG_MAX, rather than an error (because it thought
the amount transferred was non-zero) and iter_file_splice_write() would
then try to clean up that amount of pipe bufferage - leading to an oops
when it overran.  The kernel log showed:

    CIFS: VFS: Send error in write = -28

followed by:

    BUG: kernel NULL pointer dereference, address: 0000000000000008

with:

    RIP: 0010:iter_file_splice_write+0x3a4/0x520
    do_splice+0x197/0x4e0

or:

    RIP: 0010:pipe_buf_release (include/linux/pipe_fs_i.h:282)
    iter_file_splice_write (fs/splice.c:755)

Also put a warning check into splice to announce if -&gt;write_iter() returned
that it had written more than it was asked to.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39723/">CVE-2025-39723 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39723">CVE-2025-39723 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249314">SUSE bug 1249314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39724</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39724" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39724" ref_url="https://www.suse.com/security/cve/CVE-2025-39724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: 8250: fix panic due to PSLVERR

When the PSLVERR_RESP_EN parameter is set to 1, the device generates
an error response if an attempt is made to read an empty RBR (Receive
Buffer Register) while the FIFO is enabled.

In serial8250_do_startup(), calling serial_port_out(port, UART_LCR,
UART_LCR_WLEN8) triggers dw8250_check_lcr(), which invokes
dw8250_force_idle() and serial8250_clear_and_reinit_fifos(). The latter
function enables the FIFO via serial_out(p, UART_FCR, p-&gt;fcr).
Execution proceeds to the serial_port_in(port, UART_RX).
This satisfies the PSLVERR trigger condition.

When another CPU (e.g., using printk()) is accessing the UART (UART
is busy), the current CPU fails the check (value &amp; ~UART_LCR_SPAR) ==
(lcr &amp; ~UART_LCR_SPAR) in dw8250_check_lcr(), causing it to enter
dw8250_force_idle().

Put serial_port_out(port, UART_LCR, UART_LCR_WLEN8) under the port-&gt;lock
to fix this issue.

Panic backtrace:
[    0.442336] Oops - unknown exception [#1]
[    0.442343] epc : dw8250_serial_in32+0x1e/0x4a
[    0.442351]  ra : serial8250_do_startup+0x2c8/0x88e
...
[    0.442416] console_on_rootfs+0x26/0x70
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39724/">CVE-2025-39724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39724">CVE-2025-39724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249265">SUSE bug 1249265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39726</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39726" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39726" ref_url="https://www.suse.com/security/cve/CVE-2025-39726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/ism: fix concurrency management in ism_cmd()

The s390x ISM device data sheet clearly states that only one
request-response sequence is allowable per ISM function at any point in
time.  Unfortunately as of today the s390/ism driver in Linux does not
honor that requirement. This patch aims to rectify that.

This problem was discovered based on Aliaksei's bug report which states
that for certain workloads the ISM functions end up entering error state
(with PEC 2 as seen from the logs) after a while and as a consequence
connections handled by the respective function break, and for future
connection requests the ISM device is not considered -- given it is in a
dysfunctional state. During further debugging PEC 3A was observed as
well.

A kernel message like
[ 1211.244319] zpci: 061a:00:00.0: Event 0x2 reports an error for PCI function 0x61a
is a reliable indicator of the stated function entering error state
with PEC 2. Let me also point out that a kernel message like
[ 1211.244325] zpci: 061a:00:00.0: The ism driver bound to the device does not support error recovery
is a reliable indicator that the ISM function won't be auto-recovered
because the ISM driver currently lacks support for it.

On a technical level, without this synchronization, commands (inputs to
the FW) may be partially or fully overwritten (corrupted) by another CPU
trying to issue commands on the same function. There is hard evidence that
this can lead to DMB token values being used as DMB IOVAs, leading to
PEC 2 PCI events indicating invalid DMA. But this is only one of the
failure modes imaginable. In theory even completely losing one command
and executing another one twice and then trying to interpret the outputs
as if the command we intended to execute was actually executed and not
the other one is also possible.  Frankly, I don't feel confident about
providing an exhaustive list of possible consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39726/">CVE-2025-39726 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39726">CVE-2025-39726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249266">SUSE bug 1249266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39727</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39727" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39727" ref_url="https://www.suse.com/security/cve/CVE-2025-39727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: swap: fix potential buffer overflow in setup_clusters()

In setup_swap_map(), we only ensure badpages are in range (0, last_page]. 
As maxpages might be &lt; last_page, setup_clusters() will encounter a buffer
overflow when a badpage is &gt;= maxpages.

Only call inc_cluster_info_page() for badpage which is &lt; maxpages to fix
the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39727/">CVE-2025-39727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39727">CVE-2025-39727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249297">SUSE bug 1249297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39730</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39730" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39730" ref_url="https://www.suse.com/security/cve/CVE-2025-39730" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17397" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002074.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19105" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()

The function needs to check the minimal filehandle length before it can
access the embedded filehandle.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39730/">CVE-2025-39730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39730">CVE-2025-39730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249296">SUSE bug 1249296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39732</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39732" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39732" ref_url="https://www.suse.com/security/cve/CVE-2025-39732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask()

ath11k_mac_disable_peer_fixed_rate() is passed as the iterator to
ieee80211_iterate_stations_atomic(). Note in this case the iterator is
required to be atomic, however ath11k_mac_disable_peer_fixed_rate() does
not follow it as it might sleep. Consequently below warning is seen:

BUG: sleeping function called from invalid context at wmi.c:304
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl
 __might_resched.cold
 ath11k_wmi_cmd_send
 ath11k_wmi_set_peer_param
 ath11k_mac_disable_peer_fixed_rate
 ieee80211_iterate_stations_atomic
 ath11k_mac_op_set_bitrate_mask.cold

Change to ieee80211_iterate_stations_mtx() to fix this issue.

Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39732/">CVE-2025-39732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39732">CVE-2025-39732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249292">SUSE bug 1249292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39736</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39736" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39736" ref_url="https://www.suse.com/security/cve/CVE-2025-39736" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/kmemleak: avoid deadlock by moving pr_warn() outside kmemleak_lock

When netpoll is enabled, calling pr_warn_once() while holding
kmemleak_lock in mem_pool_alloc() can cause a deadlock due to lock
inversion with the netconsole subsystem.  This occurs because
pr_warn_once() may trigger netpoll, which eventually leads to
__alloc_skb() and back into kmemleak code, attempting to reacquire
kmemleak_lock.

This is the path for the deadlock.

mem_pool_alloc()
  -&gt; raw_spin_lock_irqsave(&amp;kmemleak_lock, flags);
      -&gt; pr_warn_once()
          -&gt; netconsole subsystem
	     -&gt; netpoll
	         -&gt; __alloc_skb
		   -&gt; __create_object
		     -&gt; raw_spin_lock_irqsave(&amp;kmemleak_lock, flags);

Fix this by setting a flag and issuing the pr_warn_once() after
kmemleak_lock is released.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39736/">CVE-2025-39736 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39736">CVE-2025-39736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249476">SUSE bug 1249476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39738</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39738" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39738" ref_url="https://www.suse.com/security/cve/CVE-2025-39738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not allow relocation of partially dropped subvolumes

[BUG]
There is an internal report that balance triggered transaction abort,
with the following call trace:

  item 85 key (594509824 169 0) itemoff 12599 itemsize 33
          extent refs 1 gen 197740 flags 2
          ref#0: tree block backref root 7
  item 86 key (594558976 169 0) itemoff 12566 itemsize 33
          extent refs 1 gen 197522 flags 2
          ref#0: tree block backref root 7
 ...
 BTRFS error (device loop0): extent item not found for insert, bytenr 594526208 num_bytes 16384 parent 449921024 root_objectid 934 owner 1 offset 0
 BTRFS error (device loop0): failed to run delayed ref for logical 594526208 num_bytes 16384 type 182 action 1 ref_mod 1: -117
 ------------[ cut here ]------------
 BTRFS: Transaction aborted (error -117)
 WARNING: CPU: 1 PID: 6963 at ../fs/btrfs/extent-tree.c:2168 btrfs_run_delayed_refs+0xfa/0x110 [btrfs]

And btrfs check doesn't report anything wrong related to the extent
tree.

[CAUSE]
The cause is a little complex, firstly the extent tree indeed doesn't
have the backref for 594526208.

The extent tree only have the following two backrefs around that bytenr
on-disk:

        item 65 key (594509824 METADATA_ITEM 0) itemoff 13880 itemsize 33
                refs 1 gen 197740 flags TREE_BLOCK
                tree block skinny level 0
                (176 0x7) tree block backref root CSUM_TREE
        item 66 key (594558976 METADATA_ITEM 0) itemoff 13847 itemsize 33
                refs 1 gen 197522 flags TREE_BLOCK
                tree block skinny level 0
                (176 0x7) tree block backref root CSUM_TREE

But the such missing backref item is not an corruption on disk, as the
offending delayed ref belongs to subvolume 934, and that subvolume is
being dropped:

        item 0 key (934 ROOT_ITEM 198229) itemoff 15844 itemsize 439
                generation 198229 root_dirid 256 bytenr 10741039104 byte_limit 0 bytes_used 345571328
                last_snapshot 198229 flags 0x1000000000001(RDONLY) refs 0
                drop_progress key (206324 EXTENT_DATA 2711650304) drop_level 2
                level 2 generation_v2 198229

And that offending tree block 594526208 is inside the dropped range of
that subvolume.  That explains why there is no backref item for that
bytenr and why btrfs check is not reporting anything wrong.

But this also shows another problem, as btrfs will do all the orphan
subvolume cleanup at a read-write mount.

So half-dropped subvolume should not exist after an RW mount, and
balance itself is also exclusive to subvolume cleanup, meaning we
shouldn't hit a subvolume half-dropped during relocation.

The root cause is, there is no orphan item for this subvolume.
In fact there are 5 subvolumes from around 2021 that have the same
problem.

It looks like the original report has some older kernels running, and
caused those zombie subvolumes.

Thankfully upstream commit 8d488a8c7ba2 ("btrfs: fix subvolume/snapshot
deletion not triggered on mount") has long fixed the bug.

[ENHANCEMENT]
For repairing such old fs, btrfs-progs will be enhanced.

Considering how delayed the problem will show up (at run delayed ref
time) and at that time we have to abort transaction already, it is too
late.

Instead here we reject any half-dropped subvolume for reloc tree at the
earliest time, preventing confusion and extra time wasted on debugging
similar bugs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39738/">CVE-2025-39738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39738">CVE-2025-39738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249540">SUSE bug 1249540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39739</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39739" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39739" ref_url="https://www.suse.com/security/cve/CVE-2025-39739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/arm-smmu-qcom: Add SM6115 MDSS compatible

Add the SM6115 MDSS compatible to clients compatible list, as it also
needs that workaround.
Without this workaround, for example, QRB4210 RB2 which is based on
SM4250/SM6115 generates a lot of smmu unhandled context faults during
boot:

arm_smmu_context_fault: 116854 callbacks suppressed
arm-smmu c600000.iommu: Unhandled context fault: fsr=0x402,
iova=0x5c0ec600, fsynr=0x320021, cbfrsynra=0x420, cb=5
arm-smmu c600000.iommu: FSR    = 00000402 [Format=2 TF], SID=0x420
arm-smmu c600000.iommu: FSYNR0 = 00320021 [S1CBNDX=50 PNU PLVL=1]
arm-smmu c600000.iommu: Unhandled context fault: fsr=0x402,
iova=0x5c0d7800, fsynr=0x320021, cbfrsynra=0x420, cb=5
arm-smmu c600000.iommu: FSR    = 00000402 [Format=2 TF], SID=0x420

and also failed initialisation of lontium lt9611uxc, gpu and dpu is
observed:
(binding MDSS components triggered by lt9611uxc have failed)

 ------------[ cut here ]------------
 !aspace
 WARNING: CPU: 6 PID: 324 at drivers/gpu/drm/msm/msm_gem_vma.c:130 msm_gem_vma_init+0x150/0x18c [msm]
 Modules linked in: ... (long list of modules)
 CPU: 6 UID: 0 PID: 324 Comm: (udev-worker) Not tainted 6.15.0-03037-gaacc73ceeb8b #4 PREEMPT
 Hardware name: Qualcomm Technologies, Inc. QRB4210 RB2 (DT)
 pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : msm_gem_vma_init+0x150/0x18c [msm]
 lr : msm_gem_vma_init+0x150/0x18c [msm]
 sp : ffff80008144b280
  		...
 Call trace:
  msm_gem_vma_init+0x150/0x18c [msm] (P)
  get_vma_locked+0xc0/0x194 [msm]
  msm_gem_get_and_pin_iova_range+0x4c/0xdc [msm]
  msm_gem_kernel_new+0x48/0x160 [msm]
  msm_gpu_init+0x34c/0x53c [msm]
  adreno_gpu_init+0x1b0/0x2d8 [msm]
  a6xx_gpu_init+0x1e8/0x9e0 [msm]
  adreno_bind+0x2b8/0x348 [msm]
  component_bind_all+0x100/0x230
  msm_drm_bind+0x13c/0x3d0 [msm]
  try_to_bring_up_aggregate_device+0x164/0x1d0
  __component_add+0xa4/0x174
  component_add+0x14/0x20
  dsi_dev_attach+0x20/0x34 [msm]
  dsi_host_attach+0x58/0x98 [msm]
  devm_mipi_dsi_attach+0x34/0x90
  lt9611uxc_attach_dsi.isra.0+0x94/0x124 [lontium_lt9611uxc]
  lt9611uxc_probe+0x540/0x5fc [lontium_lt9611uxc]
  i2c_device_probe+0x148/0x2a8
  really_probe+0xbc/0x2c0
  __driver_probe_device+0x78/0x120
  driver_probe_device+0x3c/0x154
  __driver_attach+0x90/0x1a0
  bus_for_each_dev+0x68/0xb8
  driver_attach+0x24/0x30
  bus_add_driver+0xe4/0x208
  driver_register+0x68/0x124
  i2c_register_driver+0x48/0xcc
  lt9611uxc_driver_init+0x20/0x1000 [lontium_lt9611uxc]
  do_one_initcall+0x60/0x1d4
  do_init_module+0x54/0x1fc
  load_module+0x1748/0x1c8c
  init_module_from_file+0x74/0xa0
  __arm64_sys_finit_module+0x130/0x2f8
  invoke_syscall+0x48/0x104
  el0_svc_common.constprop.0+0xc0/0xe0
  do_el0_svc+0x1c/0x28
  el0_svc+0x2c/0x80
  el0t_64_sync_handler+0x10c/0x138
  el0t_64_sync+0x198/0x19c
 ---[ end trace 0000000000000000 ]---
 msm_dpu 5e01000.display-controller: [drm:msm_gpu_init [msm]] *ERROR* could not allocate memptrs: -22
 msm_dpu 5e01000.display-controller: failed to load adreno gpu
 platform a400000.remoteproc:glink-edge:apr:service@7:dais: Adding to iommu group 19
 msm_dpu 5e01000.display-controller: failed to bind 5900000.gpu (ops a3xx_ops [msm]): -22
 msm_dpu 5e01000.display-controller: adev bind failed: -22
 lt9611uxc 0-002b: failed to attach dsi to host
 lt9611uxc 0-002b: probe with driver lt9611uxc failed with error -22
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39739/">CVE-2025-39739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39739">CVE-2025-39739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249542">SUSE bug 1249542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39742</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39742" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39742" ref_url="https://www.suse.com/security/cve/CVE-2025-39742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20457-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20458-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20460-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20464-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20471-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024655.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask()

The function divides number of online CPUs by num_core_siblings, and
later checks the divider by zero. This implies a possibility to get
and divide-by-zero runtime error. Fix it by moving the check prior to
division. This also helps to save one indentation level.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39742/">CVE-2025-39742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39742">CVE-2025-39742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249479">SUSE bug 1249479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249480">SUSE bug 1249480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253291">SUSE bug 1253291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047551" comment="kernel-livepatch-6_12_0-160000_5-default-7-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047556" comment="kernel-livepatch-6_12_0-160000_5-rt-5-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39744</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39744" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39744" ref_url="https://www.suse.com/security/cve/CVE-2025-39744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu: Fix rcu_read_unlock() deadloop due to IRQ work

During rcu_read_unlock_special(), if this happens during irq_exit(), we
can lockup if an IPI is issued. This is because the IPI itself triggers
the irq_exit() path causing a recursive lock up.

This is precisely what Xiongfeng found when invoking a BPF program on
the trace_tick_stop() tracepoint As shown in the trace below. Fix by
managing the irq_work state correctly.

irq_exit()
  __irq_exit_rcu()
    /* in_hardirq() returns false after this */
    preempt_count_sub(HARDIRQ_OFFSET)
    tick_irq_exit()
      tick_nohz_irq_exit()
	    tick_nohz_stop_sched_tick()
	      trace_tick_stop()  /* a bpf prog is hooked on this trace point */
		   __bpf_trace_tick_stop()
		      bpf_trace_run2()
			    rcu_read_unlock_special()
                              /* will send a IPI to itself */
			      irq_work_queue_on(&amp;rdp-&gt;defer_qs_iw, rdp-&gt;cpu);

A simple reproducer can also be obtained by doing the following in
tick_irq_exit(). It will hang on boot without the patch:

  static inline void tick_irq_exit(void)
  {
 +	rcu_read_lock();
 +	WRITE_ONCE(current-&gt;rcu_read_unlock_special.b.need_qs, true);
 +	rcu_read_unlock();
 +

[neeraj: Apply Frederic's suggested fix for PREEMPT_RT]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39744/">CVE-2025-39744 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39744">CVE-2025-39744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249494">SUSE bug 1249494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39745</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39745" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39745" ref_url="https://www.suse.com/security/cve/CVE-2025-39745" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcutorture: Fix rcutorture_one_extend_check() splat in RT kernels

For built with CONFIG_PREEMPT_RT=y kernels, running rcutorture
tests resulted in the following splat:

[   68.797425] rcutorture_one_extend_check during change: Current 0x1  To add 0x1  To remove 0x0  preempt_count() 0x0
[   68.797533] WARNING: CPU: 2 PID: 512 at kernel/rcu/rcutorture.c:1993 rcutorture_one_extend_check+0x419/0x560 [rcutorture]
[   68.797601] Call Trace:
[   68.797602]  &lt;TASK&gt;
[   68.797619]  ? lockdep_softirqs_off+0xa5/0x160
[   68.797631]  rcutorture_one_extend+0x18e/0xcc0 [rcutorture 2466dbd2ff34dbaa36049cb323a80c3306ac997c]
[   68.797646]  ? local_clock+0x19/0x40
[   68.797659]  rcu_torture_one_read+0xf0/0x280 [rcutorture 2466dbd2ff34dbaa36049cb323a80c3306ac997c]
[   68.797678]  ? __pfx_rcu_torture_one_read+0x10/0x10 [rcutorture 2466dbd2ff34dbaa36049cb323a80c3306ac997c]
[   68.797804]  ? __pfx_rcu_torture_timer+0x10/0x10 [rcutorture 2466dbd2ff34dbaa36049cb323a80c3306ac997c]
[   68.797815] rcu-torture: rcu_torture_reader task started
[   68.797824] rcu-torture: Creating rcu_torture_reader task
[   68.797824]  rcu_torture_reader+0x238/0x580 [rcutorture 2466dbd2ff34dbaa36049cb323a80c3306ac997c]
[   68.797836]  ? kvm_sched_clock_read+0x15/0x30

Disable BH does not change the SOFTIRQ corresponding bits in
preempt_count() for RT kernels, this commit therefore use
softirq_count() to check the if BH is disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39745/">CVE-2025-39745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39745">CVE-2025-39745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249498">SUSE bug 1249498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39746</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39746" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39746" ref_url="https://www.suse.com/security/cve/CVE-2025-39746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath10k: shutdown driver when hardware is unreliable

In rare cases, ath10k may lose connection with the PCIe bus due to
some unknown reasons, which could further lead to system crashes during
resuming due to watchdog timeout:

ath10k_pci 0000:01:00.0: wmi command 20486 timeout, restarting hardware
ath10k_pci 0000:01:00.0: already restarting
ath10k_pci 0000:01:00.0: failed to stop WMI vdev 0: -11
ath10k_pci 0000:01:00.0: failed to stop vdev 0: -11
ieee80211 phy0: PM: **** DPM device timeout ****
Call Trace:
 panic+0x125/0x315
 dpm_watchdog_set+0x54/0x54
 dpm_watchdog_handler+0x57/0x57
 call_timer_fn+0x31/0x13c

At this point, all WMI commands will timeout and attempt to restart
device. So set a threshold for consecutive restart failures. If the
threshold is exceeded, consider the hardware is unreliable and all
ath10k operations should be skipped to avoid system crash.

fail_cont_count and pending_recovery are atomic variables, and
do not involve complex conditional logic. Therefore, even if recovery
check and reconfig complete are executed concurrently, the recovery
mechanism will not be broken.

Tested-on: QCA6174 hw3.2 PCI WLAN.RM.4.4.1-00288-QCARMSWPZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39746/">CVE-2025-39746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39746">CVE-2025-39746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249516">SUSE bug 1249516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249517">SUSE bug 1249517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39747</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39747" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39747" ref_url="https://www.suse.com/security/cve/CVE-2025-39747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Add error handling for krealloc in metadata setup

Function msm_ioctl_gem_info_set_metadata() now checks for krealloc
failure and returns -ENOMEM, avoiding potential NULL pointer dereference.
Explicitly avoids __GFP_NOFAIL due to deadlock risks and allocation constraints.

Patchwork: https://patchwork.freedesktop.org/patch/661235/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39747/">CVE-2025-39747 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39747">CVE-2025-39747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249566">SUSE bug 1249566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39748</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39748" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39748" ref_url="https://www.suse.com/security/cve/CVE-2025-39748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Forget ranges when refining tnum after JSET

Syzbot reported a kernel warning due to a range invariant violation on
the following BPF program.

  0: call bpf_get_netns_cookie
  1: if r0 == 0 goto &lt;exit&gt;
  2: if r0 &amp; Oxffffffff goto &lt;exit&gt;

The issue is on the path where we fall through both jumps.

That path is unreachable at runtime: after insn 1, we know r0 != 0, but
with the sign extension on the jset, we would only fallthrough insn 2
if r0 == 0. Unfortunately, is_branch_taken() isn't currently able to
figure this out, so the verifier walks all branches. The verifier then
refines the register bounds using the second condition and we end
up with inconsistent bounds on this unreachable path:

  1: if r0 == 0 goto &lt;exit&gt;
    r0: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0xffffffffffffffff)
  2: if r0 &amp; 0xffffffff goto &lt;exit&gt;
    r0 before reg_bounds_sync: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0)
    r0 after reg_bounds_sync:  u64=[0x1, 0] var_off=(0, 0)

Improving the range refinement for JSET to cover all cases is tricky. We
also don't expect many users to rely on JSET given LLVM doesn't generate
those instructions. So instead of improving the range refinement for
JSETs, Eduard suggested we forget the ranges whenever we're narrowing
tnums after a JSET. This patch implements that approach.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39748/">CVE-2025-39748 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39748">CVE-2025-39748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249587">SUSE bug 1249587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39749</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39749" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39749" ref_url="https://www.suse.com/security/cve/CVE-2025-39749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu: Protect -&gt;defer_qs_iw_pending from data race

On kernels built with CONFIG_IRQ_WORK=y, when rcu_read_unlock() is
invoked within an interrupts-disabled region of code [1], it will invoke
rcu_read_unlock_special(), which uses an irq-work handler to force the
system to notice when the RCU read-side critical section actually ends.
That end won't happen until interrupts are enabled at the soonest.

In some kernels, such as those booted with rcutree.use_softirq=y, the
irq-work handler is used unconditionally.

The per-CPU rcu_data structure's -&gt;defer_qs_iw_pending field is
updated by the irq-work handler and is both read and updated by
rcu_read_unlock_special().  This resulted in the following KCSAN splat:

------------------------------------------------------------------------

BUG: KCSAN: data-race in rcu_preempt_deferred_qs_handler / rcu_read_unlock_special

read to 0xffff96b95f42d8d8 of 1 bytes by task 90 on cpu 8:
 rcu_read_unlock_special+0x175/0x260
 __rcu_read_unlock+0x92/0xa0
 rt_spin_unlock+0x9b/0xc0
 __local_bh_enable+0x10d/0x170
 __local_bh_enable_ip+0xfb/0x150
 rcu_do_batch+0x595/0xc40
 rcu_cpu_kthread+0x4e9/0x830
 smpboot_thread_fn+0x24d/0x3b0
 kthread+0x3bd/0x410
 ret_from_fork+0x35/0x40
 ret_from_fork_asm+0x1a/0x30

write to 0xffff96b95f42d8d8 of 1 bytes by task 88 on cpu 8:
 rcu_preempt_deferred_qs_handler+0x1e/0x30
 irq_work_single+0xaf/0x160
 run_irq_workd+0x91/0xc0
 smpboot_thread_fn+0x24d/0x3b0
 kthread+0x3bd/0x410
 ret_from_fork+0x35/0x40
 ret_from_fork_asm+0x1a/0x30

no locks held by irq_work/8/88.
irq event stamp: 200272
hardirqs last  enabled at (200272): [&lt;ffffffffb0f56121&gt;] finish_task_switch+0x131/0x320
hardirqs last disabled at (200271): [&lt;ffffffffb25c7859&gt;] __schedule+0x129/0xd70
softirqs last  enabled at (0): [&lt;ffffffffb0ee093f&gt;] copy_process+0x4df/0x1cc0
softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0

------------------------------------------------------------------------

The problem is that irq-work handlers run with interrupts enabled, which
means that rcu_preempt_deferred_qs_handler() could be interrupted,
and that interrupt handler might contain an RCU read-side critical
section, which might invoke rcu_read_unlock_special().  In the strict
KCSAN mode of operation used by RCU, this constitutes a data race on
the -&gt;defer_qs_iw_pending field.

This commit therefore disables interrupts across the portion of the
rcu_preempt_deferred_qs_handler() that updates the -&gt;defer_qs_iw_pending
field.  This suffices because this handler is not a fast path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39749/">CVE-2025-39749 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39749">CVE-2025-39749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249533">SUSE bug 1249533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39750</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39750" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39750" ref_url="https://www.suse.com/security/cve/CVE-2025-39750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Correct tid cleanup when tid setup fails

Currently, if any error occurs during ath12k_dp_rx_peer_tid_setup(),
the tid value is already incremented, even though the corresponding
TID is not actually allocated. Proceed to
ath12k_dp_rx_peer_tid_delete() starting from unallocated tid,
which might leads to freeing unallocated TID and cause potential
crash or out-of-bounds access.

Hence, fix by correctly decrementing tid before cleanup to match only
the successfully allocated TIDs.

Also, remove tid-- from failure case of ath12k_dp_rx_peer_frag_setup(),
as decrementing the tid before cleanup in loop will take care of this.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-39750/">CVE-2025-39750 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39750">CVE-2025-39750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249523">SUSE bug 1249523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252715">SUSE bug 1252715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39751</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39751" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39751" ref_url="https://www.suse.com/security/cve/CVE-2025-39751" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18297" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002123.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19105" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002134.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39751/">CVE-2025-39751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39751">CVE-2025-39751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249538">SUSE bug 1249538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249539">SUSE bug 1249539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39753</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39753" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39753" ref_url="https://www.suse.com/security/cve/CVE-2025-39753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Set .migrate_folio in gfs2_{rgrp,meta}_aops

Clears up the warning added in 7ee3647243e5 ("migrate: Remove call to
-&gt;writepage") that occurs in various xfstests, causing "something found
in dmesg" failures.

[  341.136573] gfs2_meta_aops does not implement migrate_folio
[  341.136953] WARNING: CPU: 1 PID: 36 at mm/migrate.c:944 move_to_new_folio+0x2f8/0x300
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39753/">CVE-2025-39753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39753">CVE-2025-39753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249590">SUSE bug 1249590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39754</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39754" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39754" ref_url="https://www.suse.com/security/cve/CVE-2025-39754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/smaps: fix race between smaps_hugetlb_range and migration

smaps_hugetlb_range() handles the pte without holdling ptl, and may be
concurrenct with migration, leaing to BUG_ON in pfn_swap_entry_to_page(). 
The race is as follows.

smaps_hugetlb_range              migrate_pages
  huge_ptep_get
                                   remove_migration_ptes
				   folio_unlock
  pfn_swap_entry_folio
    BUG_ON

To fix it, hold ptl lock in smaps_hugetlb_range().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39754/">CVE-2025-39754 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39754">CVE-2025-39754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249524">SUSE bug 1249524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39756</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39756" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39756" ref_url="https://www.suse.com/security/cve/CVE-2025-39756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: Prevent file descriptor table allocations exceeding INT_MAX

When sysctl_nr_open is set to a very high value (for example, 1073741816
as set by systemd), processes attempting to use file descriptors near
the limit can trigger massive memory allocation attempts that exceed
INT_MAX, resulting in a WARNING in mm/slub.c:

  WARNING: CPU: 0 PID: 44 at mm/slub.c:5027 __kvmalloc_node_noprof+0x21a/0x288

This happens because kvmalloc_array() and kvmalloc() check if the
requested size exceeds INT_MAX and emit a warning when the allocation is
not flagged with __GFP_NOWARN.

Specifically, when nr_open is set to 1073741816 (0x3ffffff8) and a
process calls dup2(oldfd, 1073741880), the kernel attempts to allocate:
- File descriptor array: 1073741880 * 8 bytes = 8,589,935,040 bytes
- Multiple bitmaps: ~400MB
- Total allocation size: &gt; 8GB (exceeding INT_MAX = 2,147,483,647)

Reproducer:
1. Set /proc/sys/fs/nr_open to 1073741816:
   # echo 1073741816 &gt; /proc/sys/fs/nr_open

2. Run a program that uses a high file descriptor:
   #include &lt;unistd.h&gt;
   #include &lt;sys/resource.h&gt;

   int main() {
       struct rlimit rlim = {1073741824, 1073741824};
       setrlimit(RLIMIT_NOFILE, &amp;rlim);
       dup2(2, 1073741880);  // Triggers the warning
       return 0;
   }

3. Observe WARNING in dmesg at mm/slub.c:5027

systemd commit a8b627a introduced automatic bumping of fs.nr_open to the
maximum possible value. The rationale was that systems with memory
control groups (memcg) no longer need separate file descriptor limits
since memory is properly accounted. However, this change overlooked
that:

1. The kernel's allocation functions still enforce INT_MAX as a maximum
   size regardless of memcg accounting
2. Programs and tests that legitimately test file descriptor limits can
   inadvertently trigger massive allocations
3. The resulting allocations (&gt;8GB) are impractical and will always fail

systemd's algorithm starts with INT_MAX and keeps halving the value
until the kernel accepts it. On most systems, this results in nr_open
being set to 1073741816 (0x3ffffff8), which is just under 1GB of file
descriptors.

While processes rarely use file descriptors near this limit in normal
operation, certain selftests (like
tools/testing/selftests/core/unshare_test.c) and programs that test file
descriptor limits can trigger this issue.

Fix this by adding a check in alloc_fdtable() to ensure the requested
allocation size does not exceed INT_MAX. This causes the operation to
fail with -EMFILE instead of triggering a kernel warning and avoids the
impractical &gt;8GB memory allocation request.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39756/">CVE-2025-39756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39756">CVE-2025-39756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249512">SUSE bug 1249512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39757</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39757" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39757" ref_url="https://www.suse.com/security/cve/CVE-2025-39757" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002101.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18297" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002123.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Validate UAC3 cluster segment descriptors

UAC3 class segment descriptors need to be verified whether their sizes
match with the declared lengths and whether they fit with the
allocated buffer sizes, too.  Otherwise malicious firmware may lead to
the unexpected OOB accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39757/">CVE-2025-39757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39757">CVE-2025-39757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249515">SUSE bug 1249515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39758</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39758" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39758" ref_url="https://www.suse.com/security/cve/CVE-2025-39758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Fix the sendmsg byte count in siw_tcp_sendpages

Ever since commit c2ff29e99a76 ("siw: Inline do_tcp_sendpages()"),
we have been doing this:

static int siw_tcp_sendpages(struct socket *s, struct page **page, int offset,
                             size_t size)
[...]
        /* Calculate the number of bytes we need to push, for this page
         * specifically */
        size_t bytes = min_t(size_t, PAGE_SIZE - offset, size);
        /* If we can't splice it, then copy it in, as normal */
        if (!sendpage_ok(page[i]))
                msg.msg_flags &amp;= ~MSG_SPLICE_PAGES;
        /* Set the bvec pointing to the page, with len $bytes */
        bvec_set_page(&amp;bvec, page[i], bytes, offset);
        /* Set the iter to $size, aka the size of the whole sendpages (!!!) */
        iov_iter_bvec(&amp;msg.msg_iter, ITER_SOURCE, &amp;bvec, 1, size);
try_page_again:
        lock_sock(sk);
        /* Sendmsg with $size size (!!!) */
        rv = tcp_sendmsg_locked(sk, &amp;msg, size);

This means we've been sending oversized iov_iters and tcp_sendmsg calls
for a while. This has a been a benign bug because sendpage_ok() always
returned true. With the recent slab allocator changes being slowly
introduced into next (that disallow sendpage on large kmalloc
allocations), we have recently hit out-of-bounds crashes, due to slight
differences in iov_iter behavior between the MSG_SPLICE_PAGES and
"regular" copy paths:

(MSG_SPLICE_PAGES)
skb_splice_from_iter
  iov_iter_extract_pages
    iov_iter_extract_bvec_pages
      uses i-&gt;nr_segs to correctly stop in its tracks before OoB'ing everywhere
  skb_splice_from_iter gets a "short" read

(!MSG_SPLICE_PAGES)
skb_copy_to_page_nocache copy=iov_iter_count
 [...]
   copy_from_iter
        /* this doesn't help */
        if (unlikely(iter-&gt;count &lt; len))
                len = iter-&gt;count;
          iterate_bvec
            ... and we run off the bvecs

Fix this by properly setting the iov_iter's byte count, plus sending the
correct byte count to tcp_sendmsg_locked.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39758/">CVE-2025-39758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39758">CVE-2025-39758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249490">SUSE bug 1249490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39759</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39759" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39759" ref_url="https://www.suse.com/security/cve/CVE-2025-39759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: qgroup: fix race between quota disable and quota rescan ioctl

There's a race between a task disabling quotas and another running the
rescan ioctl that can result in a use-after-free of qgroup records from
the fs_info-&gt;qgroup_tree rbtree.

This happens as follows:

1) Task A enters btrfs_ioctl_quota_rescan() -&gt; btrfs_qgroup_rescan();

2) Task B enters btrfs_quota_disable() and calls
   btrfs_qgroup_wait_for_completion(), which does nothing because at that
   point fs_info-&gt;qgroup_rescan_running is false (it wasn't set yet by
   task A);

3) Task B calls btrfs_free_qgroup_config() which starts freeing qgroups
   from fs_info-&gt;qgroup_tree without taking the lock fs_info-&gt;qgroup_lock;

4) Task A enters qgroup_rescan_zero_tracking() which starts iterating
   the fs_info-&gt;qgroup_tree tree while holding fs_info-&gt;qgroup_lock,
   but task B is freeing qgroup records from that tree without holding
   the lock, resulting in a use-after-free.

Fix this by taking fs_info-&gt;qgroup_lock at btrfs_free_qgroup_config().
Also at btrfs_qgroup_rescan() don't start the rescan worker if quotas
were already disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39759/">CVE-2025-39759 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39759">CVE-2025-39759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249522">SUSE bug 1249522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39760</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39760" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39760" ref_url="https://www.suse.com/security/cve/CVE-2025-39760" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: core: config: Prevent OOB read in SS endpoint companion parsing

usb_parse_ss_endpoint_companion() checks descriptor type before length,
enabling a potentially odd read outside of the buffer size.

Fix this up by checking the size first before looking at any of the
fields in the descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39760/">CVE-2025-39760 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39760">CVE-2025-39760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249598">SUSE bug 1249598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39761</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39761" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39761" ref_url="https://www.suse.com/security/cve/CVE-2025-39761" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17377" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Decrement TID on RX peer frag setup error handling

Currently, TID is not decremented before peer cleanup, during error
handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to
out-of-bounds access in peer-&gt;rx_tid[].

Hence, add a decrement operation for TID, before peer cleanup to
ensures proper cleanup and prevents out-of-bounds access issues when
the RX peer frag setup fails.

Found during code review. Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39761/">CVE-2025-39761 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39761">CVE-2025-39761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249554">SUSE bug 1249554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249555">SUSE bug 1249555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39763</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39763" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39763" ref_url="https://www.suse.com/security/cve/CVE-2025-39763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: APEI: send SIGBUS to current task if synchronous memory error not recovered

If a synchronous error is detected as a result of user-space process
triggering a 2-bit uncorrected error, the CPU will take a synchronous
error exception such as Synchronous External Abort (SEA) on Arm64. The
kernel will queue a memory_failure() work which poisons the related
page, unmaps the page, and then sends a SIGBUS to the process, so that
a system wide panic can be avoided.

However, no memory_failure() work will be queued when abnormal
synchronous errors occur. These errors can include situations like
invalid PA, unexpected severity, no memory failure config support,
invalid GUID section, etc. In such a case, the user-space process will
trigger SEA again.  This loop can potentially exceed the platform
firmware threshold or even trigger a kernel hard lockup, leading to a
system reboot.

Fix it by performing a force kill if no memory_failure() work is queued
for synchronous errors.

[ rjw: Changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39763/">CVE-2025-39763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39763">CVE-2025-39763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249615">SUSE bug 1249615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39764</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39764" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39764" ref_url="https://www.suse.com/security/cve/CVE-2025-39764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: remove refcounting in expectation dumpers

Same pattern as previous patch: do not keep the expectation object
alive via refcount, only store a cookie value and then use that
as the skip hint for dump resumption.

AFAICS this has the same issue as the one resolved in the conntrack
dumper, when we do
  if (!refcount_inc_not_zero(&amp;exp-&gt;use))

to increment the refcount, there is a chance that exp == last, which
causes a double-increment of the refcount and subsequent memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39764/">CVE-2025-39764 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39764">CVE-2025-39764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249513">SUSE bug 1249513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39765</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39765" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39765" ref_url="https://www.suse.com/security/cve/CVE-2025-39765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: timer: fix ida_free call while not allocated

In the snd_utimer_create() function, if the kasprintf() function return
NULL, snd_utimer_put_id() will be called, finally use ida_free()
to free the unallocated id 0.

the syzkaller reported the following information:
  ------------[ cut here ]------------
  ida_free called for id=0 which is not allocated.
  WARNING: CPU: 1 PID: 1286 at lib/idr.c:592 ida_free+0x1fd/0x2f0 lib/idr.c:592
  Modules linked in:
  CPU: 1 UID: 0 PID: 1286 Comm: syz-executor164 Not tainted 6.15.8 #3 PREEMPT(lazy)
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-4.fc42 04/01/2014
  RIP: 0010:ida_free+0x1fd/0x2f0 lib/idr.c:592
  Code: f8 fc 41 83 fc 3e 76 69 e8 70 b2 f8 (...)
  RSP: 0018:ffffc900007f79c8 EFLAGS: 00010282
  RAX: 0000000000000000 RBX: 1ffff920000fef3b RCX: ffffffff872176a5
  RDX: ffff88800369d200 RSI: 0000000000000000 RDI: ffff88800369d200
  RBP: 0000000000000000 R08: ffffffff87ba60a5 R09: 0000000000000000
  R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
  R13: 0000000000000002 R14: 0000000000000000 R15: 0000000000000000
  FS:  00007f6f1abc1740(0000) GS:ffff8880d76a0000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f6f1ad7a784 CR3: 000000007a6e2000 CR4: 00000000000006f0
  Call Trace:
   &lt;TASK&gt;
   snd_utimer_put_id sound/core/timer.c:2043 [inline] [snd_timer]
   snd_utimer_create+0x59b/0x6a0 sound/core/timer.c:2184 [snd_timer]
   snd_utimer_ioctl_create sound/core/timer.c:2202 [inline] [snd_timer]
   __snd_timer_user_ioctl.isra.0+0x724/0x1340 sound/core/timer.c:2287 [snd_timer]
   snd_timer_user_ioctl+0x75/0xc0 sound/core/timer.c:2298 [snd_timer]
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:907 [inline]
   __se_sys_ioctl fs/ioctl.c:893 [inline]
   __x64_sys_ioctl+0x198/0x200 fs/ioctl.c:893
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0x7b/0x160 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
  [...]

The utimer-&gt;id should be set properly before the kasprintf() function,
ensures the snd_utimer_put_id() function will free the allocated id.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39765/">CVE-2025-39765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39765">CVE-2025-39765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249509">SUSE bug 1249509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39766</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39766" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39766" ref_url="https://www.suse.com/security/cve/CVE-2025-39766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit

The following setup can trigger a WARNING in htb_activate due to
the condition: !cl-&gt;leaf.q-&gt;q.qlen

tc qdisc del dev lo root
tc qdisc add dev lo root handle 1: htb default 1
tc class add dev lo parent 1: classid 1:1 \
       htb rate 64bit
tc qdisc add dev lo parent 1:1 handle f: \
       cake memlimit 1b
ping -I lo -f -c1 -s64 -W0.001 127.0.0.1

This is because the low memlimit leads to a low buffer_limit, which
causes packet dropping. However, cake_enqueue still returns
NET_XMIT_SUCCESS, causing htb_enqueue to call htb_activate with an
empty child qdisc. We should return NET_XMIT_CN when packets are
dropped from the same tin and flow.

I do not believe return value of NET_XMIT_CN is necessary for packet
drops in the case of ack filtering, as that is meant to optimize
performance, not to signal congestion.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39766/">CVE-2025-39766 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39766">CVE-2025-39766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249510">SUSE bug 1249510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39767</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39767" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39767" ref_url="https://www.suse.com/security/cve/CVE-2025-39767" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

LoongArch: Optimize module load time by optimizing PLT/GOT counting

When enabling CONFIG_KASAN, CONFIG_PREEMPT_VOLUNTARY_BUILD and
CONFIG_PREEMPT_VOLUNTARY at the same time, there will be soft deadlock,
the relevant logs are as follows:

rcu: INFO: rcu_sched self-detected stall on CPU
...
Call Trace:
[&lt;900000000024f9e4&gt;] show_stack+0x5c/0x180
[&lt;90000000002482f4&gt;] dump_stack_lvl+0x94/0xbc
[&lt;9000000000224544&gt;] rcu_dump_cpu_stacks+0x1fc/0x280
[&lt;900000000037ac80&gt;] rcu_sched_clock_irq+0x720/0xf88
[&lt;9000000000396c34&gt;] update_process_times+0xb4/0x150
[&lt;90000000003b2474&gt;] tick_nohz_handler+0xf4/0x250
[&lt;9000000000397e28&gt;] __hrtimer_run_queues+0x1d0/0x428
[&lt;9000000000399b2c&gt;] hrtimer_interrupt+0x214/0x538
[&lt;9000000000253634&gt;] constant_timer_interrupt+0x64/0x80
[&lt;9000000000349938&gt;] __handle_irq_event_percpu+0x78/0x1a0
[&lt;9000000000349a78&gt;] handle_irq_event_percpu+0x18/0x88
[&lt;9000000000354c00&gt;] handle_percpu_irq+0x90/0xf0
[&lt;9000000000348c74&gt;] handle_irq_desc+0x94/0xb8
[&lt;9000000001012b28&gt;] handle_cpu_irq+0x68/0xa0
[&lt;9000000001def8c0&gt;] handle_loongarch_irq+0x30/0x48
[&lt;9000000001def958&gt;] do_vint+0x80/0xd0
[&lt;9000000000268a0c&gt;] kasan_mem_to_shadow.part.0+0x2c/0x2a0
[&lt;90000000006344f4&gt;] __asan_load8+0x4c/0x120
[&lt;900000000025c0d0&gt;] module_frob_arch_sections+0x5c8/0x6b8
[&lt;90000000003895f0&gt;] load_module+0x9e0/0x2958
[&lt;900000000038b770&gt;] __do_sys_init_module+0x208/0x2d0
[&lt;9000000001df0c34&gt;] do_syscall+0x94/0x190
[&lt;900000000024d6fc&gt;] handle_syscall+0xbc/0x158

After analysis, this is because the slow speed of loading the amdgpu
module leads to the long time occupation of the cpu and then the soft
deadlock.

When loading a module, module_frob_arch_sections() tries to figure out
the number of PLTs/GOTs that will be needed to handle all the RELAs. It
will call the count_max_entries() to find in an out-of-order date which
counting algorithm has O(n^2) complexity.

To make it faster, we sort the relocation list by info and addend. That
way, to check for a duplicate relocation, it just needs to compare with
the previous entry. This reduces the complexity of the algorithm to O(n
 log n), as done in commit d4e0340919fb ("arm64/module: Optimize module
load time by optimizing PLT counting"). This gives sinificant reduction
in module load time for modules with large number of relocations.

After applying this patch, the soft deadlock problem has been solved,
and the kernel starts normally without "Call Trace".

Using the default configuration to test some modules, the results are as
follows:

Module              Size
ip_tables           36K
fat                 143K
radeon              2.5MB
amdgpu              16MB

Without this patch:
Module              Module load time (ms)	Count(PLTs/GOTs)
ip_tables           18				59/6
fat                 0				162/14
radeon              54				1221/84
amdgpu              1411			4525/1098

With this patch:
Module              Module load time (ms)	Count(PLTs/GOTs)
ip_tables           18				59/6
fat                 0				162/14
radeon              22				1221/84
amdgpu              45				4525/1098
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39767/">CVE-2025-39767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39767">CVE-2025-39767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249511">SUSE bug 1249511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39770</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39770" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39770" ref_url="https://www.suse.com/security/cve/CVE-2025-39770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM

When performing Generic Segmentation Offload (GSO) on an IPv6 packet that
contains extension headers, the kernel incorrectly requests checksum offload
if the egress device only advertises NETIF_F_IPV6_CSUM feature, which has
a strict contract: it supports checksum offload only for plain TCP or UDP
over IPv6 and explicitly does not support packets with extension headers.
The current GSO logic violates this contract by failing to disable the feature
for packets with extension headers, such as those used in GREoIPv6 tunnels.

This violation results in the device being asked to perform an operation
it cannot support, leading to a `skb_warn_bad_offload` warning and a collapse
of network throughput. While device TSO/USO is correctly bypassed in favor
of software GSO for these packets, the GSO stack must be explicitly told not
to request checksum offload.

Mask NETIF_F_IPV6_CSUM, NETIF_F_TSO6 and NETIF_F_GSO_UDP_L4
in gso_features_check if the IPv6 header contains extension headers to compute
checksum in software.

The exception is a BIG TCP extension, which, as stated in commit
68e068cabd2c6c53 ("net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets"):
"The feature is only enabled on devices that support BIG TCP TSO.
The header is only present for PF_PACKET taps like tcpdump,
and not transmitted by physical devices."

kernel log output (truncated):
WARNING: CPU: 1 PID: 5273 at net/core/dev.c:3535 skb_warn_bad_offload+0x81/0x140
...
Call Trace:
 &lt;TASK&gt;
 skb_checksum_help+0x12a/0x1f0
 validate_xmit_skb+0x1a3/0x2d0
 validate_xmit_skb_list+0x4f/0x80
 sch_direct_xmit+0x1a2/0x380
 __dev_xmit_skb+0x242/0x670
 __dev_queue_xmit+0x3fc/0x7f0
 ip6_finish_output2+0x25e/0x5d0
 ip6_finish_output+0x1fc/0x3f0
 ip6_tnl_xmit+0x608/0xc00 [ip6_tunnel]
 ip6gre_tunnel_xmit+0x1c0/0x390 [ip6_gre]
 dev_hard_start_xmit+0x63/0x1c0
 __dev_queue_xmit+0x6d0/0x7f0
 ip6_finish_output2+0x214/0x5d0
 ip6_finish_output+0x1fc/0x3f0
 ip6_xmit+0x2ca/0x6f0
 ip6_finish_output+0x1fc/0x3f0
 ip6_xmit+0x2ca/0x6f0
 inet6_csk_xmit+0xeb/0x150
 __tcp_transmit_skb+0x555/0xa80
 tcp_write_xmit+0x32a/0xe90
 tcp_sendmsg_locked+0x437/0x1110
 tcp_sendmsg+0x2f/0x50
...
skb linear:   00000000: e4 3d 1a 7d ec 30 e4 3d 1a 7e 5d 90 86 dd 60 0e
skb linear:   00000010: 00 0a 1b 34 3c 40 20 11 00 00 00 00 00 00 00 00
skb linear:   00000020: 00 00 00 00 00 12 20 11 00 00 00 00 00 00 00 00
skb linear:   00000030: 00 00 00 00 00 11 2f 00 04 01 04 01 01 00 00 00
skb linear:   00000040: 86 dd 60 0e 00 0a 1b 00 06 40 20 23 00 00 00 00
skb linear:   00000050: 00 00 00 00 00 00 00 00 00 12 20 23 00 00 00 00
skb linear:   00000060: 00 00 00 00 00 00 00 00 00 11 bf 96 14 51 13 f9
skb linear:   00000070: ae 27 a0 a8 2b e3 80 18 00 40 5b 6f 00 00 01 01
skb linear:   00000080: 08 0a 42 d4 50 d5 4b 70 f8 1a
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39770/">CVE-2025-39770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39770">CVE-2025-39770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249508">SUSE bug 1249508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39772</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39772" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39772" ref_url="https://www.suse.com/security/cve/CVE-2025-39772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/hisilicon/hibmc: fix the hibmc loaded failed bug

When hibmc loaded failed, the driver use hibmc_unload to free the
resource, but the mutexes in mode.config are not init, which will
access an NULL pointer. Just change goto statement to return, because
hibnc_hw_init() doesn't need to free anything.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39772/">CVE-2025-39772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39772">CVE-2025-39772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249506">SUSE bug 1249506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39773</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39773" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39773" ref_url="https://www.suse.com/security/cve/CVE-2025-39773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: fix soft lockup in br_multicast_query_expired()

When set multicast_query_interval to a large value, the local variable
'time' in br_multicast_send_query() may overflow. If the time is smaller
than jiffies, the timer will expire immediately, and then call mod_timer()
again, which creates a loop and may trigger the following soft lockup
issue.

  watchdog: BUG: soft lockup - CPU#1 stuck for 221s! [rb_consumer:66]
  CPU: 1 UID: 0 PID: 66 Comm: rb_consumer Not tainted 6.16.0+ #259 PREEMPT(none)
  Call Trace:
   &lt;IRQ&gt;
   __netdev_alloc_skb+0x2e/0x3a0
   br_ip6_multicast_alloc_query+0x212/0x1b70
   __br_multicast_send_query+0x376/0xac0
   br_multicast_send_query+0x299/0x510
   br_multicast_query_expired.constprop.0+0x16d/0x1b0
   call_timer_fn+0x3b/0x2a0
   __run_timers+0x619/0x950
   run_timer_softirq+0x11c/0x220
   handle_softirqs+0x18e/0x560
   __irq_exit_rcu+0x158/0x1a0
   sysvec_apic_timer_interrupt+0x76/0x90
   &lt;/IRQ&gt;

This issue can be reproduced with:
  ip link add br0 type bridge
  echo 1 &gt; /sys/class/net/br0/bridge/multicast_querier
  echo 0xffffffffffffffff &gt;
  	/sys/class/net/br0/bridge/multicast_query_interval
  ip link set dev br0 up

The multicast_startup_query_interval can also cause this issue. Similar to
the commit 99b40610956a ("net: bridge: mcast: add and enforce query
interval minimum"), add check for the query interval maximum to fix this
issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39773/">CVE-2025-39773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39773">CVE-2025-39773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249504">SUSE bug 1249504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39775</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39775" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39775" ref_url="https://www.suse.com/security/cve/CVE-2025-39775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/mremap: fix WARN with uffd that has remap events disabled

Registering userfaultd on a VMA that spans at least one PMD and then
mremap()'ing that VMA can trigger a WARN when recovering from a failed
page table move due to a page table allocation error.

The code ends up doing the right thing (recurse, avoiding moving actual
page tables), but triggering that WARN is unpleasant:

WARNING: CPU: 2 PID: 6133 at mm/mremap.c:357 move_normal_pmd mm/mremap.c:357 [inline]
WARNING: CPU: 2 PID: 6133 at mm/mremap.c:357 move_pgt_entry mm/mremap.c:595 [inline]
WARNING: CPU: 2 PID: 6133 at mm/mremap.c:357 move_page_tables+0x3832/0x44a0 mm/mremap.c:852
Modules linked in:
CPU: 2 UID: 0 PID: 6133 Comm: syz.0.19 Not tainted 6.17.0-rc1-syzkaller-00004-g53e760d89498 #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:move_normal_pmd mm/mremap.c:357 [inline]
RIP: 0010:move_pgt_entry mm/mremap.c:595 [inline]
RIP: 0010:move_page_tables+0x3832/0x44a0 mm/mremap.c:852
Code: ...
RSP: 0018:ffffc900037a76d8 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 0000000032930007 RCX: ffffffff820c6645
RDX: ffff88802e56a440 RSI: ffffffff820c7201 RDI: 0000000000000007
RBP: ffff888037728fc0 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000032930007 R11: 0000000000000000 R12: 0000000000000000
R13: ffffc900037a79a8 R14: 0000000000000001 R15: dffffc0000000000
FS:  000055556316a500(0000) GS:ffff8880d68bc000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b30863fff CR3: 0000000050171000 CR4: 0000000000352ef0
Call Trace:
 &lt;TASK&gt;
 copy_vma_and_data+0x468/0x790 mm/mremap.c:1215
 move_vma+0x548/0x1780 mm/mremap.c:1282
 mremap_to+0x1b7/0x450 mm/mremap.c:1406
 do_mremap+0xfad/0x1f80 mm/mremap.c:1921
 __do_sys_mremap+0x119/0x170 mm/mremap.c:1977
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f00d0b8ebe9
Code: ...
RSP: 002b:00007ffe5ea5ee98 EFLAGS: 00000246 ORIG_RAX: 0000000000000019
RAX: ffffffffffffffda RBX: 00007f00d0db5fa0 RCX: 00007f00d0b8ebe9
RDX: 0000000000400000 RSI: 0000000000c00000 RDI: 0000200000000000
RBP: 00007ffe5ea5eef0 R08: 0000200000c00000 R09: 0000000000000000
R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002
R13: 00007f00d0db5fa0 R14: 00007f00d0db5fa0 R15: 0000000000000005
 &lt;/TASK&gt;

The underlying issue is that we recurse during the original page table
move, but not during the recovery move.

Fix it by checking for both VMAs and performing the check before the
pmd_none() sanity check.

Add a new helper where we perform+document that check for the PMD and PUD
level.

Thanks to Harry for bisecting.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39775/">CVE-2025-39775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39775">CVE-2025-39775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249500">SUSE bug 1249500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39779</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39779" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39779" ref_url="https://www.suse.com/security/cve/CVE-2025-39779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: subpage: keep TOWRITE tag until folio is cleaned

btrfs_subpage_set_writeback() calls folio_start_writeback() the first time
a folio is written back, and it also clears the PAGECACHE_TAG_TOWRITE tag
even if there are still dirty blocks in the folio. This can break ordering
guarantees, such as those required by btrfs_wait_ordered_extents().

That ordering breakage leads to a real failure. For example, running
generic/464 on a zoned setup will hit the following ASSERT. This happens
because the broken ordering fails to flush existing dirty pages before the
file size is truncated.

  assertion failed: !list_empty(&amp;ordered-&gt;list) :: 0, in fs/btrfs/zoned.c:1899
  ------------[ cut here ]------------
  kernel BUG at fs/btrfs/zoned.c:1899!
  Oops: invalid opcode: 0000 [#1] SMP NOPTI
  CPU: 2 UID: 0 PID: 1906169 Comm: kworker/u130:2 Kdump: loaded Not tainted 6.16.0-rc6-BTRFS-ZNS+ #554 PREEMPT(voluntary)
  Hardware name: Supermicro Super Server/H12SSL-NT, BIOS 2.0 02/22/2021
  Workqueue: btrfs-endio-write btrfs_work_helper [btrfs]
  RIP: 0010:btrfs_finish_ordered_zoned.cold+0x50/0x52 [btrfs]
  RSP: 0018:ffffc9002efdbd60 EFLAGS: 00010246
  RAX: 000000000000004c RBX: ffff88811923c4e0 RCX: 0000000000000000
  RDX: 0000000000000000 RSI: ffffffff827e38b1 RDI: 00000000ffffffff
  RBP: ffff88810005d000 R08: 00000000ffffdfff R09: ffffffff831051c8
  R10: ffffffff83055220 R11: 0000000000000000 R12: ffff8881c2458c00
  R13: ffff88811923c540 R14: ffff88811923c5e8 R15: ffff8881c1bd9680
  FS:  0000000000000000(0000) GS:ffff88a04acd0000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f907c7a918c CR3: 0000000004024000 CR4: 0000000000350ef0
  Call Trace:
   &lt;TASK&gt;
   ? srso_return_thunk+0x5/0x5f
   btrfs_finish_ordered_io+0x4a/0x60 [btrfs]
   btrfs_work_helper+0xf9/0x490 [btrfs]
   process_one_work+0x204/0x590
   ? srso_return_thunk+0x5/0x5f
   worker_thread+0x1d6/0x3d0
   ? __pfx_worker_thread+0x10/0x10
   kthread+0x118/0x230
   ? __pfx_kthread+0x10/0x10
   ret_from_fork+0x205/0x260
   ? __pfx_kthread+0x10/0x10
   ret_from_fork_asm+0x1a/0x30
   &lt;/TASK&gt;

Consider process A calling writepages() with WB_SYNC_NONE. In zoned mode or
for compressed writes, it locks several folios for delalloc and starts
writing them out. Let's call the last locked folio folio X. Suppose the
write range only partially covers folio X, leaving some pages dirty.
Process A calls btrfs_subpage_set_writeback() when building a bio. This
function call clears the TOWRITE tag of folio X, whose size = 8K and
the block size = 4K. It is following state.

   0     4K    8K
   |/////|/////|  (flag: DIRTY, tag: DIRTY)
   &lt;-----&gt; Process A will write this range.

Now suppose process B concurrently calls writepages() with WB_SYNC_ALL. It
calls tag_pages_for_writeback() to tag dirty folios with
PAGECACHE_TAG_TOWRITE. Since folio X is still dirty, it gets tagged. Then,
B collects tagged folios using filemap_get_folios_tag() and must wait for
folio X to be written before returning from writepages().

   0     4K    8K
   |/////|/////|  (flag: DIRTY, tag: DIRTY|TOWRITE)

However, between tagging and collecting, process A may call
btrfs_subpage_set_writeback() and clear folio X's TOWRITE tag.
   0     4K    8K
   |     |/////|  (flag: DIRTY|WRITEBACK, tag: DIRTY)

As a result, process B won't see folio X in its batch, and returns without
waiting for it. This breaks the WB_SYNC_ALL ordering requirement.

Fix this by using btrfs_subpage_set_writeback_keepwrite(), which retains
the TOWRITE tag. We now manually clear the tag only after the folio becomes
clean, via the xas operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39779/">CVE-2025-39779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39779">CVE-2025-39779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249495">SUSE bug 1249495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39780</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39780" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39780" ref_url="https://www.suse.com/security/cve/CVE-2025-39780" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/ext: Fix invalid task state transitions on class switch

When enabling a sched_ext scheduler, we may trigger invalid task state
transitions, resulting in warnings like the following (which can be
easily reproduced by running the hotplug selftest in a loop):

 sched_ext: Invalid task state transition 0 -&gt; 3 for fish[770]
 WARNING: CPU: 18 PID: 787 at kernel/sched/ext.c:3862 scx_set_task_state+0x7c/0xc0
 ...
 RIP: 0010:scx_set_task_state+0x7c/0xc0
 ...
 Call Trace:
  &lt;TASK&gt;
  scx_enable_task+0x11f/0x2e0
  switching_to_scx+0x24/0x110
  scx_enable.isra.0+0xd14/0x13d0
  bpf_struct_ops_link_create+0x136/0x1a0
  __sys_bpf+0x1edd/0x2c30
  __x64_sys_bpf+0x21/0x30
  do_syscall_64+0xbb/0x370
  entry_SYSCALL_64_after_hwframe+0x77/0x7f

This happens because we skip initialization for tasks that are already
dead (with their usage counter set to zero), but we don't exclude them
during the scheduling class transition phase.

Fix this by also skipping dead tasks during class swiching, preventing
invalid task state transitions.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39780/">CVE-2025-39780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39780">CVE-2025-39780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249496">SUSE bug 1249496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39782</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39782" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39782" ref_url="https://www.suse.com/security/cve/CVE-2025-39782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jbd2: prevent softlockup in jbd2_log_do_checkpoint()

Both jbd2_log_do_checkpoint() and jbd2_journal_shrink_checkpoint_list()
periodically release j_list_lock after processing a batch of buffers to
avoid long hold times on the j_list_lock. However, since both functions
contend for j_list_lock, the combined time spent waiting and processing
can be significant.

jbd2_journal_shrink_checkpoint_list() explicitly calls cond_resched() when
need_resched() is true to avoid softlockups during prolonged operations.
But jbd2_log_do_checkpoint() only exits its loop when need_resched() is
true, relying on potentially sleeping functions like __flush_batch() or
wait_on_buffer() to trigger rescheduling. If those functions do not sleep,
the kernel may hit a softlockup.

watchdog: BUG: soft lockup - CPU#3 stuck for 156s! [kworker/u129:2:373]
CPU: 3 PID: 373 Comm: kworker/u129:2 Kdump: loaded Not tainted 6.6.0+ #10
Hardware name: Huawei TaiShan 2280 /BC11SPCD, BIOS 1.27 06/13/2017
Workqueue: writeback wb_workfn (flush-7:2)
pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : native_queued_spin_lock_slowpath+0x358/0x418
lr : jbd2_log_do_checkpoint+0x31c/0x438 [jbd2]
Call trace:
 native_queued_spin_lock_slowpath+0x358/0x418
 jbd2_log_do_checkpoint+0x31c/0x438 [jbd2]
 __jbd2_log_wait_for_space+0xfc/0x2f8 [jbd2]
 add_transaction_credits+0x3bc/0x418 [jbd2]
 start_this_handle+0xf8/0x560 [jbd2]
 jbd2__journal_start+0x118/0x228 [jbd2]
 __ext4_journal_start_sb+0x110/0x188 [ext4]
 ext4_do_writepages+0x3dc/0x740 [ext4]
 ext4_writepages+0xa4/0x190 [ext4]
 do_writepages+0x94/0x228
 __writeback_single_inode+0x48/0x318
 writeback_sb_inodes+0x204/0x590
 __writeback_inodes_wb+0x54/0xf8
 wb_writeback+0x2cc/0x3d8
 wb_do_writeback+0x2e0/0x2f8
 wb_workfn+0x80/0x2a8
 process_one_work+0x178/0x3e8
 worker_thread+0x234/0x3b8
 kthread+0xf0/0x108
 ret_from_fork+0x10/0x20

So explicitly call cond_resched() in jbd2_log_do_checkpoint() to avoid
softlockup.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39782/">CVE-2025-39782 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39782">CVE-2025-39782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249526">SUSE bug 1249526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39783</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39783" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39783" ref_url="https://www.suse.com/security/cve/CVE-2025-39783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: Fix configfs group list head handling

Doing a list_del() on the epf_group field of struct pci_epf_driver in
pci_epf_remove_cfs() is not correct as this field is a list head, not
a list entry. This list_del() call triggers a KASAN warning when an
endpoint function driver which has a configfs attribute group is torn
down:

==================================================================
BUG: KASAN: slab-use-after-free in pci_epf_remove_cfs+0x17c/0x198
Write of size 8 at addr ffff00010f4a0d80 by task rmmod/319

CPU: 3 UID: 0 PID: 319 Comm: rmmod Not tainted 6.16.0-rc2 #1 NONE
Hardware name: Radxa ROCK 5B (DT)
Call trace:
show_stack+0x2c/0x84 (C)
dump_stack_lvl+0x70/0x98
print_report+0x17c/0x538
kasan_report+0xb8/0x190
__asan_report_store8_noabort+0x20/0x2c
pci_epf_remove_cfs+0x17c/0x198
pci_epf_unregister_driver+0x18/0x30
nvmet_pci_epf_cleanup_module+0x24/0x30 [nvmet_pci_epf]
__arm64_sys_delete_module+0x264/0x424
invoke_syscall+0x70/0x260
el0_svc_common.constprop.0+0xac/0x230
do_el0_svc+0x40/0x58
el0_svc+0x48/0xdc
el0t_64_sync_handler+0x10c/0x138
el0t_64_sync+0x198/0x19c
...

Remove this incorrect list_del() call from pci_epf_remove_cfs().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39783/">CVE-2025-39783 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39783">CVE-2025-39783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249486">SUSE bug 1249486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39787</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39787" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39787" ref_url="https://www.suse.com/security/cve/CVE-2025-39787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: mdt_loader: Ensure we don't read past the ELF header

When the MDT loader is used in remoteproc, the ELF header is sanitized
beforehand, but that's not necessary the case for other clients.

Validate the size of the firmware buffer to ensure that we don't read
past the end as we iterate over the header. e_phentsize and e_shentsize
are validated as well, to ensure that the assumptions about step size in
the traversal are valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39787/">CVE-2025-39787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39787">CVE-2025-39787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249545">SUSE bug 1249545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39788</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39788" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39788" ref_url="https://www.suse.com/security/cve/CVE-2025-39788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE

On Google gs101, the number of UTP transfer request slots (nutrs) is 32,
and in this case the driver ends up programming the UTRL_NEXUS_TYPE
incorrectly as 0.

This is because the left hand side of the shift is 1, which is of type
int, i.e. 31 bits wide. Shifting by more than that width results in
undefined behaviour.

Fix this by switching to the BIT() macro, which applies correct type
casting as required. This ensures the correct value is written to
UTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift
warning:

    UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21
    shift exponent 32 is too large for 32-bit type 'int'

For consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE
write.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39788/">CVE-2025-39788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39788">CVE-2025-39788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249547">SUSE bug 1249547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39790</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39790" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39790" ref_url="https://www.suse.com/security/cve/CVE-2025-39790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: mhi: host: Detect events pointing to unexpected TREs

When a remote device sends a completion event to the host, it contains a
pointer to the consumed TRE. The host uses this pointer to process all of
the TREs between it and the host's local copy of the ring's read pointer.
This works when processing completion for chained transactions, but can
lead to nasty results if the device sends an event for a single-element
transaction with a read pointer that is multiple elements ahead of the
host's read pointer.

For instance, if the host accesses an event ring while the device is
updating it, the pointer inside of the event might still point to an old
TRE. If the host uses the channel's xfer_cb() to directly free the buffer
pointed to by the TRE, the buffer will be double-freed.

This behavior was observed on an ep that used upstream EP stack without
'commit 6f18d174b73d ("bus: mhi: ep: Update read pointer only after buffer
is written")'. Where the device updated the events ring pointer before
updating the event contents, so it left a window where the host was able to
access the stale data the event pointed to, before the device had the
chance to update them. The usual pattern was that the host received an
event pointing to a TRE that is not immediately after the last processed
one, so it got treated as if it was a chained transaction, processing all
of the TREs in between the two read pointers.

This commit aims to harden the host by ensuring transactions where the
event points to a TRE that isn't local_rp + 1 are chained.

[mani: added stable tag and reworded commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39790/">CVE-2025-39790 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39790">CVE-2025-39790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249548">SUSE bug 1249548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249549">SUSE bug 1249549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39791</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39791" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39791" ref_url="https://www.suse.com/security/cve/CVE-2025-39791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: dm-crypt: Do not partially accept write BIOs with zoned targets

Read and write operations issued to a dm-crypt target may be split
according to the dm-crypt internal limits defined by the max_read_size
and max_write_size module parameters (default is 128 KB). The intent is
to improve processing time of large BIOs by splitting them into smaller
operations that can be parallelized on different CPUs.

For zoned dm-crypt targets, this BIO splitting is still done but without
the parallel execution to ensure that the issuing order of write
operations to the underlying devices remains sequential. However, the
splitting itself causes other problems:

1) Since dm-crypt relies on the block layer zone write plugging to
   handle zone append emulation using regular write operations, the
   reminder of a split write BIO will always be plugged into the target
   zone write plugged. Once the on-going write BIO finishes, this
   reminder BIO is unplugged and issued from the zone write plug work.
   If this reminder BIO itself needs to be split, the reminder will be
   re-issued and plugged again, but that causes a call to a
   blk_queue_enter(), which may block if a queue freeze operation was
   initiated. This results in a deadlock as DM submission still holds
   BIOs that the queue freeze side is waiting for.

2) dm-crypt relies on the emulation done by the block layer using
   regular write operations for processing zone append operations. This
   still requires to properly return the written sector as the BIO
   sector of the original BIO. However, this can be done correctly only
   and only if there is a single clone BIO used for processing the
   original zone append operation issued by the user. If the size of a
   zone append operation is larger than dm-crypt max_write_size, then
   the orginal BIO will be split and processed as a chain of regular
   write operations. Such chaining result in an incorrect written sector
   being returned to the zone append issuer using the original BIO
   sector.  This in turn results in file system data corruptions using
   xfs or btrfs.

Fix this by modifying get_max_request_size() to always return the size
of the BIO to avoid it being split with dm_accpet_partial_bio() in
crypt_map(). get_max_request_size() is renamed to
get_max_request_sectors() to clarify the unit of the value returned
and its interface is changed to take a struct dm_target pointer and a
pointer to the struct bio being processed. In addition to this change,
to ensure that crypt_alloc_buffer() works correctly, set the dm-crypt
device max_hw_sectors limit to be at most
BIO_MAX_VECS &lt;&lt; PAGE_SECTORS_SHIFT (1 MB with a 4KB page architecture).
This forces DM core to split write BIOs before passing them to
crypt_map(), and thus guaranteeing that dm-crypt can always accept an
entire write BIO without needing to split it.

This change does not have any effect on the read path of dm-crypt. Read
operations can still be split and the BIO fragments processed in
parallel. There is also no impact on the performance of the write path
given that all zone write BIOs were already processed inline instead of
in parallel.

This change also does not affect in any way regular dm-crypt block
devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39791/">CVE-2025-39791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39791">CVE-2025-39791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249550">SUSE bug 1249550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39792</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39792" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39792" ref_url="https://www.suse.com/security/cve/CVE-2025-39792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: Always split write BIOs to zoned device limits

Any zoned DM target that requires zone append emulation will use the
block layer zone write plugging. In such case, DM target drivers must
not split BIOs using dm_accept_partial_bio() as doing so can potentially
lead to deadlocks with queue freeze operations. Regular write operations
used to emulate zone append operations also cannot be split by the
target driver as that would result in an invalid writen sector value
return using the BIO sector.

In order for zoned DM target drivers to avoid such incorrect BIO
splitting, we must ensure that large BIOs are split before being passed
to the map() function of the target, thus guaranteeing that the
limits for the mapped device are not exceeded.

dm-crypt and dm-flakey are the only target drivers supporting zoned
devices and using dm_accept_partial_bio().

In the case of dm-crypt, this function is used to split BIOs to the
internal max_write_size limit (which will be suppressed in a different
patch). However, since crypt_alloc_buffer() uses a bioset allowing only
up to BIO_MAX_VECS (256) vectors in a BIO. The dm-crypt device
max_segments limit, which is not set and so default to BLK_MAX_SEGMENTS
(128), must thus be respected and write BIOs split accordingly.

In the case of dm-flakey, since zone append emulation is not required,
the block layer zone write plugging is not used and no splitting of BIOs
required.

Modify the function dm_zone_bio_needs_split() to use the block layer
helper function bio_needs_zone_write_plugging() to force a call to
bio_split_to_limits() in dm_split_and_process_bio(). This allows DM
target drivers to avoid using dm_accept_partial_bio() for write
operations on zoned DM devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39792/">CVE-2025-39792 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39792">CVE-2025-39792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249618">SUSE bug 1249618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39795</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39795" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39795" ref_url="https://www.suse.com/security/cve/CVE-2025-39795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: avoid possible overflow for chunk_sectors check in blk_stack_limits()

In blk_stack_limits(), we check that the t-&gt;chunk_sectors value is a
multiple of the t-&gt;physical_block_size value.

However, by finding the chunk_sectors value in bytes, we may overflow
the unsigned int which holds chunk_sectors, so change the check to be
based on sectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39795/">CVE-2025-39795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39795">CVE-2025-39795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249609">SUSE bug 1249609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39797</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39797" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39797" ref_url="https://www.suse.com/security/cve/CVE-2025-39797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: Duplicate SPI Handling

The issue originates when Strongswan initiates an XFRM_MSG_ALLOCSPI
Netlink message, which triggers the kernel function xfrm_alloc_spi().
This function is expected to ensure uniqueness of the Security Parameter
Index (SPI) for inbound Security Associations (SAs). However, it can
return success even when the requested SPI is already in use, leading
to duplicate SPIs assigned to multiple inbound SAs, differentiated
only by their destination addresses.

This behavior causes inconsistencies during SPI lookups for inbound packets.
Since the lookup may return an arbitrary SA among those with the same SPI,
packet processing can fail, resulting in packet drops.

According to RFC 4301 section 4.4.2 , for inbound processing a unicast SA
is uniquely identified by the SPI and optionally protocol.

Reproducing the Issue Reliably:
To consistently reproduce the problem, restrict the available SPI range in
charon.conf : spi_min = 0x10000000 spi_max = 0x10000002
This limits the system to only 2 usable SPI values.
Next, create more than 2 Child SA. each using unique pair of src/dst address.
As soon as the 3rd Child SA is initiated, it will be assigned a duplicate
SPI, since the SPI pool is already exhausted.
With a narrow SPI range, the issue is consistently reproducible.
With a broader/default range, it becomes rare and unpredictable.

Current implementation:
xfrm_spi_hash() lookup function computes hash using daddr, proto, and family.
So if two SAs have the same SPI but different destination addresses, then
they will:
a. Hash into different buckets
b. Be stored in different linked lists (byspi + h)
c. Not be seen in the same hlist_for_each_entry_rcu() iteration.
As a result, the lookup will result in NULL and kernel allows that Duplicate SPI

Proposed Change:
xfrm_state_lookup_spi_proto() does a truly global search - across all states,
regardless of hash bucket and matches SPI and proto.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39797/">CVE-2025-39797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39797">CVE-2025-39797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249608">SUSE bug 1249608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39798</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39798" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39798" ref_url="https://www.suse.com/security/cve/CVE-2025-39798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix the setting of capabilities when automounting a new filesystem

Capabilities cannot be inherited when we cross into a new filesystem.
They need to be reset to the minimal defaults, and then probed for
again.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39798/">CVE-2025-39798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39798">CVE-2025-39798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249774">SUSE bug 1249774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39800</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39800" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39800" ref_url="https://www.suse.com/security/cve/CVE-2025-39800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: abort transaction on unexpected eb generation at btrfs_copy_root()

If we find an unexpected generation for the extent buffer we are cloning
at btrfs_copy_root(), we just WARN_ON() and don't error out and abort the
transaction, meaning we allow to persist metadata with an unexpected
generation. Instead of warning only, abort the transaction and return
-EUCLEAN.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39800/">CVE-2025-39800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39800">CVE-2025-39800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250177">SUSE bug 1250177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39801</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39801" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39801" ref_url="https://www.suse.com/security/cve/CVE-2025-39801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: Remove WARN_ON for device endpoint command timeouts

This commit addresses a rarely observed endpoint command timeout
which causes kernel panic due to warn when 'panic_on_warn' is enabled
and unnecessary call trace prints when 'panic_on_warn' is disabled.
It is seen during fast software-controlled connect/disconnect testcases.
The following is one such endpoint command timeout that we observed:

1. Connect
   =======
-&gt;dwc3_thread_interrupt
 -&gt;dwc3_ep0_interrupt
  -&gt;configfs_composite_setup
   -&gt;composite_setup
    -&gt;usb_ep_queue
     -&gt;dwc3_gadget_ep0_queue
      -&gt;__dwc3_gadget_ep0_queue
       -&gt;__dwc3_ep0_do_control_data
        -&gt;dwc3_send_gadget_ep_cmd

2. Disconnect
   ==========
-&gt;dwc3_thread_interrupt
 -&gt;dwc3_gadget_disconnect_interrupt
  -&gt;dwc3_ep0_reset_state
   -&gt;dwc3_ep0_end_control_data
    -&gt;dwc3_send_gadget_ep_cmd

In the issue scenario, in Exynos platforms, we observed that control
transfers for the previous connect have not yet been completed and end
transfer command sent as a part of the disconnect sequence and
processing of USB_ENDPOINT_HALT feature request from the host timeout.
This maybe an expected scenario since the controller is processing EP
commands sent as a part of the previous connect. It maybe better to
remove WARN_ON in all places where device endpoint commands are sent to
avoid unnecessary kernel panic due to warn.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39801/">CVE-2025-39801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39801">CVE-2025-39801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250450">SUSE bug 1250450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39805</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39805" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39805" ref_url="https://www.suse.com/security/cve/CVE-2025-39805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: macb: fix unregister_netdev call order in macb_remove()

When removing a macb device, the driver calls phy_exit() before
unregister_netdev(). This leads to a WARN from kernfs:

  ------------[ cut here ]------------
  kernfs: can not remove 'attached_dev', no directory
  WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683
  Call trace:
    kernfs_remove_by_name_ns+0xd8/0xf0
    sysfs_remove_link+0x24/0x58
    phy_detach+0x5c/0x168
    phy_disconnect+0x4c/0x70
    phylink_disconnect_phy+0x6c/0xc0 [phylink]
    macb_close+0x6c/0x170 [macb]
    ...
    macb_remove+0x60/0x168 [macb]
    platform_remove+0x5c/0x80
    ...

The warning happens because the PHY is being exited while the netdev
is still registered. The correct order is to unregister the netdev
before shutting down the PHY and cleaning up the MDIO bus.

Fix this by moving unregister_netdev() ahead of phy_exit() in
macb_remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39805/">CVE-2025-39805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39805">CVE-2025-39805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249982">SUSE bug 1249982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39806</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39806" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39806" ref_url="https://www.suse.com/security/cve/CVE-2025-39806" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0445" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: multitouch: fix slab out-of-bounds access in mt_report_fixup()

A malicious HID device can trigger a slab out-of-bounds during
mt_report_fixup() by passing in report descriptor smaller than
607 bytes. mt_report_fixup() attempts to patch byte offset 607
of the descriptor with 0x25 by first checking if byte offset
607 is 0x15 however it lacks bounds checks to verify if the
descriptor is big enough before conducting this check. Fix
this bug by ensuring the descriptor size is at least 608
bytes before accessing it.

Below is the KASAN splat after the out of bounds access happens:

[   13.671954] ==================================================================
[   13.672667] BUG: KASAN: slab-out-of-bounds in mt_report_fixup+0x103/0x110
[   13.673297] Read of size 1 at addr ffff888103df39df by task kworker/0:1/10
[   13.673297]
[   13.673297] CPU: 0 UID: 0 PID: 10 Comm: kworker/0:1 Not tainted 6.15.0-00005-gec5d573d83f4-dirty #3
[   13.673297] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/04
[   13.673297] Call Trace:
[   13.673297]  &lt;TASK&gt;
[   13.673297]  dump_stack_lvl+0x5f/0x80
[   13.673297]  print_report+0xd1/0x660
[   13.673297]  kasan_report+0xe5/0x120
[   13.673297]  __asan_report_load1_noabort+0x18/0x20
[   13.673297]  mt_report_fixup+0x103/0x110
[   13.673297]  hid_open_report+0x1ef/0x810
[   13.673297]  mt_probe+0x422/0x960
[   13.673297]  hid_device_probe+0x2e2/0x6f0
[   13.673297]  really_probe+0x1c6/0x6b0
[   13.673297]  __driver_probe_device+0x24f/0x310
[   13.673297]  driver_probe_device+0x4e/0x220
[   13.673297]  __device_attach_driver+0x169/0x320
[   13.673297]  bus_for_each_drv+0x11d/0x1b0
[   13.673297]  __device_attach+0x1b8/0x3e0
[   13.673297]  device_initial_probe+0x12/0x20
[   13.673297]  bus_probe_device+0x13d/0x180
[   13.673297]  device_add+0xe3a/0x1670
[   13.673297]  hid_add_device+0x31d/0xa40
[...]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39806/">CVE-2025-39806 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39806">CVE-2025-39806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249888">SUSE bug 1249888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39807</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39807" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39807" ref_url="https://www.suse.com/security/cve/CVE-2025-39807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: Add error handling for old state CRTC in atomic_disable

Introduce error handling to address an issue where, after a hotplug
event, the cursor continues to update. This situation can lead to a
kernel panic due to accessing the NULL `old_state-&gt;crtc`.

E,g.
Unable to handle kernel NULL pointer dereference at virtual address
Call trace:
 mtk_crtc_plane_disable+0x24/0x140
 mtk_plane_atomic_update+0x8c/0xa8
 drm_atomic_helper_commit_planes+0x114/0x2c8
 drm_atomic_helper_commit_tail_rpm+0x4c/0x158
 commit_tail+0xa0/0x168
 drm_atomic_helper_commit+0x110/0x120
 drm_atomic_commit+0x8c/0xe0
 drm_atomic_helper_update_plane+0xd4/0x128
 __setplane_atomic+0xcc/0x110
 drm_mode_cursor_common+0x250/0x440
 drm_mode_cursor_ioctl+0x44/0x70
 drm_ioctl+0x264/0x5d8
 __arm64_sys_ioctl+0xd8/0x510
 invoke_syscall+0x6c/0xe0
 do_el0_svc+0x68/0xe8
 el0_svc+0x34/0x60
 el0t_64_sync_handler+0x1c/0xf8
 el0t_64_sync+0x180/0x188

Adding NULL pointer checks to ensure stability by preventing operations
on an invalid CRTC state.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39807/">CVE-2025-39807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39807">CVE-2025-39807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249887">SUSE bug 1249887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39808</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39808" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39808" ref_url="https://www.suse.com/security/cve/CVE-2025-39808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version()

in ntrig_report_version(), hdev parameter passed from hid_probe().
sending descriptor to /dev/uhid can make hdev-&gt;dev.parent-&gt;parent to null
if hdev-&gt;dev.parent-&gt;parent is null, usb_dev has
invalid address(0xffffffffffffff58) that hid_to_usb_dev(hdev) returned
when usb_rcvctrlpipe() use usb_dev,it trigger
page fault error for address(0xffffffffffffff58)

add null check logic to ntrig_report_version()
before calling hid_to_usb_dev()
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39808/">CVE-2025-39808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39808">CVE-2025-39808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250088">SUSE bug 1250088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39810</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39810" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39810" ref_url="https://www.suse.com/security/cve/CVE-2025-39810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Fix memory corruption when FW resources change during ifdown

bnxt_set_dflt_rings() assumes that it is always called before any TC has
been created.  So it doesn't take bp-&gt;num_tc into account and assumes
that it is always 0 or 1.

In the FW resource or capability change scenario, the FW will return
flags in bnxt_hwrm_if_change() that will cause the driver to
reinitialize and call bnxt_cancel_reservations().  This will lead to
bnxt_init_dflt_ring_mode() calling bnxt_set_dflt_rings() and bp-&gt;num_tc
may be greater than 1.  This will cause bp-&gt;tx_ring[] to be sized too
small and cause memory corruption in bnxt_alloc_cp_rings().

Fix it by properly scaling the TX rings by bp-&gt;num_tc in the code
paths mentioned above.  Add 2 helper functions to determine
bp-&gt;tx_nr_rings and bp-&gt;tx_nr_rings_per_tc.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39810/">CVE-2025-39810 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39810">CVE-2025-39810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249975">SUSE bug 1249975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39811</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39811" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39811" ref_url="https://www.suse.com/security/cve/CVE-2025-39811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/vm: Clear the scratch_pt pointer on error

Avoid triggering a dereference of an error pointer on cleanup in
xe_vm_free_scratch() by clearing any scratch_pt error pointer.

(cherry picked from commit 358ee50ab565f3c8ea32480e9d03127a81ba32f8)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39811/">CVE-2025-39811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39811">CVE-2025-39811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249915">SUSE bug 1249915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39812</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39812" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39812" ref_url="https://www.suse.com/security/cve/CVE-2025-39812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: initialize more fields in sctp_v6_from_sk()

syzbot found that sin6_scope_id was not properly initialized,
leading to undefined behavior.

Clear sin6_scope_id and sin6_flowinfo.

BUG: KMSAN: uninit-value in __sctp_v6_cmp_addr+0x887/0x8c0 net/sctp/ipv6.c:649
  __sctp_v6_cmp_addr+0x887/0x8c0 net/sctp/ipv6.c:649
  sctp_inet6_cmp_addr+0x4f2/0x510 net/sctp/ipv6.c:983
  sctp_bind_addr_conflict+0x22a/0x3b0 net/sctp/bind_addr.c:390
  sctp_get_port_local+0x21eb/0x2440 net/sctp/socket.c:8452
  sctp_get_port net/sctp/socket.c:8523 [inline]
  sctp_listen_start net/sctp/socket.c:8567 [inline]
  sctp_inet_listen+0x710/0xfd0 net/sctp/socket.c:8636
  __sys_listen_socket net/socket.c:1912 [inline]
  __sys_listen net/socket.c:1927 [inline]
  __do_sys_listen net/socket.c:1932 [inline]
  __se_sys_listen net/socket.c:1930 [inline]
  __x64_sys_listen+0x343/0x4c0 net/socket.c:1930
  x64_sys_call+0x271d/0x3e20 arch/x86/include/generated/asm/syscalls_64.h:51
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Local variable addr.i.i created at:
  sctp_get_port net/sctp/socket.c:8515 [inline]
  sctp_listen_start net/sctp/socket.c:8567 [inline]
  sctp_inet_listen+0x650/0xfd0 net/sctp/socket.c:8636
  __sys_listen_socket net/socket.c:1912 [inline]
  __sys_listen net/socket.c:1927 [inline]
  __do_sys_listen net/socket.c:1932 [inline]
  __se_sys_listen net/socket.c:1930 [inline]
  __x64_sys_listen+0x343/0x4c0 net/socket.c:1930
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39812/">CVE-2025-39812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39812">CVE-2025-39812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250202">SUSE bug 1250202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39813</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39813" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39813" ref_url="https://www.suse.com/security/cve/CVE-2025-39813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ftrace: Fix potential warning in trace_printk_seq during ftrace_dump

When calling ftrace_dump_one() concurrently with reading trace_pipe,
a WARN_ON_ONCE() in trace_printk_seq() can be triggered due to a race
condition.

The issue occurs because:

CPU0 (ftrace_dump)                              CPU1 (reader)
echo z &gt; /proc/sysrq-trigger

!trace_empty(&amp;iter)
trace_iterator_reset(&amp;iter) &lt;- len = size = 0
                                                cat /sys/kernel/tracing/trace_pipe
trace_find_next_entry_inc(&amp;iter)
  __find_next_entry
    ring_buffer_empty_cpu &lt;- all empty
  return NULL

trace_printk_seq(&amp;iter.seq)
  WARN_ON_ONCE(s-&gt;seq.len &gt;= s-&gt;seq.size)

In the context between trace_empty() and trace_find_next_entry_inc()
during ftrace_dump, the ring buffer data was consumed by other readers.
This caused trace_find_next_entry_inc to return NULL, failing to populate
`iter.seq`. At this point, due to the prior trace_iterator_reset, both
`iter.seq.len` and `iter.seq.size` were set to 0. Since they are equal,
the WARN_ON_ONCE condition is triggered.

Move the trace_printk_seq() into the if block that checks to make sure the
return value of trace_find_next_entry_inc() is non-NULL in
ftrace_dump_one(), ensuring the 'iter.seq' is properly populated before
subsequent operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39813/">CVE-2025-39813 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39813">CVE-2025-39813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250032">SUSE bug 1250032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39814</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39814" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39814" ref_url="https://www.suse.com/security/cve/CVE-2025-39814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix NULL pointer dereference in ice_unplug_aux_dev() on reset

Issuing a reset when the driver is loaded without RDMA support, will
results in a crash as it attempts to remove RDMA's non-existent auxbus
device:
echo 1 &gt; /sys/class/net/&lt;if&gt;/device/reset

BUG: kernel NULL pointer dereference, address: 0000000000000008
...
RIP: 0010:ice_unplug_aux_dev+0x29/0x70 [ice]
...
Call Trace:
&lt;TASK&gt;
ice_prepare_for_reset+0x77/0x260 [ice]
pci_dev_save_and_disable+0x2c/0x70
pci_reset_function+0x88/0x130
reset_store+0x5a/0xa0
kernfs_fop_write_iter+0x15e/0x210
vfs_write+0x273/0x520
ksys_write+0x6b/0xe0
do_syscall_64+0x79/0x3b0
entry_SYSCALL_64_after_hwframe+0x76/0x7e

ice_unplug_aux_dev() checks pf-&gt;cdev_info-&gt;adev for NULL pointer, but
pf-&gt;cdev_info will also be NULL, leading to the deref in the trace above.

Introduce a flag to be set when the creation of the auxbus device is
successful, to avoid multiple NULL pointer checks in ice_unplug_aux_dev().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39814/">CVE-2025-39814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39814">CVE-2025-39814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249895">SUSE bug 1249895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39816</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39816" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39816" ref_url="https://www.suse.com/security/cve/CVE-2025-39816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths

Since the buffers are mapped from userspace, it is prudent to use
READ_ONCE() to read the value into a local variable, and use that for
any other actions taken. Having a stable read of the buffer length
avoids worrying about it changing after checking, or being read multiple
times.

Similarly, the buffer may well change in between it being picked and
being committed. Ensure the looping for incremental ring buffer commit
stops if it hits a zero sized buffer, as no further progress can be made
at that point.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39816/">CVE-2025-39816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39816">CVE-2025-39816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249906">SUSE bug 1249906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39817</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39817" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39817" ref_url="https://www.suse.com/security/cve/CVE-2025-39817" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002136.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare

Observed on kernel 6.6 (present on master as well):

  BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0
  Call trace:
   kasan_check_range+0xe8/0x190
   __asan_loadN+0x1c/0x28
   memcmp+0x98/0xd0
   efivarfs_d_compare+0x68/0xd8
   __d_lookup_rcu_op_compare+0x178/0x218
   __d_lookup_rcu+0x1f8/0x228
   d_alloc_parallel+0x150/0x648
   lookup_open.isra.0+0x5f0/0x8d0
   open_last_lookups+0x264/0x828
   path_openat+0x130/0x3f8
   do_filp_open+0x114/0x248
   do_sys_openat2+0x340/0x3c0
   __arm64_sys_openat+0x120/0x1a0

If dentry-&gt;d_name.len &lt; EFI_VARIABLE_GUID_LEN , 'guid' can become
negative, leadings to oob. The issue can be triggered by parallel
lookups using invalid filename:

  T1			T2
  lookup_open
   -&gt;lookup
    simple_lookup
     d_add
     // invalid dentry is added to hash list

			lookup_open
			 d_alloc_parallel
			  __d_lookup_rcu
			   __d_lookup_rcu_op_compare
			    hlist_bl_for_each_entry_rcu
			    // invalid dentry can be retrieved
			     -&gt;d_compare
			      efivarfs_d_compare
			      // oob

Fix it by checking 'guid' before cmp.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39817/">CVE-2025-39817 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39817">CVE-2025-39817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249998">SUSE bug 1249998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39819</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39819" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39819" ref_url="https://www.suse.com/security/cve/CVE-2025-39819" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19105" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/smb: Fix inconsistent refcnt update

A possible inconsistent update of refcount was identified in `smb2_compound_op`.
Such inconsistent update could lead to possible resource leaks.

Why it is a possible bug:
1. In the comment section of the function, it clearly states that the
reference to `cfile` should be dropped after calling this function.
2. Every control flow path would check and drop the reference to
`cfile`, except the patched one.
3. Existing callers would not handle refcount update of `cfile` if
-ENOMEM is returned.

To fix the bug, an extra goto label "out" is added, to make sure that the
cleanup logic would always be respected. As the problem is caused by the
allocation failure of `vars`, the cleanup logic between label "finished"
and "out" can be safely ignored. According to the definition of function
`is_replayable_error`, the error code of "-ENOMEM" is not recoverable.
Therefore, the replay logic also gets ignored.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39819/">CVE-2025-39819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39819">CVE-2025-39819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250176">SUSE bug 1250176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39822</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39822" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39822" ref_url="https://www.suse.com/security/cve/CVE-2025-39822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/kbuf: fix signedness in this_len calculation

When importing and using buffers, buf-&gt;len is considered unsigned.
However, buf-&gt;len is converted to signed int when committing. This can
lead to unexpected behavior if the buffer is large enough to be
interpreted as a negative value. Make min_t calculation unsigned.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39822/">CVE-2025-39822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39822">CVE-2025-39822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250034">SUSE bug 1250034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39823</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39823" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39823" ref_url="https://www.suse.com/security/cve/CVE-2025-39823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: use array_index_nospec with indices that come from guest

min and dest_id are guest-controlled indices. Using array_index_nospec()
after the bounds checks clamps these values to mitigate speculative execution
side-channels.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39823/">CVE-2025-39823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39823">CVE-2025-39823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250002">SUSE bug 1250002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39824</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39824" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39824" ref_url="https://www.suse.com/security/cve/CVE-2025-39824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: asus: fix UAF via HID_CLAIMED_INPUT validation

After hid_hw_start() is called hidinput_connect() will eventually be
called to set up the device with the input layer since the
HID_CONNECT_DEFAULT connect mask is used. During hidinput_connect()
all input and output reports are processed and corresponding hid_inputs
are allocated and configured via hidinput_configure_usages(). This
process involves slot tagging report fields and configuring usages
by setting relevant bits in the capability bitmaps. However it is possible
that the capability bitmaps are not set at all leading to the subsequent
hidinput_has_been_populated() check to fail leading to the freeing of the
hid_input and the underlying input device.

This becomes problematic because a malicious HID device like a
ASUS ROG N-Key keyboard can trigger the above scenario via a
specially crafted descriptor which then leads to a user-after-free
when the name of the freed input device is written to later on after
hid_hw_start(). Below, report 93 intentionally utilises the
HID_UP_UNDEFINED Usage Page which is skipped during usage
configuration, leading to the frees.

0x05, 0x0D,        // Usage Page (Digitizer)
0x09, 0x05,        // Usage (Touch Pad)
0xA1, 0x01,        // Collection (Application)
0x85, 0x0D,        //   Report ID (13)
0x06, 0x00, 0xFF,  //   Usage Page (Vendor Defined 0xFF00)
0x09, 0xC5,        //   Usage (0xC5)
0x15, 0x00,        //   Logical Minimum (0)
0x26, 0xFF, 0x00,  //   Logical Maximum (255)
0x75, 0x08,        //   Report Size (8)
0x95, 0x04,        //   Report Count (4)
0xB1, 0x02,        //   Feature (Data,Var,Abs)
0x85, 0x5D,        //   Report ID (93)
0x06, 0x00, 0x00,  //   Usage Page (Undefined)
0x09, 0x01,        //   Usage (0x01)
0x15, 0x00,        //   Logical Minimum (0)
0x26, 0xFF, 0x00,  //   Logical Maximum (255)
0x75, 0x08,        //   Report Size (8)
0x95, 0x1B,        //   Report Count (27)
0x81, 0x02,        //   Input (Data,Var,Abs)
0xC0,              // End Collection

Below is the KASAN splat after triggering the UAF:

[   21.672709] ==================================================================
[   21.673700] BUG: KASAN: slab-use-after-free in asus_probe+0xeeb/0xf80
[   21.673700] Write of size 8 at addr ffff88810a0ac000 by task kworker/1:2/54
[   21.673700]
[   21.673700] CPU: 1 UID: 0 PID: 54 Comm: kworker/1:2 Not tainted 6.16.0-rc4-g9773391cf4dd-dirty #36 PREEMPT(voluntary)
[   21.673700] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[   21.673700] Call Trace:
[   21.673700]  &lt;TASK&gt;
[   21.673700]  dump_stack_lvl+0x5f/0x80
[   21.673700]  print_report+0xd1/0x660
[   21.673700]  kasan_report+0xe5/0x120
[   21.673700]  __asan_report_store8_noabort+0x1b/0x30
[   21.673700]  asus_probe+0xeeb/0xf80
[   21.673700]  hid_device_probe+0x2ee/0x700
[   21.673700]  really_probe+0x1c6/0x6b0
[   21.673700]  __driver_probe_device+0x24f/0x310
[   21.673700]  driver_probe_device+0x4e/0x220
[...]
[   21.673700]
[   21.673700] Allocated by task 54:
[   21.673700]  kasan_save_stack+0x3d/0x60
[   21.673700]  kasan_save_track+0x18/0x40
[   21.673700]  kasan_save_alloc_info+0x3b/0x50
[   21.673700]  __kasan_kmalloc+0x9c/0xa0
[   21.673700]  __kmalloc_cache_noprof+0x139/0x340
[   21.673700]  input_allocate_device+0x44/0x370
[   21.673700]  hidinput_connect+0xcb6/0x2630
[   21.673700]  hid_connect+0xf74/0x1d60
[   21.673700]  hid_hw_start+0x8c/0x110
[   21.673700]  asus_probe+0x5a3/0xf80
[   21.673700]  hid_device_probe+0x2ee/0x700
[   21.673700]  really_probe+0x1c6/0x6b0
[   21.673700]  __driver_probe_device+0x24f/0x310
[   21.673700]  driver_probe_device+0x4e/0x220
[...]
[   21.673700]
[   21.673700] Freed by task 54:
[   21.673700]  kasan_save_stack+0x3d/0x60
[   21.673700]  kasan_save_track+0x18/0x40
[   21.673700]  kasan_save_free_info+0x3f/0x60
[   21.673700]  __kasan_slab_free+0x3c/0x50
[   21.673700]  kfre
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39824/">CVE-2025-39824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39824">CVE-2025-39824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250007">SUSE bug 1250007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39825</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39825" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39825" ref_url="https://www.suse.com/security/cve/CVE-2025-39825" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix race with concurrent opens in rename(2)

Besides sending the rename request to the server, the rename process
also involves closing any deferred close, waiting for outstanding I/O
to complete as well as marking all existing open handles as deleted to
prevent them from deferring closes, which increases the race window
for potential concurrent opens on the target file.

Fix this by unhashing the dentry in advance to prevent any concurrent
opens on the target.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39825/">CVE-2025-39825 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39825">CVE-2025-39825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250179">SUSE bug 1250179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39826</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39826" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39826" ref_url="https://www.suse.com/security/cve/CVE-2025-39826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: rose: convert 'use' field to refcount_t

The 'use' field in struct rose_neigh is used as a reference counter but
lacks atomicity. This can lead to race conditions where a rose_neigh
structure is freed while still being referenced by other code paths.

For example, when rose_neigh-&gt;use becomes zero during an ioctl operation
via rose_rt_ioctl(), the structure may be removed while its timer is
still active, potentially causing use-after-free issues.

This patch changes the type of 'use' from unsigned short to refcount_t and
updates all code paths to use rose_neigh_hold() and rose_neigh_put() which
operate reference counts atomically.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39826/">CVE-2025-39826 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39826">CVE-2025-39826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250203">SUSE bug 1250203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252713">SUSE bug 1252713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39827</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39827" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39827" ref_url="https://www.suse.com/security/cve/CVE-2025-39827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: rose: include node references in rose_neigh refcount

Current implementation maintains two separate reference counting
mechanisms: the 'count' field in struct rose_neigh tracks references from
rose_node structures, while the 'use' field (now refcount_t) tracks
references from rose_sock.

This patch merges these two reference counting systems using 'use' field
for proper reference management. Specifically, this patch adds incrementing
and decrementing of rose_neigh-&gt;use when rose_neigh-&gt;count is incremented
or decremented.

This patch also modifies rose_rt_free(), rose_rt_device_down() and
rose_clear_route() to properly release references to rose_neigh objects
before freeing a rose_node through rose_remove_node().

These changes ensure rose_neigh structures are properly freed only when
all references, including those from rose_node structures, are released.
As a result, this resolves a slab-use-after-free issue reported by Syzbot.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39827/">CVE-2025-39827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39827">CVE-2025-39827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250204">SUSE bug 1250204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252714">SUSE bug 1252714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39828</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39828" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39828" ref_url="https://www.suse.com/security/cve/CVE-2025-39828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: atmtcp: Prevent arbitrary write in atmtcp_recv_control().

syzbot reported the splat below. [0]

When atmtcp_v_open() or atmtcp_v_close() is called via connect()
or close(), atmtcp_send_control() is called to send an in-kernel
special message.

The message has ATMTCP_HDR_MAGIC in atmtcp_control.hdr.length.
Also, a pointer of struct atm_vcc is set to atmtcp_control.vcc.

The notable thing is struct atmtcp_control is uAPI but has a
space for an in-kernel pointer.

  struct atmtcp_control {
  	struct atmtcp_hdr hdr;	/* must be first */
  ...
  	atm_kptr_t vcc;		/* both directions */
  ...
  } __ATM_API_ALIGN;

  typedef struct { unsigned char _[8]; } __ATM_API_ALIGN atm_kptr_t;

The special message is processed in atmtcp_recv_control() called
from atmtcp_c_send().

atmtcp_c_send() is vcc-&gt;dev-&gt;ops-&gt;send() and called from 2 paths:

  1. .ndo_start_xmit() (vcc-&gt;send() == atm_send_aal0())
  2. vcc_sendmsg()

The problem is sendmsg() does not validate the message length and
userspace can abuse atmtcp_recv_control() to overwrite any kptr
by atmtcp_control.

Let's add a new -&gt;pre_send() hook to validate messages from sendmsg().

[0]:
Oops: general protection fault, probably for non-canonical address 0xdffffc00200000ab: 0000 [#1] SMP KASAN PTI
KASAN: probably user-memory-access in range [0x0000000100000558-0x000000010000055f]
CPU: 0 UID: 0 PID: 5865 Comm: syz-executor331 Not tainted 6.17.0-rc1-syzkaller-00215-gbab3ce404553 #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
RIP: 0010:atmtcp_recv_control drivers/atm/atmtcp.c:93 [inline]
RIP: 0010:atmtcp_c_send+0x1da/0x950 drivers/atm/atmtcp.c:297
Code: 4d 8d 75 1a 4c 89 f0 48 c1 e8 03 42 0f b6 04 20 84 c0 0f 85 15 06 00 00 41 0f b7 1e 4d 8d b7 60 05 00 00 4c 89 f0 48 c1 e8 03 &lt;42&gt; 0f b6 04 20 84 c0 0f 85 13 06 00 00 66 41 89 1e 4d 8d 75 1c 4c
RSP: 0018:ffffc90003f5f810 EFLAGS: 00010203
RAX: 00000000200000ab RBX: 0000000000000000 RCX: 0000000000000000
RDX: ffff88802a510000 RSI: 00000000ffffffff RDI: ffff888030a6068c
RBP: ffff88802699fb40 R08: ffff888030a606eb R09: 1ffff1100614c0dd
R10: dffffc0000000000 R11: ffffffff8718fc40 R12: dffffc0000000000
R13: ffff888030a60680 R14: 000000010000055f R15: 00000000ffffffff
FS:  00007f8d7e9236c0(0000) GS:ffff888125c1c000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000045ad50 CR3: 0000000075bde000 CR4: 00000000003526f0
Call Trace:
 &lt;TASK&gt;
 vcc_sendmsg+0xa10/0xc60 net/atm/common.c:645
 sock_sendmsg_nosec net/socket.c:714 [inline]
 __sock_sendmsg+0x219/0x270 net/socket.c:729
 ____sys_sendmsg+0x505/0x830 net/socket.c:2614
 ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2668
 __sys_sendmsg net/socket.c:2700 [inline]
 __do_sys_sendmsg net/socket.c:2705 [inline]
 __se_sys_sendmsg net/socket.c:2703 [inline]
 __x64_sys_sendmsg+0x19b/0x260 net/socket.c:2703
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f8d7e96a4a9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f8d7e923198 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f8d7e9f4308 RCX: 00007f8d7e96a4a9
RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000005
RBP: 00007f8d7e9f4300 R08: 65732f636f72702f R09: 65732f636f72702f
R10: 65732f636f72702f R11: 0000000000000246 R12: 00007f8d7e9c10ac
R13: 00007f8d7e9231a0 R14: 0000200000000200 R15: 0000200000000250
 &lt;/TASK&gt;
Modules linked in:
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39828/">CVE-2025-39828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39828">CVE-2025-39828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250205">SUSE bug 1250205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39829</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39829" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39829" ref_url="https://www.suse.com/security/cve/CVE-2025-39829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

trace/fgraph: Fix the warning caused by missing unregister notifier

This warning was triggered during testing on v6.16:

notifier callback ftrace_suspend_notifier_call already registered
WARNING: CPU: 2 PID: 86 at kernel/notifier.c:23 notifier_chain_register+0x44/0xb0
...
Call Trace:
 &lt;TASK&gt;
 blocking_notifier_chain_register+0x34/0x60
 register_ftrace_graph+0x330/0x410
 ftrace_profile_write+0x1e9/0x340
 vfs_write+0xf8/0x420
 ? filp_flush+0x8a/0xa0
 ? filp_close+0x1f/0x30
 ? do_dup2+0xaf/0x160
 ksys_write+0x65/0xe0
 do_syscall_64+0xa4/0x260
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

When writing to the function_profile_enabled interface, the notifier was
not unregistered after start_graph_tracing failed, causing a warning the
next time function_profile_enabled was written.

Fixed by adding unregister_pm_notifier in the exception path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39829/">CVE-2025-39829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39829">CVE-2025-39829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250082">SUSE bug 1250082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39830</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39830" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39830" ref_url="https://www.suse.com/security/cve/CVE-2025-39830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path

In the error path of hws_pool_buddy_init(), the buddy allocator cleanup
doesn't free the allocator structure itself, causing a memory leak.

Add the missing kfree() to properly release all allocated memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39830/">CVE-2025-39830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39830">CVE-2025-39830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249974">SUSE bug 1249974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39831</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39831" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39831" ref_url="https://www.suse.com/security/cve/CVE-2025-39831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbnic: Move phylink resume out of service_task and into open/close

The fbnic driver was presenting with the following locking assert coming
out of a PM resume:
[   42.208116][  T164] RTNL: assertion failed at drivers/net/phy/phylink.c (2611)
[   42.208492][  T164] WARNING: CPU: 1 PID: 164 at drivers/net/phy/phylink.c:2611 phylink_resume+0x190/0x1e0
[   42.208872][  T164] Modules linked in:
[   42.209140][  T164] CPU: 1 UID: 0 PID: 164 Comm: bash Not tainted 6.17.0-rc2-virtme #134 PREEMPT(full)
[   42.209496][  T164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-5.fc42 04/01/2014
[   42.209861][  T164] RIP: 0010:phylink_resume+0x190/0x1e0
[   42.210057][  T164] Code: 83 e5 01 0f 85 b0 fe ff ff c6 05 1c cd 3e 02 01 90 ba 33 0a 00 00 48 c7 c6 20 3a 1d a5 48 c7 c7 e0 3e 1d a5 e8 21 b8 90 fe 90 &lt;0f&gt; 0b 90 90 e9 86 fe ff ff e8 42 ea 1f ff e9 e2 fe ff ff 48 89 ef
[   42.210708][  T164] RSP: 0018:ffffc90000affbd8 EFLAGS: 00010296
[   42.210983][  T164] RAX: 0000000000000000 RBX: ffff8880078d8400 RCX: 0000000000000000
[   42.211235][  T164] RDX: 0000000000000000 RSI: 1ffffffff4f10938 RDI: 0000000000000001
[   42.211466][  T164] RBP: 0000000000000000 R08: ffffffffa2ae79ea R09: fffffbfff4b3eb84
[   42.211707][  T164] R10: 0000000000000003 R11: 0000000000000000 R12: ffff888007ad8000
[   42.211997][  T164] R13: 0000000000000002 R14: ffff888006a18800 R15: ffffffffa34c59e0
[   42.212234][  T164] FS:  00007f0dc8e39740(0000) GS:ffff88808f51f000(0000) knlGS:0000000000000000
[   42.212505][  T164] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   42.212704][  T164] CR2: 00007f0dc8e9fe10 CR3: 000000000b56d003 CR4: 0000000000772ef0
[   42.213227][  T164] PKRU: 55555554
[   42.213366][  T164] Call Trace:
[   42.213483][  T164]  &lt;TASK&gt;
[   42.213565][  T164]  __fbnic_pm_attach.isra.0+0x8e/0xa0
[   42.213725][  T164]  pci_reset_function+0x116/0x1d0
[   42.213895][  T164]  reset_store+0xa0/0x100
[   42.214025][  T164]  ? pci_dev_reset_attr_is_visible+0x50/0x50
[   42.214221][  T164]  ? sysfs_file_kobj+0xc1/0x1e0
[   42.214374][  T164]  ? sysfs_kf_write+0x65/0x160
[   42.214526][  T164]  kernfs_fop_write_iter+0x2f8/0x4c0
[   42.214677][  T164]  ? kernfs_vma_page_mkwrite+0x1f0/0x1f0
[   42.214836][  T164]  new_sync_write+0x308/0x6f0
[   42.214987][  T164]  ? __lock_acquire+0x34c/0x740
[   42.215135][  T164]  ? new_sync_read+0x6f0/0x6f0
[   42.215288][  T164]  ? lock_acquire.part.0+0xbc/0x260
[   42.215440][  T164]  ? ksys_write+0xff/0x200
[   42.215590][  T164]  ? perf_trace_sched_switch+0x6d0/0x6d0
[   42.215742][  T164]  vfs_write+0x65e/0xbb0
[   42.215876][  T164]  ksys_write+0xff/0x200
[   42.215994][  T164]  ? __ia32_sys_read+0xc0/0xc0
[   42.216141][  T164]  ? do_user_addr_fault+0x269/0x9f0
[   42.216292][  T164]  ? rcu_is_watching+0x15/0xd0
[   42.216442][  T164]  do_syscall_64+0xbb/0x360
[   42.216591][  T164]  entry_SYSCALL_64_after_hwframe+0x4b/0x53
[   42.216784][  T164] RIP: 0033:0x7f0dc8ea9986

A bit of digging showed that we were invoking the phylink_resume as a part
of the fbnic_up path when we were enabling the service task while not
holding the RTNL lock. We should be enabling this sooner as a part of the
ndo_open path and then just letting the service task come online later.
This will help to enforce the correct locking and brings the phylink
interface online at the same time as the network interface, instead of at a
later time.

I tested this on QEMU to verify this was working by putting the system to
sleep using "echo mem &gt; /sys/power/state" to put the system to sleep in the
guest and then using the command "system_wakeup" in the QEMU monitor.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39831/">CVE-2025-39831 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39831">CVE-2025-39831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249977">SUSE bug 1249977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39832</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39832" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39832" ref_url="https://www.suse.com/security/cve/CVE-2025-39832" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix lockdep assertion on sync reset unload event

Fix lockdep assertion triggered during sync reset unload event. When the
sync reset flow is initiated using the devlink reload fw_activate
option, the PF already holds the devlink lock while handling unload
event. In this case, delegate sync reset unload event handling back to
the devlink callback process to avoid double-locking and resolve the
lockdep warning.

Kernel log:
WARNING: CPU: 9 PID: 1578 at devl_assert_locked+0x31/0x40
[...]
Call Trace:
&lt;TASK&gt;
 mlx5_unload_one_devl_locked+0x2c/0xc0 [mlx5_core]
 mlx5_sync_reset_unload_event+0xaf/0x2f0 [mlx5_core]
 process_one_work+0x222/0x640
 worker_thread+0x199/0x350
 kthread+0x10b/0x230
 ? __pfx_worker_thread+0x10/0x10
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x8e/0x100
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
&lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39832/">CVE-2025-39832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39832">CVE-2025-39832 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249901">SUSE bug 1249901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39833</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39833" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39833" ref_url="https://www.suse.com/security/cve/CVE-2025-39833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mISDN: hfcpci: Fix warning when deleting uninitialized timer

With CONFIG_DEBUG_OBJECTS_TIMERS unloading hfcpci module leads
to the following splat:

[  250.215892] ODEBUG: assert_init not available (active state 0) object: ffffffffc01a3dc0 object type: timer_list hint: 0x0
[  250.217520] WARNING: CPU: 0 PID: 233 at lib/debugobjects.c:612 debug_print_object+0x1b6/0x2c0
[  250.218775] Modules linked in: hfcpci(-) mISDN_core
[  250.219537] CPU: 0 UID: 0 PID: 233 Comm: rmmod Not tainted 6.17.0-rc2-g6f713187ac98 #2 PREEMPT(voluntary)
[  250.220940] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  250.222377] RIP: 0010:debug_print_object+0x1b6/0x2c0
[  250.223131] Code: fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 4f 41 56 48 8b 14 dd a0 4e 01 9f 48 89 ee 48 c7 c7 20 46 01 9f e8 cb 84d
[  250.225805] RSP: 0018:ffff888015ea7c08 EFLAGS: 00010286
[  250.226608] RAX: 0000000000000000 RBX: 0000000000000005 RCX: ffffffff9be93a95
[  250.227708] RDX: 1ffff1100d945138 RSI: 0000000000000008 RDI: ffff88806ca289c0
[  250.228993] RBP: ffffffff9f014a00 R08: 0000000000000001 R09: ffffed1002bd4f39
[  250.230043] R10: ffff888015ea79cf R11: 0000000000000001 R12: 0000000000000001
[  250.231185] R13: ffffffff9eea0520 R14: 0000000000000000 R15: ffff888015ea7cc8
[  250.232454] FS:  00007f3208f01540(0000) GS:ffff8880caf5a000(0000) knlGS:0000000000000000
[  250.233851] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  250.234856] CR2: 00007f32090a7421 CR3: 0000000004d63000 CR4: 00000000000006f0
[  250.236117] Call Trace:
[  250.236599]  &lt;TASK&gt;
[  250.236967]  ? trace_irq_enable.constprop.0+0xd4/0x130
[  250.237920]  debug_object_assert_init+0x1f6/0x310
[  250.238762]  ? __pfx_debug_object_assert_init+0x10/0x10
[  250.239658]  ? __lock_acquire+0xdea/0x1c70
[  250.240369]  __try_to_del_timer_sync+0x69/0x140
[  250.241172]  ? __pfx___try_to_del_timer_sync+0x10/0x10
[  250.242058]  ? __timer_delete_sync+0xc6/0x120
[  250.242842]  ? lock_acquire+0x30/0x80
[  250.243474]  ? __timer_delete_sync+0xc6/0x120
[  250.244262]  __timer_delete_sync+0x98/0x120
[  250.245015]  HFC_cleanup+0x10/0x20 [hfcpci]
[  250.245704]  __do_sys_delete_module+0x348/0x510
[  250.246461]  ? __pfx___do_sys_delete_module+0x10/0x10
[  250.247338]  do_syscall_64+0xc1/0x360
[  250.247924]  entry_SYSCALL_64_after_hwframe+0x77/0x7f

Fix this by initializing hfc_tl timer with DEFINE_TIMER macro.
Also, use mod_timer instead of manual timeout update.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39833/">CVE-2025-39833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39833">CVE-2025-39833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250028">SUSE bug 1250028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39834</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39834" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39834" ref_url="https://www.suse.com/security/cve/CVE-2025-39834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow

When an invalid stc_type is provided, the function allocates memory for
shared_stc but jumps to unlock_and_out without freeing it, causing a
memory leak.

Fix by jumping to free_shared_stc label instead to ensure proper cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39834/">CVE-2025-39834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39834">CVE-2025-39834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250021">SUSE bug 1250021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39835</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39835" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39835" ref_url="https://www.suse.com/security/cve/CVE-2025-39835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: do not propagate ENODATA disk errors into xattr code

ENODATA (aka ENOATTR) has a very specific meaning in the xfs xattr code;
namely, that the requested attribute name could not be found.

However, a medium error from disk may also return ENODATA. At best,
this medium error may escape to userspace as "attribute not found"
when in fact it's an IO (disk) error.

At worst, we may oops in xfs_attr_leaf_get() when we do:

	error = xfs_attr_leaf_hasname(args, &amp;bp);
	if (error == -ENOATTR)  {
		xfs_trans_brelse(args-&gt;trans, bp);
		return error;
	}

because an ENODATA/ENOATTR error from disk leaves us with a null bp,
and the xfs_trans_brelse will then null-deref it.

As discussed on the list, we really need to modify the lower level
IO functions to trap all disk errors and ensure that we don't let
unique errors like this leak up into higher xfs functions - many
like this should be remapped to EIO.

However, this patch directly addresses a reported bug in the xattr
code, and should be safe to backport to stable kernels. A larger-scope
patch to handle more unique errors at lower levels can follow later.

(Note, prior to 07120f1abdff we did not oops, but we did return the
wrong error code to userspace.)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39835/">CVE-2025-39835 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39835">CVE-2025-39835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250025">SUSE bug 1250025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39836</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39836" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39836" ref_url="https://www.suse.com/security/cve/CVE-2025-39836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi: stmm: Fix incorrect buffer allocation method

The communication buffer allocated by setup_mm_hdr() is later on passed
to tee_shm_register_kernel_buf(). The latter expects those buffers to be
contiguous pages, but setup_mm_hdr() just uses kmalloc(). That can cause
various corruptions or BUGs, specifically since commit 9aec2fb0fd5e
("slab: allocate frozen pages"), though it was broken before as well.

Fix this by using alloc_pages_exact() instead of kmalloc().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39836/">CVE-2025-39836 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39836">CVE-2025-39836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249904">SUSE bug 1249904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39838</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39838" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39838" ref_url="https://www.suse.com/security/cve/CVE-2025-39838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: prevent NULL pointer dereference in UTF16 conversion

There can be a NULL pointer dereference bug here. NULL is passed to
__cifs_sfu_make_node without checks, which passes it unchecked to
cifs_strndup_to_utf16, which in turn passes it to
cifs_local_to_utf16_bytes where '*from' is dereferenced, causing a crash.

This patch adds a check for NULL 'src' in cifs_strndup_to_utf16 and
returns NULL early to prevent dereferencing NULL pointer.

Found by Linux Verification Center (linuxtesting.org) with SVACE
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39838/">CVE-2025-39838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39838">CVE-2025-39838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250365">SUSE bug 1250365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39839</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39839" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39839" ref_url="https://www.suse.com/security/cve/CVE-2025-39839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

batman-adv: fix OOB read/write in network-coding decode

batadv_nc_skb_decode_packet() trusts coded_len and checks only against
skb-&gt;len. XOR starts at sizeof(struct batadv_unicast_packet), reducing
payload headroom, and the source skb length is not verified, allowing an
out-of-bounds read and a small out-of-bounds write.

Validate that coded_len fits within the payload area of both destination
and source sk_buffs before XORing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39839/">CVE-2025-39839 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39839">CVE-2025-39839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250291">SUSE bug 1250291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39841</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39841" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39841" ref_url="https://www.suse.com/security/cve/CVE-2025-39841" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix buffer free/clear order in deferred receive path

Fix a use-after-free window by correcting the buffer release sequence in
the deferred receive path. The code freed the RQ buffer first and only
then cleared the context pointer under the lock. Concurrent paths (e.g.,
ABTS and the repost path) also inspect and release the same pointer under
the lock, so the old order could lead to double-free/UAF.

Note that the repost path already uses the correct pattern: detach the
pointer under the lock, then free it after dropping the lock. The
deferred path should do the same.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39841/">CVE-2025-39841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39841">CVE-2025-39841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250274">SUSE bug 1250274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39842</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39842" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39842" ref_url="https://www.suse.com/security/cve/CVE-2025-39842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: prevent release journal inode after journal shutdown

Before calling ocfs2_delete_osb(), ocfs2_journal_shutdown() has already
been executed in ocfs2_dismount_volume(), so osb-&gt;journal must be NULL. 
Therefore, the following calltrace will inevitably fail when it reaches
jbd2_journal_release_jbd_inode().

ocfs2_dismount_volume()-&gt;
  ocfs2_delete_osb()-&gt;
    ocfs2_free_slot_info()-&gt;
      __ocfs2_free_slot_info()-&gt;
        evict()-&gt;
          ocfs2_evict_inode()-&gt;
            ocfs2_clear_inode()-&gt;
	      jbd2_journal_release_jbd_inode(osb-&gt;journal-&gt;j_journal,

Adding osb-&gt;journal checks will prevent null-ptr-deref during the above
execution path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39842/">CVE-2025-39842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39842">CVE-2025-39842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250267">SUSE bug 1250267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39844</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39844" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39844" ref_url="https://www.suse.com/security/cve/CVE-2025-39844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: move page table sync declarations to linux/pgtable.h

During our internal testing, we started observing intermittent boot
failures when the machine uses 4-level paging and has a large amount of
persistent memory:

  BUG: unable to handle page fault for address: ffffe70000000034
  #PF: supervisor write access in kernel mode
  #PF: error_code(0x0002) - not-present page
  PGD 0 P4D 0 
  Oops: 0002 [#1] SMP NOPTI
  RIP: 0010:__init_single_page+0x9/0x6d
  Call Trace:
   &lt;TASK&gt;
   __init_zone_device_page+0x17/0x5d
   memmap_init_zone_device+0x154/0x1bb
   pagemap_range+0x2e0/0x40f
   memremap_pages+0x10b/0x2f0
   devm_memremap_pages+0x1e/0x60
   dev_dax_probe+0xce/0x2ec [device_dax]
   dax_bus_probe+0x6d/0xc9
   [... snip ...]
   &lt;/TASK&gt;

It turns out that the kernel panics while initializing vmemmap (struct
page array) when the vmemmap region spans two PGD entries, because the new
PGD entry is only installed in init_mm.pgd, but not in the page tables of
other tasks.

And looking at __populate_section_memmap():
  if (vmemmap_can_optimize(altmap, pgmap))                                
          // does not sync top level page tables
          r = vmemmap_populate_compound_pages(pfn, start, end, nid, pgmap);
  else                                                                    
          // sync top level page tables in x86
          r = vmemmap_populate(start, end, nid, altmap);

In the normal path, vmemmap_populate() in arch/x86/mm/init_64.c
synchronizes the top level page table (See commit 9b861528a801 ("x86-64,
mem: Update all PGDs for direct mapping and vmemmap mapping changes")) so
that all tasks in the system can see the new vmemmap area.

However, when vmemmap_can_optimize() returns true, the optimized path
skips synchronization of top-level page tables.  This is because
vmemmap_populate_compound_pages() is implemented in core MM code, which
does not handle synchronization of the top-level page tables.  Instead,
the core MM has historically relied on each architecture to perform this
synchronization manually.

We're not the first party to encounter a crash caused by not-sync'd top
level page tables: earlier this year, Gwan-gyeong Mun attempted to address
the issue [1] [2] after hitting a kernel panic when x86 code accessed the
vmemmap area before the corresponding top-level entries were synced.  At
that time, the issue was believed to be triggered only when struct page
was enlarged for debugging purposes, and the patch did not get further
updates.

It turns out that current approach of relying on each arch to handle the
page table sync manually is fragile because 1) it's easy to forget to sync
the top level page table, and 2) it's also easy to overlook that the
kernel should not access the vmemmap and direct mapping areas before the
sync.

# The solution: Make page table sync more code robust and harder to miss

To address this, Dave Hansen suggested [3] [4] introducing
{pgd,p4d}_populate_kernel() for updating kernel portion of the page tables
and allow each architecture to explicitly perform synchronization when
installing top-level entries.  With this approach, we no longer need to
worry about missing the sync step, reducing the risk of future
regressions.

The new interface reuses existing ARCH_PAGE_TABLE_SYNC_MASK,
PGTBL_P*D_MODIFIED and arch_sync_kernel_mappings() facility used by
vmalloc and ioremap to synchronize page tables.

pgd_populate_kernel() looks like this:
static inline void pgd_populate_kernel(unsigned long addr, pgd_t *pgd,
                                       p4d_t *p4d)
{
        pgd_populate(&amp;init_mm, pgd, p4d);
        if (ARCH_PAGE_TABLE_SYNC_MASK &amp; PGTBL_PGD_MODIFIED)
                arch_sync_kernel_mappings(addr, addr);
}

It is worth noting that vmalloc() and apply_to_range() carefully
synchronizes page tables by calling p*d_alloc_track() and
arch_sync_kernel_mappings(), and thus they are not affected by
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39844/">CVE-2025-39844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39844">CVE-2025-39844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250268">SUSE bug 1250268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39845</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39845" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39845" ref_url="https://www.suse.com/security/cve/CVE-2025-39845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings()

Define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() to ensure
page tables are properly synchronized when calling p*d_populate_kernel().

For 5-level paging, synchronization is performed via
pgd_populate_kernel().  In 4-level paging, pgd_populate() is a no-op, so
synchronization is instead performed at the P4D level via
p4d_populate_kernel().

This fixes intermittent boot failures on systems using 4-level paging and
a large amount of persistent memory:

  BUG: unable to handle page fault for address: ffffe70000000034
  #PF: supervisor write access in kernel mode
  #PF: error_code(0x0002) - not-present page
  PGD 0 P4D 0
  Oops: 0002 [#1] SMP NOPTI
  RIP: 0010:__init_single_page+0x9/0x6d
  Call Trace:
   &lt;TASK&gt;
   __init_zone_device_page+0x17/0x5d
   memmap_init_zone_device+0x154/0x1bb
   pagemap_range+0x2e0/0x40f
   memremap_pages+0x10b/0x2f0
   devm_memremap_pages+0x1e/0x60
   dev_dax_probe+0xce/0x2ec [device_dax]
   dax_bus_probe+0x6d/0xc9
   [... snip ...]
   &lt;/TASK&gt;

It also fixes a crash in vmemmap_set_pmd() caused by accessing vmemmap
before sync_global_pgds() [1]:

  BUG: unable to handle page fault for address: ffffeb3ff1200000
  #PF: supervisor write access in kernel mode
  #PF: error_code(0x0002) - not-present page
  PGD 0 P4D 0
  Oops: Oops: 0002 [#1] PREEMPT SMP NOPTI
  Tainted: [W]=WARN
  RIP: 0010:vmemmap_set_pmd+0xff/0x230
   &lt;TASK&gt;
   vmemmap_populate_hugepages+0x176/0x180
   vmemmap_populate+0x34/0x80
   __populate_section_memmap+0x41/0x90
   sparse_add_section+0x121/0x3e0
   __add_pages+0xba/0x150
   add_pages+0x1d/0x70
   memremap_pages+0x3dc/0x810
   devm_memremap_pages+0x1c/0x60
   xe_devm_add+0x8b/0x100 [xe]
   xe_tile_init_noalloc+0x6a/0x70 [xe]
   xe_device_probe+0x48c/0x740 [xe]
   [... snip ...]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39845/">CVE-2025-39845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39845">CVE-2025-39845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250262">SUSE bug 1250262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39847</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39847" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39847" ref_url="https://www.suse.com/security/cve/CVE-2025-39847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ppp: fix memory leak in pad_compress_skb

If alloc_skb() fails in pad_compress_skb(), it returns NULL without
releasing the old skb. The caller does:

    skb = pad_compress_skb(ppp, skb);
    if (!skb)
        goto drop;

drop:
    kfree_skb(skb);

When pad_compress_skb() returns NULL, the reference to the old skb is
lost and kfree_skb(skb) ends up doing nothing, leading to a memory leak.

Align pad_compress_skb() semantics with realloc(): only free the old
skb if allocation and compression succeed.  At the call site, use the
new_skb variable so the original skb is not lost when pad_compress_skb()
fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39847/">CVE-2025-39847 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39847">CVE-2025-39847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250292">SUSE bug 1250292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39848</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39848" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39848" ref_url="https://www.suse.com/security/cve/CVE-2025-39848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ax25: properly unshare skbs in ax25_kiss_rcv()

Bernard Pidoux reported a regression apparently caused by commit
c353e8983e0d ("net: introduce per netns packet chains").

skb-&gt;dev becomes NULL and we crash in __netif_receive_skb_core().

Before above commit, different kind of bugs or corruptions could happen
without a major crash.

But the root cause is that ax25_kiss_rcv() can queue/mangle input skb
without checking if this skb is shared or not.

Many thanks to Bernard Pidoux for his help, diagnosis and tests.

We had a similar issue years ago fixed with commit 7aaed57c5c28
("phonet: properly unshare skbs in phonet_rcv()").
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39848/">CVE-2025-39848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39848">CVE-2025-39848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250298">SUSE bug 1250298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39849</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39849" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39849" ref_url="https://www.suse.com/security/cve/CVE-2025-39849" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result()

If the ssid-&gt;datalen is more than IEEE80211_MAX_SSID_LEN (32) it would
lead to memory corruption so add some bounds checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39849/">CVE-2025-39849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39849">CVE-2025-39849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250266">SUSE bug 1250266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39850</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39850" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39850" ref_url="https://www.suse.com/security/cve/CVE-2025-39850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects

When the "proxy" option is enabled on a VXLAN device, the device will
suppress ARP requests and IPv6 Neighbor Solicitation messages if it is
able to reply on behalf of the remote host. That is, if a matching and
valid neighbor entry is configured on the VXLAN device whose MAC address
is not behind the "any" remote (0.0.0.0 / ::).

The code currently assumes that the FDB entry for the neighbor's MAC
address points to a valid remote destination, but this is incorrect if
the entry is associated with an FDB nexthop group. This can result in a
NPD [1][3] which can be reproduced using [2][4].

Fix by checking that the remote destination exists before dereferencing
it.

[1]
BUG: kernel NULL pointer dereference, address: 0000000000000000
[...]
CPU: 4 UID: 0 PID: 365 Comm: arping Not tainted 6.17.0-rc2-virtme-g2a89cb21162c #2 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014
RIP: 0010:vxlan_xmit+0xb58/0x15f0
[...]
Call Trace:
 &lt;TASK&gt;
 dev_hard_start_xmit+0x5d/0x1c0
 __dev_queue_xmit+0x246/0xfd0
 packet_sendmsg+0x113a/0x1850
 __sock_sendmsg+0x38/0x70
 __sys_sendto+0x126/0x180
 __x64_sys_sendto+0x24/0x30
 do_syscall_64+0xa4/0x260
 entry_SYSCALL_64_after_hwframe+0x4b/0x53

[2]
 #!/bin/bash

 ip address add 192.0.2.1/32 dev lo

 ip nexthop add id 1 via 192.0.2.2 fdb
 ip nexthop add id 10 group 1 fdb

 ip link add name vx0 up type vxlan id 10010 local 192.0.2.1 dstport 4789 proxy

 ip neigh add 192.0.2.3 lladdr 00:11:22:33:44:55 nud perm dev vx0

 bridge fdb add 00:11:22:33:44:55 dev vx0 self static nhid 10

 arping -b -c 1 -s 192.0.2.1 -I vx0 192.0.2.3

[3]
BUG: kernel NULL pointer dereference, address: 0000000000000000
[...]
CPU: 13 UID: 0 PID: 372 Comm: ndisc6 Not tainted 6.17.0-rc2-virtmne-g6ee90cb26014 #3 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1v996), BIOS 1.17.0-4.fc41 04/01/2x014
RIP: 0010:vxlan_xmit+0x803/0x1600
[...]
Call Trace:
 &lt;TASK&gt;
 dev_hard_start_xmit+0x5d/0x1c0
 __dev_queue_xmit+0x246/0xfd0
 ip6_finish_output2+0x210/0x6c0
 ip6_finish_output+0x1af/0x2b0
 ip6_mr_output+0x92/0x3e0
 ip6_send_skb+0x30/0x90
 rawv6_sendmsg+0xe6e/0x12e0
 __sock_sendmsg+0x38/0x70
 __sys_sendto+0x126/0x180
 __x64_sys_sendto+0x24/0x30
 do_syscall_64+0xa4/0x260
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
RIP: 0033:0x7f383422ec77

[4]
 #!/bin/bash

 ip address add 2001:db8:1::1/128 dev lo

 ip nexthop add id 1 via 2001:db8:1::1 fdb
 ip nexthop add id 10 group 1 fdb

 ip link add name vx0 up type vxlan id 10010 local 2001:db8:1::1 dstport 4789 proxy

 ip neigh add 2001:db8:1::3 lladdr 00:11:22:33:44:55 nud perm dev vx0

 bridge fdb add 00:11:22:33:44:55 dev vx0 self static nhid 10

 ndisc6 -r 1 -s 2001:db8:1::1 -w 1 2001:db8:1::3 vx0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39850/">CVE-2025-39850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39850">CVE-2025-39850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250276">SUSE bug 1250276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39851</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39851" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39851" ref_url="https://www.suse.com/security/cve/CVE-2025-39851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vxlan: Fix NPD when refreshing an FDB entry with a nexthop object

VXLAN FDB entries can point to either a remote destination or an FDB
nexthop group. The latter is usually used in EVPN deployments where
learning is disabled.

However, when learning is enabled, an incoming packet might try to
refresh an FDB entry that points to an FDB nexthop group and therefore
does not have a remote. Such packets should be dropped, but they are
only dropped after dereferencing the non-existent remote, resulting in a
NPD [1] which can be reproduced using [2].

Fix by dropping such packets earlier. Remove the misleading comment from
first_remote_rcu().

[1]
BUG: kernel NULL pointer dereference, address: 0000000000000000
[...]
CPU: 13 UID: 0 PID: 361 Comm: mausezahn Not tainted 6.17.0-rc1-virtme-g9f6b606b6b37 #1 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014
RIP: 0010:vxlan_snoop+0x98/0x1e0
[...]
Call Trace:
 &lt;TASK&gt;
 vxlan_encap_bypass+0x209/0x240
 encap_bypass_if_local+0xb1/0x100
 vxlan_xmit_one+0x1375/0x17e0
 vxlan_xmit+0x6b4/0x15f0
 dev_hard_start_xmit+0x5d/0x1c0
 __dev_queue_xmit+0x246/0xfd0
 packet_sendmsg+0x113a/0x1850
 __sock_sendmsg+0x38/0x70
 __sys_sendto+0x126/0x180
 __x64_sys_sendto+0x24/0x30
 do_syscall_64+0xa4/0x260
 entry_SYSCALL_64_after_hwframe+0x4b/0x53

[2]
 #!/bin/bash

 ip address add 192.0.2.1/32 dev lo
 ip address add 192.0.2.2/32 dev lo

 ip nexthop add id 1 via 192.0.2.3 fdb
 ip nexthop add id 10 group 1 fdb

 ip link add name vx0 up type vxlan id 10010 local 192.0.2.1 dstport 12345 localbypass
 ip link add name vx1 up type vxlan id 10020 local 192.0.2.2 dstport 54321 learning

 bridge fdb add 00:11:22:33:44:55 dev vx0 self static dst 192.0.2.2 port 54321 vni 10020
 bridge fdb add 00:aa:bb:cc:dd:ee dev vx1 self static nhid 10

 mausezahn vx0 -a 00:aa:bb:cc:dd:ee -b 00:11:22:33:44:55 -c 1 -q
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39851/">CVE-2025-39851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39851">CVE-2025-39851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250296">SUSE bug 1250296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39852</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39852" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39852" ref_url="https://www.suse.com/security/cve/CVE-2025-39852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/tcp: Fix socket memory leak in TCP-AO failure handling for IPv6

When tcp_ao_copy_all_matching() fails in tcp_v6_syn_recv_sock() it just
exits the function. This ends up causing a memory-leak:

unreferenced object 0xffff0000281a8200 (size 2496):
  comm "softirq", pid 0, jiffies 4295174684
  hex dump (first 32 bytes):
    7f 00 00 06 7f 00 00 06 00 00 00 00 cb a8 88 13  ................
    0a 00 03 61 00 00 00 00 00 00 00 00 00 00 00 00  ...a............
  backtrace (crc 5ebdbe15):
    kmemleak_alloc+0x44/0xe0
    kmem_cache_alloc_noprof+0x248/0x470
    sk_prot_alloc+0x48/0x120
    sk_clone_lock+0x38/0x3b0
    inet_csk_clone_lock+0x34/0x150
    tcp_create_openreq_child+0x3c/0x4a8
    tcp_v6_syn_recv_sock+0x1c0/0x620
    tcp_check_req+0x588/0x790
    tcp_v6_rcv+0x5d0/0xc18
    ip6_protocol_deliver_rcu+0x2d8/0x4c0
    ip6_input_finish+0x74/0x148
    ip6_input+0x50/0x118
    ip6_sublist_rcv+0x2fc/0x3b0
    ipv6_list_rcv+0x114/0x170
    __netif_receive_skb_list_core+0x16c/0x200
    netif_receive_skb_list_internal+0x1f0/0x2d0

This is because in tcp_v6_syn_recv_sock (and the IPv4 counterpart), when
exiting upon error, inet_csk_prepare_forced_close() and tcp_done() need
to be called. They make sure the newsk will end up being correctly
free'd.

tcp_v4_syn_recv_sock() makes this very clear by having the put_and_exit
label that takes care of things. So, this patch here makes sure
tcp_v4_syn_recv_sock and tcp_v6_syn_recv_sock have similar
error-handling and thus fixes the leak for TCP-AO.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39852/">CVE-2025-39852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39852">CVE-2025-39852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250258">SUSE bug 1250258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39853</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39853" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39853" ref_url="https://www.suse.com/security/cve/CVE-2025-39853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix potential invalid access when MAC list is empty

list_first_entry() never returns NULL - if the list is empty, it still
returns a pointer to an invalid object, leading to potential invalid
memory access when dereferenced.

Fix this by using list_first_entry_or_null instead of list_first_entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39853/">CVE-2025-39853 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39853">CVE-2025-39853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250275">SUSE bug 1250275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39854</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39854" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39854" ref_url="https://www.suse.com/security/cve/CVE-2025-39854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix NULL access of tx-&gt;in_use in ice_ll_ts_intr

Recent versions of the E810 firmware have support for an extra interrupt to
handle report of the "low latency" Tx timestamps coming from the
specialized low latency firmware interface. Instead of polling the
registers, software can wait until the low latency interrupt is fired.

This logic makes use of the Tx timestamp tracking structure, ice_ptp_tx, as
it uses the same "ready" bitmap to track which Tx timestamps complete.

Unfortunately, the ice_ll_ts_intr() function does not check if the
tracker is initialized before its first access. This results in NULL
dereference or use-after-free bugs similar to the issues fixed in the
ice_ptp_ts_irq() function.

Fix this by only checking the in_use bitmap (and other fields) if the
tracker is marked as initialized. The reset flow will clear the init field
under lock before it tears the tracker down, thus preventing any
use-after-free or NULL access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39854/">CVE-2025-39854 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39854">CVE-2025-39854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250297">SUSE bug 1250297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39857</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39857" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39857" ref_url="https://www.suse.com/security/cve/CVE-2025-39857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync()

BUG: kernel NULL pointer dereference, address: 00000000000002ec
PGD 0 P4D 0
Oops: Oops: 0000 [#1] SMP PTI
CPU: 28 UID: 0 PID: 343 Comm: kworker/28:1 Kdump: loaded Tainted: G        OE       6.17.0-rc2+ #9 NONE
Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
Workqueue: smc_hs_wq smc_listen_work [smc]
RIP: 0010:smc_ib_is_sg_need_sync+0x9e/0xd0 [smc]
...
Call Trace:
 &lt;TASK&gt;
 smcr_buf_map_link+0x211/0x2a0 [smc]
 __smc_buf_create+0x522/0x970 [smc]
 smc_buf_create+0x3a/0x110 [smc]
 smc_find_rdma_v2_device_serv+0x18f/0x240 [smc]
 ? smc_vlan_by_tcpsk+0x7e/0xe0 [smc]
 smc_listen_find_device+0x1dd/0x2b0 [smc]
 smc_listen_work+0x30f/0x580 [smc]
 process_one_work+0x18c/0x340
 worker_thread+0x242/0x360
 kthread+0xe7/0x220
 ret_from_fork+0x13a/0x160
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

If the software RoCE device is used, ibdev-&gt;dma_device is a null pointer.
As a result, the problem occurs. Null pointer detection is added to
prevent problems.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39857/">CVE-2025-39857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39857">CVE-2025-39857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250251">SUSE bug 1250251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39859</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39859" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39859" ref_url="https://www.suse.com/security/cve/CVE-2025-39859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog

The ptp_ocp_detach() only shuts down the watchdog timer if it is
pending. However, if the timer handler is already running, the
timer_delete_sync() is not called. This leads to race conditions
where the devlink that contains the ptp_ocp is deallocated while
the timer handler is still accessing it, resulting in use-after-free
bugs. The following details one of the race scenarios.

(thread 1)                           | (thread 2)
ptp_ocp_remove()                     |
  ptp_ocp_detach()                   | ptp_ocp_watchdog()
    if (timer_pending(&amp;bp-&gt;watchdog))|   bp = timer_container_of()
      timer_delete_sync()            |
                                     |
  devlink_free(devlink) //free       |
                                     |   bp-&gt; //use

Resolve this by unconditionally calling timer_delete_sync() to ensure
the timer is reliably deactivated, preventing any access after free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39859/">CVE-2025-39859 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39859">CVE-2025-39859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250252">SUSE bug 1250252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39860</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39860" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39860" ref_url="https://www.suse.com/security/cve/CVE-2025-39860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen()

syzbot reported the splat below without a repro.

In the splat, a single thread calling bt_accept_dequeue() freed sk
and touched it after that.

The root cause would be the racy l2cap_sock_cleanup_listen() call
added by the cited commit.

bt_accept_dequeue() is called under lock_sock() except for
l2cap_sock_release().

Two threads could see the same socket during the list iteration
in bt_accept_dequeue():

  CPU1                        CPU2 (close())
  ----                        ----
  sock_hold(sk)               sock_hold(sk);
  lock_sock(sk)   &lt;-- block close()
  sock_put(sk)
  bt_accept_unlink(sk)
    sock_put(sk)  &lt;-- refcnt by bt_accept_enqueue()
  release_sock(sk)
                              lock_sock(sk)
                              sock_put(sk)
                              bt_accept_unlink(sk)
                                sock_put(sk)        &lt;-- last refcnt
                              bt_accept_unlink(sk)  &lt;-- UAF

Depending on the timing, the other thread could show up in the
"Freed by task" part.

Let's call l2cap_sock_cleanup_listen() under lock_sock() in
l2cap_sock_release().

[0]:
BUG: KASAN: slab-use-after-free in debug_spin_lock_before kernel/locking/spinlock_debug.c:86 [inline]
BUG: KASAN: slab-use-after-free in do_raw_spin_lock+0x26f/0x2b0 kernel/locking/spinlock_debug.c:115
Read of size 4 at addr ffff88803b7eb1c4 by task syz.5.3276/16995
CPU: 3 UID: 0 PID: 16995 Comm: syz.5.3276 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xcd/0x630 mm/kasan/report.c:482
 kasan_report+0xe0/0x110 mm/kasan/report.c:595
 debug_spin_lock_before kernel/locking/spinlock_debug.c:86 [inline]
 do_raw_spin_lock+0x26f/0x2b0 kernel/locking/spinlock_debug.c:115
 spin_lock_bh include/linux/spinlock.h:356 [inline]
 release_sock+0x21/0x220 net/core/sock.c:3746
 bt_accept_dequeue+0x505/0x600 net/bluetooth/af_bluetooth.c:312
 l2cap_sock_cleanup_listen+0x5c/0x2a0 net/bluetooth/l2cap_sock.c:1451
 l2cap_sock_release+0x5c/0x210 net/bluetooth/l2cap_sock.c:1425
 __sock_release+0xb3/0x270 net/socket.c:649
 sock_close+0x1c/0x30 net/socket.c:1439
 __fput+0x3ff/0xb70 fs/file_table.c:468
 task_work_run+0x14d/0x240 kernel/task_work.c:227
 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
 exit_to_user_mode_loop+0xeb/0x110 kernel/entry/common.c:43
 exit_to_user_mode_prepare include/linux/irq-entry-common.h:225 [inline]
 syscall_exit_to_user_mode_work include/linux/entry-common.h:175 [inline]
 syscall_exit_to_user_mode include/linux/entry-common.h:210 [inline]
 do_syscall_64+0x3f6/0x4c0 arch/x86/entry/syscall_64.c:100
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f2accf8ebe9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffdb6cb1378 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4
RAX: 0000000000000000 RBX: 00000000000426fb RCX: 00007f2accf8ebe9
RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003
RBP: 00007f2acd1b7da0 R08: 0000000000000001 R09: 00000012b6cb166f
R10: 0000001b30e20000 R11: 0000000000000246 R12: 00007f2acd1b609c
R13: 00007f2acd1b6090 R14: ffffffffffffffff R15: 00007ffdb6cb1490
 &lt;/TASK&gt;

Allocated by task 5326:
 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
 kasan_save_track+0x14/0x30 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:388 [inline]
 __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:405
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __do_kmalloc_node mm/slub.c:4365 [inline]
 __kmalloc_nopro
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39860/">CVE-2025-39860 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39860">CVE-2025-39860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250247">SUSE bug 1250247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39861</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39861" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39861" ref_url="https://www.suse.com/security/cve/CVE-2025-39861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: vhci: Prevent use-after-free by removing debugfs files early

Move the creation of debugfs files into a dedicated function, and ensure
they are explicitly removed during vhci_release(), before associated
data structures are freed.

Previously, debugfs files such as "force_suspend", "force_wakeup", and
others were created under hdev-&gt;debugfs but not removed in
vhci_release(). Since vhci_release() frees the backing vhci_data
structure, any access to these files after release would result in
use-after-free errors.

Although hdev-&gt;debugfs is later freed in hci_release_dev(), user can
access files after vhci_data is freed but before hdev-&gt;debugfs is
released.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39861/">CVE-2025-39861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39861">CVE-2025-39861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250249">SUSE bug 1250249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39863</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39863" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39863" ref_url="https://www.suse.com/security/cve/CVE-2025-39863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work

The brcmf_btcoex_detach() only shuts down the btcoex timer, if the
flag timer_on is false. However, the brcmf_btcoex_timerfunc(), which
runs as timer handler, sets timer_on to false. This creates critical
race conditions:

1.If brcmf_btcoex_detach() is called while brcmf_btcoex_timerfunc()
is executing, it may observe timer_on as false and skip the call to
timer_shutdown_sync().

2.The brcmf_btcoex_timerfunc() may then reschedule the brcmf_btcoex_info
worker after the cancel_work_sync() has been executed, resulting in
use-after-free bugs.

The use-after-free bugs occur in two distinct scenarios, depending on
the timing of when the brcmf_btcoex_info struct is freed relative to
the execution of its worker thread.

Scenario 1: Freed before the worker is scheduled

The brcmf_btcoex_info is deallocated before the worker is scheduled.
A race condition can occur when schedule_work(&amp;bt_local-&gt;work) is
called after the target memory has been freed. The sequence of events
is detailed below:

CPU0                           | CPU1
brcmf_btcoex_detach            | brcmf_btcoex_timerfunc
                               |   bt_local-&gt;timer_on = false;
  if (cfg-&gt;btcoex-&gt;timer_on)   |
    ...                        |
  cancel_work_sync();          |
  ...                          |
  kfree(cfg-&gt;btcoex); // FREE  |
                               |   schedule_work(&amp;bt_local-&gt;work); // USE

Scenario 2: Freed after the worker is scheduled

The brcmf_btcoex_info is freed after the worker has been scheduled
but before or during its execution. In this case, statements within
the brcmf_btcoex_handler() - such as the container_of macro and
subsequent dereferences of the brcmf_btcoex_info object will cause
a use-after-free access. The following timeline illustrates this
scenario:

CPU0                            | CPU1
brcmf_btcoex_detach             | brcmf_btcoex_timerfunc
                                |   bt_local-&gt;timer_on = false;
  if (cfg-&gt;btcoex-&gt;timer_on)    |
    ...                         |
  cancel_work_sync();           |
  ...                           |   schedule_work(); // Reschedule
                                |
  kfree(cfg-&gt;btcoex); // FREE   |   brcmf_btcoex_handler() // Worker
  /*                            |     btci = container_of(....); // USE
   The kfree() above could      |     ...
   also occur at any point      |     btci-&gt; // USE
   during the worker's execution|
   */                           |

To resolve the race conditions, drop the conditional check and call
timer_shutdown_sync() directly. It can deactivate the timer reliably,
regardless of its current state. Once stopped, the timer_on state is
then set to false.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39863/">CVE-2025-39863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39863">CVE-2025-39863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250281">SUSE bug 1250281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39864</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39864" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39864" ref_url="https://www.suse.com/security/cve/CVE-2025-39864" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19447" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002178.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: fix use-after-free in cmp_bss()

Following bss_free() quirk introduced in commit 776b3580178f
("cfg80211: track hidden SSID networks properly"), adjust
cfg80211_update_known_bss() to free the last beacon frame
elements only if they're not shared via the corresponding
'hidden_beacon_bss' pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39864/">CVE-2025-39864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39864">CVE-2025-39864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250242">SUSE bug 1250242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39865</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39865" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39865" ref_url="https://www.suse.com/security/cve/CVE-2025-39865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tee: fix NULL pointer dereference in tee_shm_put

tee_shm_put have NULL pointer dereference:

__optee_disable_shm_cache --&gt;
	shm = reg_pair_to_ptr(...);//shm maybe return NULL
        tee_shm_free(shm); --&gt;
		tee_shm_put(shm);//crash

Add check in tee_shm_put to fix it.

panic log:
Unable to handle kernel paging request at virtual address 0000000000100cca
Mem abort info:
ESR = 0x0000000096000004
EC = 0x25: DABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x04: level 0 translation fault
Data abort info:
ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
CM = 0, WnR = 0, TnD = 0, TagAccess = 0
GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
user pgtable: 4k pages, 48-bit VAs, pgdp=0000002049d07000
[0000000000100cca] pgd=0000000000000000, p4d=0000000000000000
Internal error: Oops: 0000000096000004 [#1] SMP
CPU: 2 PID: 14442 Comm: systemd-sleep Tainted: P OE ------- ----
6.6.0-39-generic #38
Source Version: 938b255f6cb8817c95b0dd5c8c2944acfce94b07
Hardware name: greatwall GW-001Y1A-FTH, BIOS Great Wall BIOS V3.0
10/26/2022
pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : tee_shm_put+0x24/0x188
lr : tee_shm_free+0x14/0x28
sp : ffff001f98f9faf0
x29: ffff001f98f9faf0 x28: ffff0020df543cc0 x27: 0000000000000000
x26: ffff001f811344a0 x25: ffff8000818dac00 x24: ffff800082d8d048
x23: ffff001f850fcd18 x22: 0000000000000001 x21: ffff001f98f9fb88
x20: ffff001f83e76218 x19: ffff001f83e761e0 x18: 000000000000ffff
x17: 303a30303a303030 x16: 0000000000000000 x15: 0000000000000003
x14: 0000000000000001 x13: 0000000000000000 x12: 0101010101010101
x11: 0000000000000001 x10: 0000000000000001 x9 : ffff800080e08d0c
x8 : ffff001f98f9fb88 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : ffff001f83e761e0 x1 : 00000000ffff001f x0 : 0000000000100cca
Call trace:
tee_shm_put+0x24/0x188
tee_shm_free+0x14/0x28
__optee_disable_shm_cache+0xa8/0x108
optee_shutdown+0x28/0x38
platform_shutdown+0x28/0x40
device_shutdown+0x144/0x2b0
kernel_power_off+0x3c/0x80
hibernate+0x35c/0x388
state_store+0x64/0x80
kobj_attr_store+0x14/0x28
sysfs_kf_write+0x48/0x60
kernfs_fop_write_iter+0x128/0x1c0
vfs_write+0x270/0x370
ksys_write+0x6c/0x100
__arm64_sys_write+0x20/0x30
invoke_syscall+0x4c/0x120
el0_svc_common.constprop.0+0x44/0xf0
do_el0_svc+0x24/0x38
el0_svc+0x24/0x88
el0t_64_sync_handler+0x134/0x150
el0t_64_sync+0x14c/0x15
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39865/">CVE-2025-39865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39865">CVE-2025-39865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250294">SUSE bug 1250294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39866</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39866" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39866" ref_url="https://www.suse.com/security/cve/CVE-2025-39866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: writeback: fix use-after-free in __mark_inode_dirty()

An use-after-free issue occurred when __mark_inode_dirty() get the
bdi_writeback that was in the progress of switching.

CPU: 1 PID: 562 Comm: systemd-random- Not tainted 6.6.56-gb4403bd46a8e #1
......
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : __mark_inode_dirty+0x124/0x418
lr : __mark_inode_dirty+0x118/0x418
sp : ffffffc08c9dbbc0
........
Call trace:
 __mark_inode_dirty+0x124/0x418
 generic_update_time+0x4c/0x60
 file_modified+0xcc/0xd0
 ext4_buffered_write_iter+0x58/0x124
 ext4_file_write_iter+0x54/0x704
 vfs_write+0x1c0/0x308
 ksys_write+0x74/0x10c
 __arm64_sys_write+0x1c/0x28
 invoke_syscall+0x48/0x114
 el0_svc_common.constprop.0+0xc0/0xe0
 do_el0_svc+0x1c/0x28
 el0_svc+0x40/0xe4
 el0t_64_sync_handler+0x120/0x12c
 el0t_64_sync+0x194/0x198

Root cause is:

systemd-random-seed                         kworker
----------------------------------------------------------------------
___mark_inode_dirty                     inode_switch_wbs_work_fn

  spin_lock(&amp;inode-&gt;i_lock);
  inode_attach_wb
  locked_inode_to_wb_and_lock_list
     get inode-&gt;i_wb
     spin_unlock(&amp;inode-&gt;i_lock);
     spin_lock(&amp;wb-&gt;list_lock)
  spin_lock(&amp;inode-&gt;i_lock)
  inode_io_list_move_locked
  spin_unlock(&amp;wb-&gt;list_lock)
  spin_unlock(&amp;inode-&gt;i_lock)
                                    spin_lock(&amp;old_wb-&gt;list_lock)
                                      inode_do_switch_wbs
                                        spin_lock(&amp;inode-&gt;i_lock)
                                        inode-&gt;i_wb = new_wb
                                        spin_unlock(&amp;inode-&gt;i_lock)
                                    spin_unlock(&amp;old_wb-&gt;list_lock)
                                    wb_put_many(old_wb, nr_switched)
                                      cgwb_release
                                      old wb released
  wb_wakeup_delayed() accesses wb,
  then trigger the use-after-free
  issue

Fix this race condition by holding inode spinlock until
wb_wakeup_delayed() finished.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39866/">CVE-2025-39866 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39866">CVE-2025-39866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250455">SUSE bug 1250455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39869</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39869" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39869" ref_url="https://www.suse.com/security/cve/CVE-2025-39869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: ti: edma: Fix memory allocation size for queue_priority_map

Fix a critical memory allocation bug in edma_setup_from_hw() where
queue_priority_map was allocated with insufficient memory. The code
declared queue_priority_map as s8 (*)[2] (pointer to array of 2 s8),
but allocated memory using sizeof(s8) instead of the correct size.

This caused out-of-bounds memory writes when accessing:
  queue_priority_map[i][0] = i;
  queue_priority_map[i][1] = i;

The bug manifested as kernel crashes with "Oops - undefined instruction"
on ARM platforms (BeagleBoard-X15) during EDMA driver probe, as the
memory corruption triggered kernel hardening features on Clang.

Change the allocation to use sizeof(*queue_priority_map) which
automatically gets the correct size for the 2D array structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39869/">CVE-2025-39869 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39869">CVE-2025-39869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250406">SUSE bug 1250406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39870</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39870" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39870" ref_url="https://www.suse.com/security/cve/CVE-2025-39870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Fix double free in idxd_setup_wqs()

The clean up in idxd_setup_wqs() has had a couple bugs because the error
handling is a bit subtle.  It's simpler to just re-write it in a cleaner
way.  The issues here are:

1) If "idxd-&gt;max_wqs" is &lt;= 0 then we call put_device(conf_dev) when
   "conf_dev" hasn't been initialized.
2) If kzalloc_node() fails then again "conf_dev" is invalid.  It's
   either uninitialized or it points to the "conf_dev" from the
   previous iteration so it leads to a double free.

It's better to free partial loop iterations within the loop and then
the unwinding at the end can handle whole loop iterations.  I also
renamed the labels to describe what the goto does and not where the goto
was located.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39870/">CVE-2025-39870 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39870">CVE-2025-39870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250402">SUSE bug 1250402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39871</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39871" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39871" ref_url="https://www.suse.com/security/cve/CVE-2025-39871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Remove improper idxd_free

The call to idxd_free() introduces a duplicate put_device() leading to a
reference count underflow:
refcount_t: underflow; use-after-free.
WARNING: CPU: 15 PID: 4428 at lib/refcount.c:28 refcount_warn_saturate+0xbe/0x110
...
Call Trace:
 &lt;TASK&gt;
  idxd_remove+0xe4/0x120 [idxd]
  pci_device_remove+0x3f/0xb0
  device_release_driver_internal+0x197/0x200
  driver_detach+0x48/0x90
  bus_remove_driver+0x74/0xf0
  pci_unregister_driver+0x2e/0xb0
  idxd_exit_module+0x34/0x7a0 [idxd]
  __do_sys_delete_module.constprop.0+0x183/0x280
  do_syscall_64+0x54/0xd70
  entry_SYSCALL_64_after_hwframe+0x76/0x7e

The idxd_unregister_devices() which is invoked at the very beginning of
idxd_remove(), already takes care of the necessary put_device() through the
following call path:
idxd_unregister_devices() -&gt; device_unregister() -&gt; put_device()

In addition, when CONFIG_DEBUG_KOBJECT_RELEASE is enabled, put_device() may
trigger asynchronous cleanup via schedule_delayed_work(). If idxd_free() is
called immediately after, it can result in a use-after-free.

Remove the improper idxd_free() to avoid both the refcount underflow and
potential memory corruption during module unload.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39871/">CVE-2025-39871 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39871">CVE-2025-39871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250377">SUSE bug 1250377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39873</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39873" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39873" ref_url="https://www.suse.com/security/cve/CVE-2025-39873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB

can_put_echo_skb() takes ownership of the SKB and it may be freed
during or after the call.

However, xilinx_can xcan_write_frame() keeps using SKB after the call.

Fix that by only calling can_put_echo_skb() after the code is done
touching the SKB.

The tx_lock is held for the entire xcan_write_frame() execution and
also on the can_get_echo_skb() side so the order of operations does not
matter.

An earlier fix commit 3d3c817c3a40 ("can: xilinx_can: Fix usage of skb
memory") did not move the can_put_echo_skb() call far enough.

[mkl: add "commit" in front of sha1 in patch description]
[mkl: fix indention]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39873/">CVE-2025-39873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39873">CVE-2025-39873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250371">SUSE bug 1250371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39875</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39875" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39875" ref_url="https://www.suse.com/security/cve/CVE-2025-39875" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igb: Fix NULL pointer dereference in ethtool loopback test

The igb driver currently causes a NULL pointer dereference when executing
the ethtool loopback test. This occurs because there is no associated
q_vector for the test ring when it is set up, as interrupts are typically
not added to the test rings.

Since commit 5ef44b3cb43b removed the napi_id assignment in
__xdp_rxq_info_reg(), there is no longer a need to pass a napi_id to it.
Therefore, simply use 0 as the last parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39875/">CVE-2025-39875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39875">CVE-2025-39875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250398">SUSE bug 1250398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39876</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39876" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39876" ref_url="https://www.suse.com/security/cve/CVE-2025-39876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable()

The function of_phy_find_device may return NULL, so we need to take
care before dereferencing phy_dev.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39876/">CVE-2025-39876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39876">CVE-2025-39876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250400">SUSE bug 1250400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39877</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39877" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39877" ref_url="https://www.suse.com/security/cve/CVE-2025-39877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/sysfs: fix use-after-free in state_show()

state_show() reads kdamond-&gt;damon_ctx without holding damon_sysfs_lock. 
This allows a use-after-free race:

CPU 0                         CPU 1
-----                         -----
state_show()                  damon_sysfs_turn_damon_on()
ctx = kdamond-&gt;damon_ctx;     mutex_lock(&amp;damon_sysfs_lock);
                              damon_destroy_ctx(kdamond-&gt;damon_ctx);
                              kdamond-&gt;damon_ctx = NULL;
                              mutex_unlock(&amp;damon_sysfs_lock);
damon_is_running(ctx);        /* ctx is freed */
mutex_lock(&amp;ctx-&gt;kdamond_lock); /* UAF */

(The race can also occur with damon_sysfs_kdamonds_rm_dirs() and
damon_sysfs_kdamond_release(), which free or replace the context under
damon_sysfs_lock.)

Fix by taking damon_sysfs_lock before dereferencing the context, mirroring
the locking used in pid_show().

The bug has existed since state_show() first accessed kdamond-&gt;damon_ctx.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39877/">CVE-2025-39877 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39877">CVE-2025-39877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250408">SUSE bug 1250408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39880</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39880" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39880" ref_url="https://www.suse.com/security/cve/CVE-2025-39880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: fix invalid accesses to ceph_connection_v1_info

There is a place where generic code in messenger.c is reading and
another place where it is writing to con-&gt;v1 union member without
checking that the union member is active (i.e. msgr1 is in use).

On 64-bit systems, con-&gt;v1.auth_retry overlaps with con-&gt;v2.out_iter,
so such a read is almost guaranteed to return a bogus value instead of
0 when msgr2 is in use.  This ends up being fairly benign because the
side effect is just the invalidation of the authorizer and successive
fetching of new tickets.

con-&gt;v1.connect_seq overlaps with con-&gt;v2.conn_bufs and the fact that
it's being written to can cause more serious consequences, but luckily
it's not something that happens often.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39880/">CVE-2025-39880 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39880">CVE-2025-39880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250388">SUSE bug 1250388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39881</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39881" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39881" ref_url="https://www.suse.com/security/cve/CVE-2025-39881" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kernfs: Fix UAF in polling when open file is released

A use-after-free (UAF) vulnerability was identified in the PSI (Pressure
Stall Information) monitoring mechanism:

BUG: KASAN: slab-use-after-free in psi_trigger_poll+0x3c/0x140
Read of size 8 at addr ffff3de3d50bd308 by task systemd/1

psi_trigger_poll+0x3c/0x140
cgroup_pressure_poll+0x70/0xa0
cgroup_file_poll+0x8c/0x100
kernfs_fop_poll+0x11c/0x1c0
ep_item_poll.isra.0+0x188/0x2c0

Allocated by task 1:
cgroup_file_open+0x88/0x388
kernfs_fop_open+0x73c/0xaf0
do_dentry_open+0x5fc/0x1200
vfs_open+0xa0/0x3f0
do_open+0x7e8/0xd08
path_openat+0x2fc/0x6b0
do_filp_open+0x174/0x368

Freed by task 8462:
cgroup_file_release+0x130/0x1f8
kernfs_drain_open_files+0x17c/0x440
kernfs_drain+0x2dc/0x360
kernfs_show+0x1b8/0x288
cgroup_file_show+0x150/0x268
cgroup_pressure_write+0x1dc/0x340
cgroup_file_write+0x274/0x548

Reproduction Steps:
1. Open test/cpu.pressure and establish epoll monitoring
2. Disable monitoring: echo 0 &gt; test/cgroup.pressure
3. Re-enable monitoring: echo 1 &gt; test/cgroup.pressure

The race condition occurs because:
1. When cgroup.pressure is disabled (echo 0 &gt; cgroup.pressure), it:
   - Releases PSI triggers via cgroup_file_release()
   - Frees of-&gt;priv through kernfs_drain_open_files()
2. While epoll still holds reference to the file and continues polling
3. Re-enabling (echo 1 &gt; cgroup.pressure) accesses freed of-&gt;priv

epolling			disable/enable cgroup.pressure
fd=open(cpu.pressure)
while(1)
...
epoll_wait
kernfs_fop_poll
kernfs_get_active = true	echo 0 &gt; cgroup.pressure
...				cgroup_file_show
				kernfs_show
				// inactive kn
				kernfs_drain_open_files
				cft-&gt;release(of);
				kfree(ctx);
				...
kernfs_get_active = false
				echo 1 &gt; cgroup.pressure
				kernfs_show
				kernfs_activate_one(kn);
kernfs_fop_poll
kernfs_get_active = true
cgroup_file_poll
psi_trigger_poll
// UAF
...
end: close(fd)

To address this issue, introduce kernfs_get_active_of() for kernfs open
files to obtain active references. This function will fail if the open file
has been released. Replace kernfs_get_active() with kernfs_get_active_of()
to prevent further operations on released file descriptors.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39881/">CVE-2025-39881 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39881">CVE-2025-39881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250379">SUSE bug 1250379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39882</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39882" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39882" ref_url="https://www.suse.com/security/cve/CVE-2025-39882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: fix potential OF node use-after-free

The for_each_child_of_node() helper drops the reference it takes to each
node as it iterates over children and an explicit of_node_put() is only
needed when exiting the loop early.

Drop the recently introduced bogus additional reference count decrement
at each iteration that could potentially lead to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39882/">CVE-2025-39882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39882">CVE-2025-39882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250389">SUSE bug 1250389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39884</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39884" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39884" ref_url="https://www.suse.com/security/cve/CVE-2025-39884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix subvolume deletion lockup caused by inodes xarray race

There is a race condition between inode eviction and inode caching that
can cause a live struct btrfs_inode to be missing from the root-&gt;inodes
xarray. Specifically, there is a window during evict() between the inode
being unhashed and deleted from the xarray. If btrfs_iget() is called
for the same inode in that window, it will be recreated and inserted
into the xarray, but then eviction will delete the new entry, leaving
nothing in the xarray:

Thread 1                          Thread 2
---------------------------------------------------------------
evict()
  remove_inode_hash()
                                  btrfs_iget_path()
                                    btrfs_iget_locked()
                                    btrfs_read_locked_inode()
                                      btrfs_add_inode_to_root()
  destroy_inode()
    btrfs_destroy_inode()
      btrfs_del_inode_from_root()
        __xa_erase

In turn, this can cause issues for subvolume deletion. Specifically, if
an inode is in this lost state, and all other inodes are evicted, then
btrfs_del_inode_from_root() will call btrfs_add_dead_root() prematurely.
If the lost inode has a delayed_node attached to it, then when
btrfs_clean_one_deleted_snapshot() calls btrfs_kill_all_delayed_nodes(),
it will loop forever because the delayed_nodes xarray will never become
empty (unless memory pressure forces the inode out). We saw this
manifest as soft lockups in production.

Fix it by only deleting the xarray entry if it matches the given inode
(using __xa_cmpxchg()).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39884/">CVE-2025-39884 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39884">CVE-2025-39884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250386">SUSE bug 1250386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39885</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39885" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39885" ref_url="https://www.suse.com/security/cve/CVE-2025-39885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix recursive semaphore deadlock in fiemap call

syzbot detected a OCFS2 hang due to a recursive semaphore on a
FS_IOC_FIEMAP of the extent list on a specially crafted mmap file.

context_switch kernel/sched/core.c:5357 [inline]
   __schedule+0x1798/0x4cc0 kernel/sched/core.c:6961
   __schedule_loop kernel/sched/core.c:7043 [inline]
   schedule+0x165/0x360 kernel/sched/core.c:7058
   schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:7115
   rwsem_down_write_slowpath+0x872/0xfe0 kernel/locking/rwsem.c:1185
   __down_write_common kernel/locking/rwsem.c:1317 [inline]
   __down_write kernel/locking/rwsem.c:1326 [inline]
   down_write+0x1ab/0x1f0 kernel/locking/rwsem.c:1591
   ocfs2_page_mkwrite+0x2ff/0xc40 fs/ocfs2/mmap.c:142
   do_page_mkwrite+0x14d/0x310 mm/memory.c:3361
   wp_page_shared mm/memory.c:3762 [inline]
   do_wp_page+0x268d/0x5800 mm/memory.c:3981
   handle_pte_fault mm/memory.c:6068 [inline]
   __handle_mm_fault+0x1033/0x5440 mm/memory.c:6195
   handle_mm_fault+0x40a/0x8e0 mm/memory.c:6364
   do_user_addr_fault+0x764/0x1390 arch/x86/mm/fault.c:1387
   handle_page_fault arch/x86/mm/fault.c:1476 [inline]
   exc_page_fault+0x76/0xf0 arch/x86/mm/fault.c:1532
   asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623
RIP: 0010:copy_user_generic arch/x86/include/asm/uaccess_64.h:126 [inline]
RIP: 0010:raw_copy_to_user arch/x86/include/asm/uaccess_64.h:147 [inline]
RIP: 0010:_inline_copy_to_user include/linux/uaccess.h:197 [inline]
RIP: 0010:_copy_to_user+0x85/0xb0 lib/usercopy.c:26
Code: e8 00 bc f7 fc 4d 39 fc 72 3d 4d 39 ec 77 38 e8 91 b9 f7 fc 4c 89
f7 89 de e8 47 25 5b fd 0f 01 cb 4c 89 ff 48 89 d9 4c 89 f6 &lt;f3&gt; a4 0f
1f 00 48 89 cb 0f 01 ca 48 89 d8 5b 41 5c 41 5d 41 5e 41
RSP: 0018:ffffc9000403f950 EFLAGS: 00050256
RAX: ffffffff84c7f101 RBX: 0000000000000038 RCX: 0000000000000038
RDX: 0000000000000000 RSI: ffffc9000403f9e0 RDI: 0000200000000060
RBP: ffffc9000403fa90 R08: ffffc9000403fa17 R09: 1ffff92000807f42
R10: dffffc0000000000 R11: fffff52000807f43 R12: 0000200000000098
R13: 00007ffffffff000 R14: ffffc9000403f9e0 R15: 0000200000000060
   copy_to_user include/linux/uaccess.h:225 [inline]
   fiemap_fill_next_extent+0x1c0/0x390 fs/ioctl.c:145
   ocfs2_fiemap+0x888/0xc90 fs/ocfs2/extent_map.c:806
   ioctl_fiemap fs/ioctl.c:220 [inline]
   do_vfs_ioctl+0x1173/0x1430 fs/ioctl.c:532
   __do_sys_ioctl fs/ioctl.c:596 [inline]
   __se_sys_ioctl+0x82/0x170 fs/ioctl.c:584
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f5f13850fd9
RSP: 002b:00007ffe3b3518b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f5f13850fd9
RDX: 0000200000000040 RSI: 00000000c020660b RDI: 0000000000000004
RBP: 6165627472616568 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe3b3518f0
R13: 00007ffe3b351b18 R14: 431bde82d7b634db R15: 00007f5f1389a03b

ocfs2_fiemap() takes a read lock of the ip_alloc_sem semaphore (since
v2.6.22-527-g7307de80510a) and calls fiemap_fill_next_extent() to read the
extent list of this running mmap executable.  The user supplied buffer to
hold the fiemap information page faults calling ocfs2_page_mkwrite() which
will take a write lock (since v2.6.27-38-g00dc417fa3e7) of the same
semaphore.  This recursive semaphore will hold filesystem locks and causes
a hang of the fileystem.

The ip_alloc_sem protects the inode extent list and size.  Release the
read semphore before calling fiemap_fill_next_extent() in ocfs2_fiemap()
and ocfs2_fiemap_inline().  This does an unnecessary semaphore lock/unlock
on the last extent but simplifies the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39885/">CVE-2025-39885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39885">CVE-2025-39885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250407">SUSE bug 1250407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39889</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39889" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39889" ref_url="https://www.suse.com/security/cve/CVE-2025-39889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: l2cap: Check encryption key size on incoming connection

This is required for passing GAP/SEC/SEM/BI-04-C PTS test case:
  Security Mode 4 Level 4, Responder - Invalid Encryption Key Size
  - 128 bit

This tests the security key with size from 1 to 15 bytes while the
Security Mode 4 Level 4 requests 16 bytes key size.

Currently PTS fails with the following logs:
- expected:Connection Response:
    Code: [3 (0x03)] Code
    Identifier: (lt)WildCard: Exists(gt)
    Length: [8 (0x0008)]
    Destination CID: (lt)WildCard: Exists(gt)
    Source CID: [64 (0x0040)]
    Result: [3 (0x0003)] Connection refused - Security block
    Status: (lt)WildCard: Exists(gt),
but received:Connection Response:
    Code: [3 (0x03)] Code
    Identifier: [1 (0x01)]
    Length: [8 (0x0008)]
    Destination CID: [64 (0x0040)]
    Source CID: [64 (0x0040)]
    Result: [0 (0x0000)] Connection Successful
    Status: [0 (0x0000)] No further information available

And HCI logs:
&lt; HCI Command: Read Encrypti.. (0x05|0x0008) plen 2
        Handle: 14 Address: 00:1B:DC:F2:24:10 (Vencer Co., Ltd.)
&gt; HCI Event: Command Complete (0x0e) plen 7
      Read Encryption Key Size (0x05|0x0008) ncmd 1
        Status: Success (0x00)
        Handle: 14 Address: 00:1B:DC:F2:24:10 (Vencer Co., Ltd.)
        Key size: 7
&gt; ACL Data RX: Handle 14 flags 0x02 dlen 12
      L2CAP: Connection Request (0x02) ident 1 len 4
        PSM: 4097 (0x1001)
        Source CID: 64
&lt; ACL Data TX: Handle 14 flags 0x00 dlen 16
      L2CAP: Connection Response (0x03) ident 1 len 8
        Destination CID: 64
        Source CID: 64
        Result: Connection successful (0x0000)
        Status: No further information available (0x0000)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39889/">CVE-2025-39889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39889">CVE-2025-39889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249833">SUSE bug 1249833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39890</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39890" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39890" ref_url="https://www.suse.com/security/cve/CVE-2025-39890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event

Currently, in ath12k_service_ready_ext_event(), svc_rdy_ext.mac_phy_caps
is not freed in the failure case, causing a memory leak. The following
trace is observed in kmemleak:

unreferenced object 0xffff8b3eb5789c00 (size 1024):
 comm "softirq", pid 0, jiffies 4294942577
 hex dump (first 32 bytes):
   00 00 00 00 01 00 00 00 00 00 00 00 7b 00 00 10  ............{...
   01 00 00 00 00 00 00 00 01 00 00 00 1f 38 00 00  .............8..
 backtrace (crc 44e1c357):
   __kmalloc_noprof+0x30b/0x410
   ath12k_wmi_mac_phy_caps_parse+0x84/0x100 [ath12k]
   ath12k_wmi_tlv_iter+0x5e/0x140 [ath12k]
   ath12k_wmi_svc_rdy_ext_parse+0x308/0x4c0 [ath12k]
   ath12k_wmi_tlv_iter+0x5e/0x140 [ath12k]
   ath12k_service_ready_ext_event.isra.0+0x44/0xd0 [ath12k]
   ath12k_wmi_op_rx+0x2eb/0xd70 [ath12k]
   ath12k_htc_rx_completion_handler+0x1f4/0x330 [ath12k]
   ath12k_ce_recv_process_cb+0x218/0x300 [ath12k]
   ath12k_pci_ce_workqueue+0x1b/0x30 [ath12k]
   process_one_work+0x219/0x680
   bh_worker+0x198/0x1f0
   tasklet_action+0x13/0x30
   handle_softirqs+0xca/0x460
   __irq_exit_rcu+0xbe/0x110
   irq_exit_rcu+0x9/0x30

Free svc_rdy_ext.mac_phy_caps in the error case to fix this memory leak.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39890/">CVE-2025-39890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39890">CVE-2025-39890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250334">SUSE bug 1250334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250488">SUSE bug 1250488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39891</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39891" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39891" ref_url="https://www.suse.com/security/cve/CVE-2025-39891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Initialize the chan_stats array to zero

The adapter-&gt;chan_stats[] array is initialized in
mwifiex_init_channel_scan_gap() with vmalloc(), which doesn't zero out
memory.  The array is filled in mwifiex_update_chan_statistics()
and then the user can query the data in mwifiex_cfg80211_dump_survey().

There are two potential issues here.  What if the user calls
mwifiex_cfg80211_dump_survey() before the data has been filled in.
Also the mwifiex_update_chan_statistics() function doesn't necessarily
initialize the whole array.  Since the array was not initialized at
the start that could result in an information leak.

Also this array is pretty small.  It's a maximum of 900 bytes so it's
more appropriate to use kcalloc() instead vmalloc().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39891/">CVE-2025-39891 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39891">CVE-2025-39891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250712">SUSE bug 1250712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39895</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39895" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39895" ref_url="https://www.suse.com/security/cve/CVE-2025-39895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched: Fix sched_numa_find_nth_cpu() if mask offline

sched_numa_find_nth_cpu() uses a bsearch to look for the 'closest'
CPU in sched_domains_numa_masks and given cpus mask. However they
might not intersect if all CPUs in the cpus mask are offline. bsearch
will return NULL in that case, bail out instead of dereferencing a
bogus pointer.

The previous behaviour lead to this bug when using maxcpus=4 on an
rk3399 (LLLLbb) (i.e. booting with all big CPUs offline):

[    1.422922] Unable to handle kernel paging request at virtual address ffffff8000000000
[    1.423635] Mem abort info:
[    1.423889]   ESR = 0x0000000096000006
[    1.424227]   EC = 0x25: DABT (current EL), IL = 32 bits
[    1.424715]   SET = 0, FnV = 0
[    1.424995]   EA = 0, S1PTW = 0
[    1.425279]   FSC = 0x06: level 2 translation fault
[    1.425735] Data abort info:
[    1.425998]   ISV = 0, ISS = 0x00000006, ISS2 = 0x00000000
[    1.426499]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[    1.426952]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[    1.427428] swapper pgtable: 4k pages, 39-bit VAs, pgdp=0000000004a9f000
[    1.428038] [ffffff8000000000] pgd=18000000f7fff403, p4d=18000000f7fff403, pud=18000000f7fff403, pmd=0000000000000000
[    1.429014] Internal error: Oops: 0000000096000006 [#1]  SMP
[    1.429525] Modules linked in:
[    1.429813] CPU: 3 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.17.0-rc4-dirty #343 PREEMPT
[    1.430559] Hardware name: Pine64 RockPro64 v2.1 (DT)
[    1.431012] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    1.431634] pc : sched_numa_find_nth_cpu+0x2a0/0x488
[    1.432094] lr : sched_numa_find_nth_cpu+0x284/0x488
[    1.432543] sp : ffffffc084e1b960
[    1.432843] x29: ffffffc084e1b960 x28: ffffff80078a8800 x27: ffffffc0846eb1d0
[    1.433495] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[    1.434144] x23: 0000000000000000 x22: fffffffffff7f093 x21: ffffffc081de6378
[    1.434792] x20: 0000000000000000 x19: 0000000ffff7f093 x18: 00000000ffffffff
[    1.435441] x17: 3030303866666666 x16: 66663d736b73616d x15: ffffffc104e1b5b7
[    1.436091] x14: 0000000000000000 x13: ffffffc084712860 x12: 0000000000000372
[    1.436739] x11: 0000000000000126 x10: ffffffc08476a860 x9 : ffffffc084712860
[    1.437389] x8 : 00000000ffffefff x7 : ffffffc08476a860 x6 : 0000000000000000
[    1.438036] x5 : 000000000000bff4 x4 : 0000000000000000 x3 : 0000000000000000
[    1.438683] x2 : 0000000000000000 x1 : ffffffc0846eb000 x0 : ffffff8000407b68
[    1.439332] Call trace:
[    1.439559]  sched_numa_find_nth_cpu+0x2a0/0x488 (P)
[    1.440016]  smp_call_function_any+0xc8/0xd0
[    1.440416]  armv8_pmu_init+0x58/0x27c
[    1.440770]  armv8_cortex_a72_pmu_init+0x20/0x2c
[    1.441199]  arm_pmu_device_probe+0x1e4/0x5e8
[    1.441603]  armv8_pmu_device_probe+0x1c/0x28
[    1.442007]  platform_probe+0x5c/0xac
[    1.442347]  really_probe+0xbc/0x298
[    1.442683]  __driver_probe_device+0x78/0x12c
[    1.443087]  driver_probe_device+0xdc/0x160
[    1.443475]  __driver_attach+0x94/0x19c
[    1.443833]  bus_for_each_dev+0x74/0xd4
[    1.444190]  driver_attach+0x24/0x30
[    1.444525]  bus_add_driver+0xe4/0x208
[    1.444874]  driver_register+0x60/0x128
[    1.445233]  __platform_driver_register+0x24/0x30
[    1.445662]  armv8_pmu_driver_init+0x28/0x4c
[    1.446059]  do_one_initcall+0x44/0x25c
[    1.446416]  kernel_init_freeable+0x1dc/0x3bc
[    1.446820]  kernel_init+0x20/0x1d8
[    1.447151]  ret_from_fork+0x10/0x20
[    1.447493] Code: 90022e21 f000e5f5 910de2b5 2a1703e2 (f8767803)
[    1.448040] ---[ end trace 0000000000000000 ]---
[    1.448483] note: swapper/0[1] exited with preempt_count 1
[    1.449047] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b
[    1.449741] SMP: stopping secondary CPUs
[    1.450105] Kernel Offset: disabled
[    1.450419] CPU features: 0x000000,00080000,20002001,0400421b
[    
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39895/">CVE-2025-39895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39895">CVE-2025-39895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250721">SUSE bug 1250721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39896</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39896" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39896" ref_url="https://www.suse.com/security/cve/CVE-2025-39896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

accel/ivpu: Prevent recovery work from being queued during device removal

Use disable_work_sync() instead of cancel_work_sync() in ivpu_dev_fini()
to ensure that no new recovery work items can be queued after device
removal has started. Previously, recovery work could be scheduled even
after canceling existing work, potentially leading to use-after-free
bugs if recovery accessed freed resources.

Rename ivpu_pm_cancel_recovery() to ivpu_pm_disable_recovery() to better
reflect its new behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39896/">CVE-2025-39896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39896">CVE-2025-39896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250716">SUSE bug 1250716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250717">SUSE bug 1250717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39897</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39897" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39897" ref_url="https://www.suse.com/security/cve/CVE-2025-39897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: xilinx: axienet: Add error handling for RX metadata pointer retrieval

Add proper error checking for dmaengine_desc_get_metadata_ptr() which
can return an error pointer and lead to potential crashes or undefined
behaviour if the pointer retrieval fails.

Properly handle the error by unmapping DMA buffer, freeing the skb and
returning early to prevent further processing with invalid data.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39897/">CVE-2025-39897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39897">CVE-2025-39897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250746">SUSE bug 1250746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39898</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39898" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39898" ref_url="https://www.suse.com/security/cve/CVE-2025-39898" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002295.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002268.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1581" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39898/">CVE-2025-39898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39898">CVE-2025-39898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250742">SUSE bug 1250742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250744">SUSE bug 1250744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253291">SUSE bug 1253291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39899</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39899" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39899" ref_url="https://www.suse.com/security/cve/CVE-2025-39899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/userfaultfd: fix kmap_local LIFO ordering for CONFIG_HIGHPTE

With CONFIG_HIGHPTE on 32-bit ARM, move_pages_pte() maps PTE pages using
kmap_local_page(), which requires unmapping in Last-In-First-Out order.

The current code maps dst_pte first, then src_pte, but unmaps them in the
same order (dst_pte, src_pte), violating the LIFO requirement.  This
causes the warning in kunmap_local_indexed():

  WARNING: CPU: 0 PID: 604 at mm/highmem.c:622 kunmap_local_indexed+0x178/0x17c
  addr \!= __fix_to_virt(FIX_KMAP_BEGIN + idx)

Fix this by reversing the unmap order to respect LIFO ordering.

This issue follows the same pattern as similar fixes:
- commit eca6828403b8 ("crypto: skcipher - fix mismatch between mapping and unmapping order")
- commit 8cf57c6df818 ("nilfs2: eliminate staggered calls to kunmap in nilfs_rename")

Both of which addressed the same fundamental requirement that kmap_local
operations must follow LIFO ordering.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39899/">CVE-2025-39899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39899">CVE-2025-39899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250739">SUSE bug 1250739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39900</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39900" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39900" ref_url="https://www.suse.com/security/cve/CVE-2025-39900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net_sched: gen_estimator: fix est_timer() vs CONFIG_PREEMPT_RT=y

syzbot reported a WARNING in est_timer() [1]

Problem here is that with CONFIG_PREEMPT_RT=y, timer callbacks
can be preempted.

Adopt preempt_disable_nested()/preempt_enable_nested() to fix this.

[1]
 WARNING: CPU: 0 PID: 16 at ./include/linux/seqlock.h:221 __seqprop_assert include/linux/seqlock.h:221 [inline]
 WARNING: CPU: 0 PID: 16 at ./include/linux/seqlock.h:221 est_timer+0x6dc/0x9f0 net/core/gen_estimator.c:93
Modules linked in:
CPU: 0 UID: 0 PID: 16 Comm: ktimers/0 Not tainted syzkaller #0 PREEMPT_{RT,(full)}
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
 RIP: 0010:__seqprop_assert include/linux/seqlock.h:221 [inline]
 RIP: 0010:est_timer+0x6dc/0x9f0 net/core/gen_estimator.c:93
Call Trace:
 &lt;TASK&gt;
  call_timer_fn+0x17e/0x5f0 kernel/time/timer.c:1747
  expire_timers kernel/time/timer.c:1798 [inline]
  __run_timers kernel/time/timer.c:2372 [inline]
  __run_timer_base+0x648/0x970 kernel/time/timer.c:2384
  run_timer_base kernel/time/timer.c:2393 [inline]
  run_timer_softirq+0xb7/0x180 kernel/time/timer.c:2403
  handle_softirqs+0x22c/0x710 kernel/softirq.c:579
  __do_softirq kernel/softirq.c:613 [inline]
  run_ktimerd+0xcf/0x190 kernel/softirq.c:1043
  smpboot_thread_fn+0x53f/0xa60 kernel/smpboot.c:160
  kthread+0x70e/0x8a0 kernel/kthread.c:463
  ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39900/">CVE-2025-39900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39900">CVE-2025-39900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250758">SUSE bug 1250758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39902</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39902" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39902" ref_url="https://www.suse.com/security/cve/CVE-2025-39902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/slub: avoid accessing metadata when pointer is invalid in object_err()

object_err() reports details of an object for further debugging, such as
the freelist pointer, redzone, etc. However, if the pointer is invalid,
attempting to access object metadata can lead to a crash since it does
not point to a valid object.

One known path to the crash is when alloc_consistency_checks()
determines the pointer to the allocated object is invalid because of a
freelist corruption, and calls object_err() to report it. The debug code
should report and handle the corruption gracefully and not crash in the
process.

In case the pointer is NULL or check_valid_pointer() returns false for
the pointer, only print the pointer value and skip accessing metadata.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39902/">CVE-2025-39902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39902">CVE-2025-39902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250702">SUSE bug 1250702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39903</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39903" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39903" ref_url="https://www.suse.com/security/cve/CVE-2025-39903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of_numa: fix uninitialized memory nodes causing kernel panic

When there are memory-only nodes (nodes without CPUs), these nodes are not
properly initialized, causing kernel panic during boot.

of_numa_init
	of_numa_parse_cpu_nodes
		node_set(nid, numa_nodes_parsed);
	of_numa_parse_memory_nodes

In of_numa_parse_cpu_nodes, numa_nodes_parsed gets updated only for nodes
containing CPUs.  Memory-only nodes should have been updated in
of_numa_parse_memory_nodes, but they weren't.

Subsequently, when free_area_init() attempts to access NODE_DATA() for
these uninitialized memory nodes, the kernel panics due to NULL pointer
dereference.

This can be reproduced on ARM64 QEMU with 1 CPU and 2 memory nodes:

qemu-system-aarch64 \
-cpu host -nographic \
-m 4G -smp 1 \
-machine virt,accel=kvm,gic-version=3,iommu=smmuv3 \
-object memory-backend-ram,size=2G,id=mem0 \
-object memory-backend-ram,size=2G,id=mem1 \
-numa node,nodeid=0,memdev=mem0 \
-numa node,nodeid=1,memdev=mem1 \
-kernel $IMAGE \
-hda $DISK \
-append "console=ttyAMA0 root=/dev/vda rw earlycon"

[    0.000000] Booting Linux on physical CPU 0x0000000000 [0x481fd010]
[    0.000000] Linux version 6.17.0-rc1-00001-gabb4b3daf18c-dirty (yintirui@local) (gcc (GCC) 12.3.1, GNU ld (GNU Binutils) 2.41) #52 SMP PREEMPT Mon Aug 18 09:49:40 CST 2025
[    0.000000] KASLR enabled
[    0.000000] random: crng init done
[    0.000000] Machine model: linux,dummy-virt
[    0.000000] efi: UEFI not found.
[    0.000000] earlycon: pl11 at MMIO 0x0000000009000000 (options '')
[    0.000000] printk: legacy bootconsole [pl11] enabled
[    0.000000] OF: reserved mem: Reserved memory: No reserved-memory node in the DT
[    0.000000] NODE_DATA(0) allocated [mem 0xbfffd9c0-0xbfffffff]
[    0.000000] node 1 must be removed before remove section 23
[    0.000000] Zone ranges:
[    0.000000]   DMA      [mem 0x0000000040000000-0x00000000ffffffff]
[    0.000000]   DMA32    empty
[    0.000000]   Normal   [mem 0x0000000100000000-0x000000013fffffff]
[    0.000000] Movable zone start for each node
[    0.000000] Early memory node ranges
[    0.000000]   node   0: [mem 0x0000000040000000-0x00000000bfffffff]
[    0.000000]   node   1: [mem 0x00000000c0000000-0x000000013fffffff]
[    0.000000] Initmem setup node 0 [mem 0x0000000040000000-0x00000000bfffffff]
[    0.000000] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a0
[    0.000000] Mem abort info:
[    0.000000]   ESR = 0x0000000096000004
[    0.000000]   EC = 0x25: DABT (current EL), IL = 32 bits
[    0.000000]   SET = 0, FnV = 0
[    0.000000]   EA = 0, S1PTW = 0
[    0.000000]   FSC = 0x04: level 0 translation fault
[    0.000000] Data abort info:
[    0.000000]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[    0.000000]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[    0.000000]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[    0.000000] [00000000000000a0] user address but active_mm is swapper
[    0.000000] Internal error: Oops: 0000000096000004 [#1]  SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.17.0-rc1-00001-g760c6dabf762-dirty #54 PREEMPT
[    0.000000] Hardware name: linux,dummy-virt (DT)
[    0.000000] pstate: 800000c5 (Nzcv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : free_area_init+0x50c/0xf9c
[    0.000000] lr : free_area_init+0x5c0/0xf9c
[    0.000000] sp : ffffa02ca0f33c00
[    0.000000] x29: ffffa02ca0f33cb0 x28: 0000000000000000 x27: 0000000000000000
[    0.000000] x26: 4ec4ec4ec4ec4ec5 x25: 00000000000c0000 x24: 00000000000c0000
[    0.000000] x23: 0000000000040000 x22: 0000000000000000 x21: ffffa02ca0f3b368
[    0.000000] x20: ffffa02ca14c7b98 x19: 0000000000000000 x18: 0000000000000002
[    0.000000] x17: 000000000000cacc x16: 0000000000000001 x15: 0000000000000001
[    0.000000] x14: 0000000080000000 x13: 0000000000000018 x12: 0000000000000002
[    0.0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39903/">CVE-2025-39903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39903">CVE-2025-39903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250749">SUSE bug 1250749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39907</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39907" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39907" ref_url="https://www.suse.com/security/cve/CVE-2025-39907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer

Avoid below overlapping mappings by using a contiguous
non-cacheable buffer.

[    4.077708] DMA-API: stm32_fmc2_nfc 48810000.nand-controller: cacheline tracking EEXIST,
overlapping mappings aren't supported
[    4.089103] WARNING: CPU: 1 PID: 44 at kernel/dma/debug.c:568 add_dma_entry+0x23c/0x300
[    4.097071] Modules linked in:
[    4.100101] CPU: 1 PID: 44 Comm: kworker/u4:2 Not tainted 6.1.82 #1
[    4.106346] Hardware name: STMicroelectronics STM32MP257F VALID1 SNOR / MB1704 (LPDDR4 Power discrete) + MB1703 + MB1708 (SNOR MB1730) (DT)
[    4.118824] Workqueue: events_unbound deferred_probe_work_func
[    4.124674] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    4.131624] pc : add_dma_entry+0x23c/0x300
[    4.135658] lr : add_dma_entry+0x23c/0x300
[    4.139792] sp : ffff800009dbb490
[    4.143016] x29: ffff800009dbb4a0 x28: 0000000004008022 x27: ffff8000098a6000
[    4.150174] x26: 0000000000000000 x25: ffff8000099e7000 x24: ffff8000099e7de8
[    4.157231] x23: 00000000ffffffff x22: 0000000000000000 x21: ffff8000098a6a20
[    4.164388] x20: ffff000080964180 x19: ffff800009819ba0 x18: 0000000000000006
[    4.171545] x17: 6361727420656e69 x16: 6c6568636163203a x15: 72656c6c6f72746e
[    4.178602] x14: 6f632d646e616e2e x13: ffff800009832f58 x12: 00000000000004ec
[    4.185759] x11: 00000000000001a4 x10: ffff80000988af58 x9 : ffff800009832f58
[    4.192916] x8 : 00000000ffffefff x7 : ffff80000988af58 x6 : 80000000fffff000
[    4.199972] x5 : 000000000000bff4 x4 : 0000000000000000 x3 : 0000000000000000
[    4.207128] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000812d2c40
[    4.214185] Call trace:
[    4.216605]  add_dma_entry+0x23c/0x300
[    4.220338]  debug_dma_map_sg+0x198/0x350
[    4.224373]  __dma_map_sg_attrs+0xa0/0x110
[    4.228411]  dma_map_sg_attrs+0x10/0x2c
[    4.232247]  stm32_fmc2_nfc_xfer.isra.0+0x1c8/0x3fc
[    4.237088]  stm32_fmc2_nfc_seq_read_page+0xc8/0x174
[    4.242127]  nand_read_oob+0x1d4/0x8e0
[    4.245861]  mtd_read_oob_std+0x58/0x84
[    4.249596]  mtd_read_oob+0x90/0x150
[    4.253231]  mtd_read+0x68/0xac
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39907/">CVE-2025-39907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39907">CVE-2025-39907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250713">SUSE bug 1250713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39909</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39909" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39909" ref_url="https://www.suse.com/security/cve/CVE-2025-39909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()

Patch series "mm/damon: avoid divide-by-zero in DAMON module's parameters
application".

DAMON's RECLAIM and LRU_SORT modules perform no validation on
user-configured parameters during application, which may lead to
division-by-zero errors.

Avoid the divide-by-zero by adding validation checks when DAMON modules
attempt to apply the parameters.


This patch (of 2):

During the calculation of 'hot_thres' and 'cold_thres', either
'sample_interval' or 'aggr_interval' is used as the divisor, which may
lead to division-by-zero errors.  Fix it by directly returning -EINVAL
when such a case occurs.  Additionally, since 'aggr_interval' is already
required to be set no smaller than 'sample_interval' in damon_set_attrs(),
only the case where 'sample_interval' is zero needs to be checked.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39909/">CVE-2025-39909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39909">CVE-2025-39909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250711">SUSE bug 1250711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39910</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39910" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39910" ref_url="https://www.suse.com/security/cve/CVE-2025-39910" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc()

kasan_populate_vmalloc() and its helpers ignore the caller's gfp_mask and
always allocate memory using the hardcoded GFP_KERNEL flag.  This makes
them inconsistent with vmalloc(), which was recently extended to support
GFP_NOFS and GFP_NOIO allocations.

Page table allocations performed during shadow population also ignore the
external gfp_mask.  To preserve the intended semantics of GFP_NOFS and
GFP_NOIO, wrap the apply_to_page_range() calls into the appropriate
memalloc scope.

xfs calls vmalloc with GFP_NOFS, so this bug could lead to deadlock.

There was a report here
https://lkml.kernel.org/r/686ea951.050a0220.385921.0016.GAE@google.com

This patch:
 - Extends kasan_populate_vmalloc() and helpers to take gfp_mask;
 - Passes gfp_mask down to alloc_pages_bulk() and __get_free_page();
 - Enforces GFP_NOFS/NOIO semantics with memalloc_*_save()/restore()
   around apply_to_page_range();
 - Updates vmalloc.c and percpu allocator call sites accordingly.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39910/">CVE-2025-39910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39910">CVE-2025-39910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250709">SUSE bug 1250709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39911</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39911" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39911" ref_url="https://www.suse.com/security/cve/CVE-2025-39911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path

If request_irq() in i40e_vsi_request_irq_msix() fails in an iteration
later than the first, the error path wants to free the IRQs requested
so far. However, it uses the wrong dev_id argument for free_irq(), so
it does not free the IRQs correctly and instead triggers the warning:

 Trying to free already-free IRQ 173
 WARNING: CPU: 25 PID: 1091 at kernel/irq/manage.c:1829 __free_irq+0x192/0x2c0
 Modules linked in: i40e(+) [...]
 CPU: 25 UID: 0 PID: 1091 Comm: NetworkManager Not tainted 6.17.0-rc1+ #1 PREEMPT(lazy)
 Hardware name: [...]
 RIP: 0010:__free_irq+0x192/0x2c0
 [...]
 Call Trace:
  &lt;TASK&gt;
  free_irq+0x32/0x70
  i40e_vsi_request_irq_msix.cold+0x63/0x8b [i40e]
  i40e_vsi_request_irq+0x79/0x80 [i40e]
  i40e_vsi_open+0x21f/0x2f0 [i40e]
  i40e_open+0x63/0x130 [i40e]
  __dev_open+0xfc/0x210
  __dev_change_flags+0x1fc/0x240
  netif_change_flags+0x27/0x70
  do_setlink.isra.0+0x341/0xc70
  rtnl_newlink+0x468/0x860
  rtnetlink_rcv_msg+0x375/0x450
  netlink_rcv_skb+0x5c/0x110
  netlink_unicast+0x288/0x3c0
  netlink_sendmsg+0x20d/0x430
  ____sys_sendmsg+0x3a2/0x3d0
  ___sys_sendmsg+0x99/0xe0
  __sys_sendmsg+0x8a/0xf0
  do_syscall_64+0x82/0x2c0
  entry_SYSCALL_64_after_hwframe+0x76/0x7e
  [...]
  &lt;/TASK&gt;
 ---[ end trace 0000000000000000 ]---

Use the same dev_id for free_irq() as for request_irq().

I tested this with inserting code to fail intentionally.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39911/">CVE-2025-39911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39911">CVE-2025-39911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250704">SUSE bug 1250704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39913</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39913" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39913" ref_url="https://www.suse.com/security/cve/CVE-2025-39913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-&gt;cork.

syzbot reported the splat below. [0]

The repro does the following:

  1. Load a sk_msg prog that calls bpf_msg_cork_bytes(msg, cork_bytes)
  2. Attach the prog to a SOCKMAP
  3. Add a socket to the SOCKMAP
  4. Activate fault injection
  5. Send data less than cork_bytes

At 5., the data is carried over to the next sendmsg() as it is
smaller than the cork_bytes specified by bpf_msg_cork_bytes().

Then, tcp_bpf_send_verdict() tries to allocate psock-&gt;cork to hold
the data, but this fails silently due to fault injection + __GFP_NOWARN.

If the allocation fails, we need to revert the sk-&gt;sk_forward_alloc
change done by sk_msg_alloc().

Let's call sk_msg_free() when tcp_bpf_send_verdict fails to allocate
psock-&gt;cork.

The "*copied" also needs to be updated such that a proper error can
be returned to the caller, sendmsg. It fails to allocate psock-&gt;cork.
Nothing has been corked so far, so this patch simply sets "*copied"
to 0.

[0]:
WARNING: net/ipv4/af_inet.c:156 at inet_sock_destruct+0x623/0x730 net/ipv4/af_inet.c:156, CPU#1: syz-executor/5983
Modules linked in:
CPU: 1 UID: 0 PID: 5983 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
RIP: 0010:inet_sock_destruct+0x623/0x730 net/ipv4/af_inet.c:156
Code: 0f 0b 90 e9 62 fe ff ff e8 7a db b5 f7 90 0f 0b 90 e9 95 fe ff ff e8 6c db b5 f7 90 0f 0b 90 e9 bb fe ff ff e8 5e db b5 f7 90 &lt;0f&gt; 0b 90 e9 e1 fe ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 9f fc
RSP: 0018:ffffc90000a08b48 EFLAGS: 00010246
RAX: ffffffff8a09d0b2 RBX: dffffc0000000000 RCX: ffff888024a23c80
RDX: 0000000000000100 RSI: 0000000000000fff RDI: 0000000000000000
RBP: 0000000000000fff R08: ffff88807e07c627 R09: 1ffff1100fc0f8c4
R10: dffffc0000000000 R11: ffffed100fc0f8c5 R12: ffff88807e07c380
R13: dffffc0000000000 R14: ffff88807e07c60c R15: 1ffff1100fc0f872
FS:  00005555604c4500(0000) GS:ffff888125af1000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005555604df5c8 CR3: 0000000032b06000 CR4: 00000000003526f0
Call Trace:
 &lt;IRQ&gt;
 __sk_destruct+0x86/0x660 net/core/sock.c:2339
 rcu_do_batch kernel/rcu/tree.c:2605 [inline]
 rcu_core+0xca8/0x1770 kernel/rcu/tree.c:2861
 handle_softirqs+0x286/0x870 kernel/softirq.c:579
 __do_softirq kernel/softirq.c:613 [inline]
 invoke_softirq kernel/softirq.c:453 [inline]
 __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680
 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline]
 sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1052
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39913/">CVE-2025-39913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39913">CVE-2025-39913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250705">SUSE bug 1250705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39916</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39916" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39916" ref_url="https://www.suse.com/security/cve/CVE-2025-39916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters()

When creating a new scheme of DAMON_RECLAIM, the calculation of
'min_age_region' uses 'aggr_interval' as the divisor, which may lead to
division-by-zero errors.  Fix it by directly returning -EINVAL when such a
case occurs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39916/">CVE-2025-39916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39916">CVE-2025-39916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250719">SUSE bug 1250719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39917</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39917" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39917" ref_url="https://www.suse.com/security/cve/CVE-2025-39917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt

Stanislav reported that in bpf_crypto_crypt() the destination dynptr's
size is not validated to be at least as large as the source dynptr's
size before calling into the crypto backend with 'len = src_len'. This
can result in an OOB write when the destination is smaller than the
source.

Concretely, in mentioned function, psrc and pdst are both linear
buffers fetched from each dynptr:

  psrc = __bpf_dynptr_data(src, src_len);
  [...]
  pdst = __bpf_dynptr_data_rw(dst, dst_len);
  [...]
  err = decrypt ?
        ctx-&gt;type-&gt;decrypt(ctx-&gt;tfm, psrc, pdst, src_len, piv) :
        ctx-&gt;type-&gt;encrypt(ctx-&gt;tfm, psrc, pdst, src_len, piv);

The crypto backend expects pdst to be large enough with a src_len length
that can be written. Add an additional src_len &gt; dst_len check and bail
out if it's the case. Note that these kfuncs are accessible under root
privileges only.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39917/">CVE-2025-39917 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39917">CVE-2025-39917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250723">SUSE bug 1250723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39918</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39918" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39918" ref_url="https://www.suse.com/security/cve/CVE-2025-39918" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: fix linked list corruption

Never leave scheduled wcid entries on the temporary on-stack list
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39918/">CVE-2025-39918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39918">CVE-2025-39918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250729">SUSE bug 1250729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39922</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39922" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39922" ref_url="https://www.suse.com/security/cve/CVE-2025-39922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ixgbe: fix incorrect map used in eee linkmode

incorrectly used ixgbe_lp_map in loops intended to populate the
supported and advertised EEE linkmode bitmaps based on ixgbe_ls_map.
This results in incorrect bit setting and potential out-of-bounds
access, since ixgbe_lp_map and ixgbe_ls_map have different sizes
and purposes.

ixgbe_lp_map[i] -&gt; ixgbe_ls_map[i]

Use ixgbe_ls_map for supported and advertised linkmodes, and keep
ixgbe_lp_map usage only for link partner (lp_advertised) mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39922/">CVE-2025-39922 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39922">CVE-2025-39922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250722">SUSE bug 1250722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39923</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39923" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39923" ref_url="https://www.suse.com/security/cve/CVE-2025-39923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees

When we don't have a clock specified in the device tree, we have no way to
ensure the BAM is on. This is often the case for remotely-controlled or
remotely-powered BAM instances. In this case, we need to read num-channels
from the DT to have all the necessary information to complete probing.

However, at the moment invalid device trees without clock and without
num-channels still continue probing, because the error handling is missing
return statements. The driver will then later try to read the number of
channels from the registers. This is unsafe, because it relies on boot
firmware and lucky timing to succeed. Unfortunately, the lack of proper
error handling here has been abused for several Qualcomm SoCs upstream,
causing early boot crashes in several situations [1, 2].

Avoid these early crashes by erroring out when any of the required DT
properties are missing. Note that this will break some of the existing DTs
upstream (mainly BAM instances related to the crypto engine). However,
clearly these DTs have never been tested properly, since the error in the
kernel log was just ignored. It's safer to disable the crypto engine for
these broken DTBs.

[1]: https://lore.kernel.org/r/CY01EKQVWE36.B9X5TDXAREPF@fairphone.com/
[2]: https://lore.kernel.org/r/20230626145959.646747-1-krzysztof.kozlowski@linaro.org/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39923/">CVE-2025-39923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39923">CVE-2025-39923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250741">SUSE bug 1250741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39925</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39925" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39925" ref_url="https://www.suse.com/security/cve/CVE-2025-39925" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22865" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: implement NETDEV_UNREGISTER notification handler

syzbot is reporting

  unregister_netdevice: waiting for vcan0 to become free. Usage count = 2

problem, for j1939 protocol did not have NETDEV_UNREGISTER notification
handler for undoing changes made by j1939_sk_bind().

Commit 25fe97cb7620 ("can: j1939: move j1939_priv_put() into sk_destruct
callback") expects that a call to j1939_priv_put() can be unconditionally
delayed until j1939_sk_sock_destruct() is called. But we need to call
j1939_priv_put() against an extra ref held by j1939_sk_bind() call
(as a part of undoing changes made by j1939_sk_bind()) as soon as
NETDEV_UNREGISTER notification fires (i.e. before j1939_sk_sock_destruct()
is called via j1939_sk_release()). Otherwise, the extra ref on "struct
j1939_priv" held by j1939_sk_bind() call prevents "struct net_device" from
dropping the usage count to 1; making it impossible for
unregister_netdevice() to continue.

[mkl: remove space in front of label]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39925/">CVE-2025-39925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39925">CVE-2025-39925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250736">SUSE bug 1250736</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39926</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39926" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39926" ref_url="https://www.suse.com/security/cve/CVE-2025-39926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

genetlink: fix genl_bind() invoking bind() after -EPERM

Per family bind/unbind callbacks were introduced to allow families
to track multicast group consumer presence, e.g. to start or stop
producing events depending on listeners.

However, in genl_bind() the bind() callback was invoked even if
capability checks failed and ret was set to -EPERM. This means that
callbacks could run on behalf of unauthorized callers while the
syscall still returned failure to user space.

Fix this by only invoking bind() after "if (ret) break;" check
i.e. after permission checks have succeeded.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39926/">CVE-2025-39926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39926">CVE-2025-39926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250737">SUSE bug 1250737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39927</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39927" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39927" ref_url="https://www.suse.com/security/cve/CVE-2025-39927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix race condition validating r_parent before applying state

Add validation to ensure the cached parent directory inode matches the
directory info in MDS replies. This prevents client-side race conditions
where concurrent operations (e.g. rename) cause r_parent to become stale
between request initiation and reply processing, which could lead to
applying state changes to incorrect directory inodes.

[ idryomov: folded a kerneldoc fixup and a follow-up fix from Alex to
  move CEPH_CAP_PIN reference when r_parent is updated:

  When the parent directory lock is not held, req-&gt;r_parent can become
  stale and is updated to point to the correct inode.  However, the
  associated CEPH_CAP_PIN reference was not being adjusted.  The
  CEPH_CAP_PIN is a reference on an inode that is tracked for
  accounting purposes.  Moving this pin is important to keep the
  accounting balanced. When the pin was not moved from the old parent
  to the new one, it created two problems: The reference on the old,
  stale parent was never released, causing a reference leak.
  A reference for the new parent was never acquired, creating the risk
  of a reference underflow later in ceph_mdsc_release_request().  This
  patch corrects the logic by releasing the pin from the old parent and
  acquiring it for the new parent when r_parent is switched.  This
  ensures reference accounting stays balanced. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39927/">CVE-2025-39927 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39927">CVE-2025-39927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250738">SUSE bug 1250738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39931</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39931" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39931" ref_url="https://www.suse.com/security/cve/CVE-2025-39931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: af_alg - Set merge to zero early in af_alg_sendmsg

If an error causes af_alg_sendmsg to abort, ctx-&gt;merge may contain
a garbage value from the previous loop.  This may then trigger a
crash on the next entry into af_alg_sendmsg when it attempts to do
a merge that can't be done.

Fix this by setting ctx-&gt;merge to zero near the start of the loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39931/">CVE-2025-39931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39931">CVE-2025-39931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251100">SUSE bug 1251100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39934</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39934" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39934" ref_url="https://www.suse.com/security/cve/CVE-2025-39934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ

If the interrupt occurs before resource initialization is complete, the
interrupt handler/worker may access uninitialized data such as the I2C
tcpc_client device, potentially leading to NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39934/">CVE-2025-39934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39934">CVE-2025-39934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251146">SUSE bug 1251146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39937</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39937" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39937" ref_url="https://www.suse.com/security/cve/CVE-2025-39937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer

Since commit 7d5e9737efda ("net: rfkill: gpio: get the name and type from
device property") rfkill_find_type() gets called with the possibly
uninitialized "const char *type_name;" local variable.

On x86 systems when rfkill-gpio binds to a "BCM4752" or "LNV4752"
acpi_device, the rfkill-&gt;type is set based on the ACPI acpi_device_id:

        rfkill-&gt;type = (unsigned)id-&gt;driver_data;

and there is no "type" property so device_property_read_string() will fail
and leave type_name uninitialized, leading to a potential crash.

rfkill_find_type() does accept a NULL pointer, fix the potential crash
by initializing type_name to NULL.

Note likely sofar this has not been caught because:

1. Not many x86 machines actually have a "BCM4752"/"LNV4752" acpi_device
2. The stack happened to contain NULL where type_name is stored
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39937/">CVE-2025-39937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39937">CVE-2025-39937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251143">SUSE bug 1251143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39938</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39938" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39938" ref_url="https://www.suse.com/security/cve/CVE-2025-39938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed

If earlier opening of source graph fails (e.g. ADSP rejects due to
incorrect audioreach topology), the graph is closed and
"dai_data-&gt;graph[dai-&gt;id]" is assigned NULL.  Preparing the DAI for sink
graph continues though and next call to q6apm_lpass_dai_prepare()
receives dai_data-&gt;graph[dai-&gt;id]=NULL leading to NULL pointer
exception:

  qcom-apm gprsvc:service:2:1: Error (1) Processing 0x01001002 cmd
  qcom-apm gprsvc:service:2:1: DSP returned error[1001002] 1
  q6apm-lpass-dais 30000000.remoteproc:glink-edge:gpr:service@1:bedais: fail to start APM port 78
  q6apm-lpass-dais 30000000.remoteproc:glink-edge:gpr:service@1:bedais: ASoC: error at snd_soc_pcm_dai_prepare on TX_CODEC_DMA_TX_3: -22
  Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a8
  ...
  Call trace:
   q6apm_graph_media_format_pcm+0x48/0x120 (P)
   q6apm_lpass_dai_prepare+0x110/0x1b4
   snd_soc_pcm_dai_prepare+0x74/0x108
   __soc_pcm_prepare+0x44/0x160
   dpcm_be_dai_prepare+0x124/0x1c0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39938/">CVE-2025-39938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39938">CVE-2025-39938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251134">SUSE bug 1251134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39944</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39944" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39944" ref_url="https://www.suse.com/security/cve/CVE-2025-39944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()

The original code relies on cancel_delayed_work() in otx2_ptp_destroy(),
which does not ensure that the delayed work item synctstamp_work has fully
completed if it was already running. This leads to use-after-free scenarios
where otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work
remains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().
Furthermore, the synctstamp_work is cyclic, the likelihood of triggering
the bug is nonnegligible.

A typical race condition is illustrated below:

CPU 0 (cleanup)           | CPU 1 (delayed work callback)
otx2_remove()             |
  otx2_ptp_destroy()      | otx2_sync_tstamp()
    cancel_delayed_work() |
    kfree(ptp)            |
                          |   ptp = container_of(...); //UAF
                          |   ptp-&gt; //UAF

This is confirmed by a KASAN report:

BUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0
Write of size 8 at addr ffff88800aa09a18 by task bash/136
...
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x55/0x70
 print_report+0xcf/0x610
 ? __run_timer_base.part.0+0x7d7/0x8c0
 kasan_report+0xb8/0xf0
 ? __run_timer_base.part.0+0x7d7/0x8c0
 __run_timer_base.part.0+0x7d7/0x8c0
 ? __pfx___run_timer_base.part.0+0x10/0x10
 ? __pfx_read_tsc+0x10/0x10
 ? ktime_get+0x60/0x140
 ? lapic_next_event+0x11/0x20
 ? clockevents_program_event+0x1d4/0x2a0
 run_timer_softirq+0xd1/0x190
 handle_softirqs+0x16a/0x550
 irq_exit_rcu+0xaf/0xe0
 sysvec_apic_timer_interrupt+0x70/0x80
 &lt;/IRQ&gt;
...
Allocated by task 1:
 kasan_save_stack+0x24/0x50
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x7f/0x90
 otx2_ptp_init+0xb1/0x860
 otx2_probe+0x4eb/0xc30
 local_pci_probe+0xdc/0x190
 pci_device_probe+0x2fe/0x470
 really_probe+0x1ca/0x5c0
 __driver_probe_device+0x248/0x310
 driver_probe_device+0x44/0x120
 __driver_attach+0xd2/0x310
 bus_for_each_dev+0xed/0x170
 bus_add_driver+0x208/0x500
 driver_register+0x132/0x460
 do_one_initcall+0x89/0x300
 kernel_init_freeable+0x40d/0x720
 kernel_init+0x1a/0x150
 ret_from_fork+0x10c/0x1a0
 ret_from_fork_asm+0x1a/0x30

Freed by task 136:
 kasan_save_stack+0x24/0x50
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3a/0x60
 __kasan_slab_free+0x3f/0x50
 kfree+0x137/0x370
 otx2_ptp_destroy+0x38/0x80
 otx2_remove+0x10d/0x4c0
 pci_device_remove+0xa6/0x1d0
 device_release_driver_internal+0xf8/0x210
 pci_stop_bus_device+0x105/0x150
 pci_stop_and_remove_bus_device_locked+0x15/0x30
 remove_store+0xcc/0xe0
 kernfs_fop_write_iter+0x2c3/0x440
 vfs_write+0x871/0xd70
 ksys_write+0xee/0x1c0
 do_syscall_64+0xac/0x280
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
...

Replace cancel_delayed_work() with cancel_delayed_work_sync() to ensure
that the delayed work item is properly canceled before the otx2_ptp is
deallocated.

This bug was initially identified through static analysis. To reproduce
and test it, I simulated the OcteonTX2 PCI device in QEMU and introduced
artificial delays within the otx2_sync_tstamp() function to increase the
likelihood of triggering the bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39944/">CVE-2025-39944 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39944">CVE-2025-39944 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251120">SUSE bug 1251120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39945</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39945" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39945" ref_url="https://www.suse.com/security/cve/CVE-2025-39945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cnic: Fix use-after-free bugs in cnic_delete_task

The original code uses cancel_delayed_work() in cnic_cm_stop_bnx2x_hw(),
which does not guarantee that the delayed work item 'delete_task' has
fully completed if it was already running. Additionally, the delayed work
item is cyclic, the flush_workqueue() in cnic_cm_stop_bnx2x_hw() only
blocks and waits for work items that were already queued to the
workqueue prior to its invocation. Any work items submitted after
flush_workqueue() is called are not included in the set of tasks that the
flush operation awaits. This means that after the cyclic work items have
finished executing, a delayed work item may still exist in the workqueue.
This leads to use-after-free scenarios where the cnic_dev is deallocated
by cnic_free_dev(), while delete_task remains active and attempt to
dereference cnic_dev in cnic_delete_task().

A typical race condition is illustrated below:

CPU 0 (cleanup)              | CPU 1 (delayed work callback)
cnic_netdev_event()          |
  cnic_stop_hw()             | cnic_delete_task()
    cnic_cm_stop_bnx2x_hw()  | ...
      cancel_delayed_work()  | /* the queue_delayed_work()
      flush_workqueue()      |    executes after flush_workqueue()*/
                             | queue_delayed_work()
  cnic_free_dev(dev)//free   | cnic_delete_task() //new instance
                             |   dev = cp-&gt;dev; //use

Replace cancel_delayed_work() with cancel_delayed_work_sync() to ensure
that the cyclic delayed work item is properly canceled and that any
ongoing execution of the work item completes before the cnic_dev is
deallocated. Furthermore, since cancel_delayed_work_sync() uses
__flush_work(work, true) to synchronously wait for any currently
executing instance of the work item to finish, the flush_workqueue()
becomes redundant and should be removed.

This bug was identified through static analysis. To reproduce the issue
and validate the fix, I simulated the cnic PCI device in QEMU and
introduced intentional delays - such as inserting calls to ssleep()
within the cnic_delete_task() function - to increase the likelihood
of triggering the bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39945/">CVE-2025-39945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39945">CVE-2025-39945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251230">SUSE bug 1251230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39946</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39946" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39946" ref_url="https://www.suse.com/security/cve/CVE-2025-39946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: make sure to abort the stream if headers are bogus

Normally we wait for the socket to buffer up the whole record
before we service it. If the socket has a tiny buffer, however,
we read out the data sooner, to prevent connection stalls.
Make sure that we abort the connection when we find out late
that the record is actually invalid. Retrying the parsing is
fine in itself but since we copy some more data each time
before we parse we can overflow the allocated skb space.

Constructing a scenario in which we're under pressure without
enough data in the socket to parse the length upfront is quite
hard. syzbot figured out a way to do this by serving us the header
in small OOB sends, and then filling in the recvbuf with a large
normal send.

Make sure that tls_rx_msg_size() aborts strp, if we reach
an invalid record there's really no way to recover.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39946/">CVE-2025-39946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39946">CVE-2025-39946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251114">SUSE bug 1251114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39947</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39947" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39947" ref_url="https://www.suse.com/security/cve/CVE-2025-39947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Harden uplink netdev access against device unbind

The function mlx5_uplink_netdev_get() gets the uplink netdevice
pointer from mdev-&gt;mlx5e_res.uplink_netdev. However, the netdevice can
be removed and its pointer cleared when unbound from the mlx5_core.eth
driver. This results in a NULL pointer, causing a kernel panic.

 BUG: unable to handle page fault for address: 0000000000001300
 at RIP: 0010:mlx5e_vport_rep_load+0x22a/0x270 [mlx5_core]
 Call Trace:
  &lt;TASK&gt;
  mlx5_esw_offloads_rep_load+0x68/0xe0 [mlx5_core]
  esw_offloads_enable+0x593/0x910 [mlx5_core]
  mlx5_eswitch_enable_locked+0x341/0x420 [mlx5_core]
  mlx5_devlink_eswitch_mode_set+0x17e/0x3a0 [mlx5_core]
  devlink_nl_eswitch_set_doit+0x60/0xd0
  genl_family_rcv_msg_doit+0xe0/0x130
  genl_rcv_msg+0x183/0x290
  netlink_rcv_skb+0x4b/0xf0
  genl_rcv+0x24/0x40
  netlink_unicast+0x255/0x380
  netlink_sendmsg+0x1f3/0x420
  __sock_sendmsg+0x38/0x60
  __sys_sendto+0x119/0x180
  do_syscall_64+0x53/0x1d0
  entry_SYSCALL_64_after_hwframe+0x4b/0x53

Ensure the pointer is valid before use by checking it for NULL. If it
is valid, immediately call netdev_hold() to take a reference, and
preventing the netdevice from being freed while it is in use.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39947/">CVE-2025-39947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39947">CVE-2025-39947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251232">SUSE bug 1251232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39948</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39948" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39948" ref_url="https://www.suse.com/security/cve/CVE-2025-39948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix Rx page leak on multi-buffer frames

The ice_put_rx_mbuf() function handles calling ice_put_rx_buf() for each
buffer in the current frame. This function was introduced as part of
handling multi-buffer XDP support in the ice driver.

It works by iterating over the buffers from first_desc up to 1 plus the
total number of fragments in the frame, cached from before the XDP program
was executed.

If the hardware posts a descriptor with a size of 0, the logic used in
ice_put_rx_mbuf() breaks. Such descriptors get skipped and don't get added
as fragments in ice_add_xdp_frag. Since the buffer isn't counted as a
fragment, we do not iterate over it in ice_put_rx_mbuf(), and thus we don't
call ice_put_rx_buf().

Because we don't call ice_put_rx_buf(), we don't attempt to re-use the
page or free it. This leaves a stale page in the ring, as we don't
increment next_to_alloc.

The ice_reuse_rx_page() assumes that the next_to_alloc has been incremented
properly, and that it always points to a buffer with a NULL page. Since
this function doesn't check, it will happily recycle a page over the top
of the next_to_alloc buffer, losing track of the old page.

Note that this leak only occurs for multi-buffer frames. The
ice_put_rx_mbuf() function always handles at least one buffer, so a
single-buffer frame will always get handled correctly. It is not clear
precisely why the hardware hands us descriptors with a size of 0 sometimes,
but it happens somewhat regularly with "jumbo frames" used by 9K MTU.

To fix ice_put_rx_mbuf(), we need to make sure to call ice_put_rx_buf() on
all buffers between first_desc and next_to_clean. Borrow the logic of a
similar function in i40e used for this same purpose. Use the same logic
also in ice_get_pgcnts().

Instead of iterating over just the number of fragments, use a loop which
iterates until the current index reaches to the next_to_clean element just
past the current frame. Unlike i40e, the ice_put_rx_mbuf() function does
call ice_put_rx_buf() on the last buffer of the frame indicating the end of
packet.

For non-linear (multi-buffer) frames, we need to take care when adjusting
the pagecnt_bias. An XDP program might release fragments from the tail of
the frame, in which case that fragment page is already released. Only
update the pagecnt_bias for the first descriptor and fragments still
remaining post-XDP program. Take care to only access the shared info for
fragmented buffers, as this avoids a significant cache miss.

The xdp_xmit value only needs to be updated if an XDP program is run, and
only once per packet. Drop the xdp_xmit pointer argument from
ice_put_rx_mbuf(). Instead, set xdp_xmit in the ice_clean_rx_irq() function
directly. This avoids needing to pass the argument and avoids an extra
bit-wise OR for each buffer in the frame.

Move the increment of the ntc local variable to ensure its updated *before*
all calls to ice_get_pgcnts() or ice_put_rx_mbuf(), as the loop logic
requires the index of the element just after the current frame.

Now that we use an index pointer in the ring to identify the packet, we no
longer need to track or cache the number of fragments in the rx_ring.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39948/">CVE-2025-39948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39948">CVE-2025-39948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251233">SUSE bug 1251233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39949</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39949" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39949" ref_url="https://www.suse.com/security/cve/CVE-2025-39949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

qed: Don't collect too many protection override GRC elements

In the protection override dump path, the firmware can return far too
many GRC elements, resulting in attempting to write past the end of the
previously-kmalloc'ed dump buffer.

This will result in a kernel panic with reason:

 BUG: unable to handle kernel paging request at ADDRESS

where "ADDRESS" is just past the end of the protection override dump
buffer. The start address of the buffer is:
 p_hwfn-&gt;cdev-&gt;dbg_features[DBG_FEATURE_PROTECTION_OVERRIDE].dump_buf
and the size of the buffer is buf_size in the same data structure.

The panic can be arrived at from either the qede Ethernet driver path:

    [exception RIP: qed_grc_dump_addr_range+0x108]
 qed_protection_override_dump at ffffffffc02662ed [qed]
 qed_dbg_protection_override_dump at ffffffffc0267792 [qed]
 qed_dbg_feature at ffffffffc026aa8f [qed]
 qed_dbg_all_data at ffffffffc026b211 [qed]
 qed_fw_fatal_reporter_dump at ffffffffc027298a [qed]
 devlink_health_do_dump at ffffffff82497f61
 devlink_health_report at ffffffff8249cf29
 qed_report_fatal_error at ffffffffc0272baf [qed]
 qede_sp_task at ffffffffc045ed32 [qede]
 process_one_work at ffffffff81d19783

or the qedf storage driver path:

    [exception RIP: qed_grc_dump_addr_range+0x108]
 qed_protection_override_dump at ffffffffc068b2ed [qed]
 qed_dbg_protection_override_dump at ffffffffc068c792 [qed]
 qed_dbg_feature at ffffffffc068fa8f [qed]
 qed_dbg_all_data at ffffffffc0690211 [qed]
 qed_fw_fatal_reporter_dump at ffffffffc069798a [qed]
 devlink_health_do_dump at ffffffff8aa95e51
 devlink_health_report at ffffffff8aa9ae19
 qed_report_fatal_error at ffffffffc0697baf [qed]
 qed_hw_err_notify at ffffffffc06d32d7 [qed]
 qed_spq_post at ffffffffc06b1011 [qed]
 qed_fcoe_destroy_conn at ffffffffc06b2e91 [qed]
 qedf_cleanup_fcport at ffffffffc05e7597 [qedf]
 qedf_rport_event_handler at ffffffffc05e7bf7 [qedf]
 fc_rport_work at ffffffffc02da715 [libfc]
 process_one_work at ffffffff8a319663

Resolve this by clamping the firmware's return value to the maximum
number of legal elements the firmware should return.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39949/">CVE-2025-39949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39949">CVE-2025-39949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251177">SUSE bug 1251177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39950</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39950" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39950" ref_url="https://www.suse.com/security/cve/CVE-2025-39950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/tcp: Fix a NULL pointer dereference when using TCP-AO with TCP_REPAIR

A NULL pointer dereference can occur in tcp_ao_finish_connect() during a
connect() system call on a socket with a TCP-AO key added and TCP_REPAIR
enabled.

The function is called with skb being NULL and attempts to dereference it
on tcp_hdr(skb)-&gt;seq without a prior skb validation.

Fix this by checking if skb is NULL before dereferencing it.

The commentary is taken from bpf_skops_established(), which is also called
in the same flow. Unlike the function being patched,
bpf_skops_established() validates the skb before dereferencing it.

int main(void){
	struct sockaddr_in sockaddr;
	struct tcp_ao_add tcp_ao;
	int sk;
	int one = 1;

	memset(&amp;sockaddr,'\0',sizeof(sockaddr));
	memset(&amp;tcp_ao,'\0',sizeof(tcp_ao));

	sk = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);

	sockaddr.sin_family = AF_INET;

	memcpy(tcp_ao.alg_name,"cmac(aes128)",12);
	memcpy(tcp_ao.key,"ABCDEFGHABCDEFGH",16);
	tcp_ao.keylen = 16;

	memcpy(&amp;tcp_ao.addr,&amp;sockaddr,sizeof(sockaddr));

	setsockopt(sk, IPPROTO_TCP, TCP_AO_ADD_KEY, &amp;tcp_ao,
	sizeof(tcp_ao));
	setsockopt(sk, IPPROTO_TCP, TCP_REPAIR, &amp;one, sizeof(one));

	sockaddr.sin_family = AF_INET;
	sockaddr.sin_port = htobe16(123);

	inet_aton("127.0.0.1", &amp;sockaddr.sin_addr);

	connect(sk,(struct sockaddr *)&amp;sockaddr,sizeof(sockaddr));

return 0;
}

$ gcc tcp-ao-nullptr.c -o tcp-ao-nullptr -Wall
$ unshare -Urn

BUG: kernel NULL pointer dereference, address: 00000000000000b6
PGD 1f648d067 P4D 1f648d067 PUD 1982e8067 PMD 0
Oops: Oops: 0000 [#1] SMP NOPTI
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop
Reference Platform, BIOS 6.00 11/12/2020
RIP: 0010:tcp_ao_finish_connect (net/ipv4/tcp_ao.c:1182)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39950/">CVE-2025-39950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39950">CVE-2025-39950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251176">SUSE bug 1251176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39952</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39952" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39952" ref_url="https://www.suse.com/security/cve/CVE-2025-39952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: avoid buffer overflow in WID string configuration

Fix the following copy overflow warning identified by Smatch checker.

 drivers/net/wireless/microchip/wilc1000/wlan_cfg.c:184 wilc_wlan_parse_response_frame()
        error: '__memcpy()' 'cfg-&gt;s[i]-&gt;str' copy overflow (512 vs 65537)

This patch introduces size check before accessing the memory buffer.
The checks are base on the WID type of received data from the firmware.
For WID string configuration, the size limit is determined by individual
element size in 'struct wilc_cfg_str_vals' that is maintained in 'len' field
of 'struct wilc_cfg_str'.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39952/">CVE-2025-39952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39952">CVE-2025-39952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251216">SUSE bug 1251216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39955</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39955" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39955" ref_url="https://www.suse.com/security/cve/CVE-2025-39955" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002268.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Clear tcp_sk(sk)-&gt;fastopen_rsk in tcp_disconnect().

syzbot reported the splat below where a socket had tcp_sk(sk)-&gt;fastopen_rsk
in the TCP_ESTABLISHED state. [0]

syzbot reused the server-side TCP Fast Open socket as a new client before
the TFO socket completes 3WHS:

  1. accept()
  2. connect(AF_UNSPEC)
  3. connect() to another destination

As of accept(), sk-&gt;sk_state is TCP_SYN_RECV, and tcp_disconnect() changes
it to TCP_CLOSE and makes connect() possible, which restarts timers.

Since tcp_disconnect() forgot to clear tcp_sk(sk)-&gt;fastopen_rsk, the
retransmit timer triggered the warning and the intended packet was not
retransmitted.

Let's call reqsk_fastopen_remove() in tcp_disconnect().

[0]:
WARNING: CPU: 2 PID: 0 at net/ipv4/tcp_timer.c:542 tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7))
Modules linked in:
CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.17.0-rc5-g201825fb4278 #62 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
RIP: 0010:tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7))
Code: 41 55 41 54 55 53 48 8b af b8 08 00 00 48 89 fb 48 85 ed 0f 84 55 01 00 00 0f b6 47 12 3c 03 74 0c 0f b6 47 12 3c 04 74 04 90 &lt;0f&gt; 0b 90 48 8b 85 c0 00 00 00 48 89 ef 48 8b 40 30 e8 6a 4f 06 3e
RSP: 0018:ffffc900002f8d40 EFLAGS: 00010293
RAX: 0000000000000002 RBX: ffff888106911400 RCX: 0000000000000017
RDX: 0000000002517619 RSI: ffffffff83764080 RDI: ffff888106911400
RBP: ffff888106d5c000 R08: 0000000000000001 R09: ffffc900002f8de8
R10: 00000000000000c2 R11: ffffc900002f8ff8 R12: ffff888106911540
R13: ffff888106911480 R14: ffff888106911840 R15: ffffc900002f8de0
FS:  0000000000000000(0000) GS:ffff88907b768000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f8044d69d90 CR3: 0000000002c30003 CR4: 0000000000370ef0
Call Trace:
 &lt;IRQ&gt;
 tcp_write_timer (net/ipv4/tcp_timer.c:738)
 call_timer_fn (kernel/time/timer.c:1747)
 __run_timers (kernel/time/timer.c:1799 kernel/time/timer.c:2372)
 timer_expire_remote (kernel/time/timer.c:2385 kernel/time/timer.c:2376 kernel/time/timer.c:2135)
 tmigr_handle_remote_up (kernel/time/timer_migration.c:944 kernel/time/timer_migration.c:1035)
 __walk_groups.isra.0 (kernel/time/timer_migration.c:533 (discriminator 1))
 tmigr_handle_remote (kernel/time/timer_migration.c:1096)
 handle_softirqs (./arch/x86/include/asm/jump_label.h:36 ./include/trace/events/irq.h:142 kernel/softirq.c:580)
 irq_exit_rcu (kernel/softirq.c:614 kernel/softirq.c:453 kernel/softirq.c:680 kernel/softirq.c:696)
 sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1050 (discriminator 35) arch/x86/kernel/apic/apic.c:1050 (discriminator 35))
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39955/">CVE-2025-39955 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39955">CVE-2025-39955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251804">SUSE bug 1251804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39956</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39956" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39956" ref_url="https://www.suse.com/security/cve/CVE-2025-39956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igc: don't fail igc_probe() on LED setup error

When igc_led_setup() fails, igc_probe() fails and triggers kernel panic
in free_netdev() since unregister_netdev() is not called. [1]
This behavior can be tested using fault-injection framework, especially
the failslab feature. [2]

Since LED support is not mandatory, treat LED setup failures as
non-fatal and continue probe with a warning message, consequently
avoiding the kernel panic.

[1]
 kernel BUG at net/core/dev.c:12047!
 Oops: invalid opcode: 0000 [#1] SMP NOPTI
 CPU: 0 UID: 0 PID: 937 Comm: repro-igc-led-e Not tainted 6.17.0-rc4-enjuk-tnguy-00865-gc4940196ab02 #64 PREEMPT(voluntary)
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
 RIP: 0010:free_netdev+0x278/0x2b0
 [...]
 Call Trace:
  &lt;TASK&gt;
  igc_probe+0x370/0x910
  local_pci_probe+0x3a/0x80
  pci_device_probe+0xd1/0x200
 [...]

[2]
 #!/bin/bash -ex

 FAILSLAB_PATH=/sys/kernel/debug/failslab/
 DEVICE=0000:00:05.0
 START_ADDR=$(grep " igc_led_setup" /proc/kallsyms \
         | awk '{printf("0x%s", $1)}')
 END_ADDR=$(printf "0x%x" $((START_ADDR + 0x100)))

 echo $START_ADDR &gt; $FAILSLAB_PATH/require-start
 echo $END_ADDR &gt; $FAILSLAB_PATH/require-end
 echo 1 &gt; $FAILSLAB_PATH/times
 echo 100 &gt; $FAILSLAB_PATH/probability
 echo N &gt; $FAILSLAB_PATH/ignore-gfp-wait

 echo $DEVICE &gt; /sys/bus/pci/drivers/igc/bind
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39956/">CVE-2025-39956 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39956">CVE-2025-39956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251809">SUSE bug 1251809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39957</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39957" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39957" ref_url="https://www.suse.com/security/cve/CVE-2025-39957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: increase scan_ies_len for S1G

Currently the S1G capability element is not taken into account
for the scan_ies_len, which leads to a buffer length validation
failure in ieee80211_prep_hw_scan() and subsequent WARN in
__ieee80211_start_scan(). This prevents hw scanning from functioning.
To fix ensure we accommodate for the S1G capability length.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39957/">CVE-2025-39957 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39957">CVE-2025-39957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251810">SUSE bug 1251810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39961</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39961" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39961" ref_url="https://www.suse.com/security/cve/CVE-2025-39961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/amd/pgtbl: Fix possible race while increase page table level

The AMD IOMMU host page table implementation supports dynamic page table levels
(up to 6 levels), starting with a 3-level configuration that expands based on
IOVA address. The kernel maintains a root pointer and current page table level
to enable proper page table walks in alloc_pte()/fetch_pte() operations.

The IOMMU IOVA allocator initially starts with 32-bit address and onces its
exhuasted it switches to 64-bit address (max address is determined based
on IOMMU and device DMA capability). To support larger IOVA, AMD IOMMU
driver increases page table level.

But in unmap path (iommu_v1_unmap_pages()), fetch_pte() reads
pgtable-&gt;[root/mode] without lock. So its possible that in exteme corner case,
when increase_address_space() is updating pgtable-&gt;[root/mode], fetch_pte()
reads wrong page table level (pgtable-&gt;mode). It does compare the value with
level encoded in page table and returns NULL. This will result is
iommu_unmap ops to fail and upper layer may retry/log WARN_ON.

CPU 0                                         CPU 1
------                                       ------
map pages                                    unmap pages
alloc_pte() -&gt; increase_address_space()      iommu_v1_unmap_pages() -&gt; fetch_pte()
  pgtable-&gt;root = pte (new root value)
                                             READ pgtable-&gt;[mode/root]
					       Reads new root, old mode
  Updates mode (pgtable-&gt;mode += 1)

Since Page table level updates are infrequent and already synchronized with a
spinlock, implement seqcount to enable lock-free read operations on the read path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39961/">CVE-2025-39961 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39961">CVE-2025-39961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251817">SUSE bug 1251817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39963</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39963" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39963" ref_url="https://www.suse.com/security/cve/CVE-2025-39963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix incorrect io_kiocb reference in io_link_skb

In io_link_skb function, there is a bug where prev_notif is incorrectly
assigned using 'nd' instead of 'prev_nd'. This causes the context
validation check to compare the current notification with itself instead
of comparing it with the previous notification.

Fix by using the correct prev_nd parameter when obtaining prev_notif.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39963/">CVE-2025-39963 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39963">CVE-2025-39963 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251819">SUSE bug 1251819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251982">SUSE bug 1251982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040506" comment="kernel-livepatch-6_12_0-160000_5-default-5-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040513" comment="kernel-livepatch-6_12_0-160000_5-rt-4-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041338" comment="kernel-livepatch-6_12_0-160000_6-default-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040051" comment="kernel-livepatch-6_12_0-160000_6-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39964</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39964" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39964" ref_url="https://www.suse.com/security/cve/CVE-2025-39964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg

Issuing two writes to the same af_alg socket is bogus as the
data will be interleaved in an unpredictable fashion.  Furthermore,
concurrent writes may create inconsistencies in the internal
socket state.

Disallow this by adding a new ctx-&gt;write field that indiciates
exclusive ownership for writing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39964/">CVE-2025-39964 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39964">CVE-2025-39964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251966">SUSE bug 1251966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39965</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39965" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39965" ref_url="https://www.suse.com/security/cve/CVE-2025-39965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: xfrm_alloc_spi shouldn't use 0 as SPI

x-&gt;id.spi == 0 means "no SPI assigned", but since commit
94f39804d891 ("xfrm: Duplicate SPI Handling"), we now create states
and add them to the byspi list with this value.

__xfrm_state_delete doesn't remove those states from the byspi list,
since they shouldn't be there, and this shows up as a UAF the next
time we go through the byspi list.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39965/">CVE-2025-39965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39965">CVE-2025-39965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251967">SUSE bug 1251967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39967</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39967" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39967" ref_url="https://www.suse.com/security/cve/CVE-2025-39967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbcon: fix integer overflow in fbcon_do_set_font

Fix integer overflow vulnerabilities in fbcon_do_set_font() where font
size calculations could overflow when handling user-controlled font
parameters.

The vulnerabilities occur when:
1. CALC_FONTSZ(h, pitch, charcount) performs h * pith * charcount
   multiplication with user-controlled values that can overflow.
2. FONT_EXTRA_WORDS * sizeof(int) + size addition can also overflow
3. This results in smaller allocations than expected, leading to buffer
   overflows during font data copying.

Add explicit overflow checking using check_mul_overflow() and
check_add_overflow() kernel helpers to safety validate all size
calculations before allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39967/">CVE-2025-39967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39967">CVE-2025-39967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252033">SUSE bug 1252033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39968</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39968" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39968" ref_url="https://www.suse.com/security/cve/CVE-2025-39968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: add max boundary check for VF filters

There is no check for max filters that VF can request. Add it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39968/">CVE-2025-39968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39968">CVE-2025-39968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252047">SUSE bug 1252047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39969</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39969" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39969" ref_url="https://www.suse.com/security/cve/CVE-2025-39969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix validation of VF state in get resources

VF state I40E_VF_STATE_ACTIVE is not the only state in which
VF is actually active so it should not be used to determine
if a VF is allowed to obtain resources.

Use I40E_VF_STATE_RESOURCES_LOADED that is set only in
i40e_vc_get_vf_resources_msg() and cleared during reset.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39969/">CVE-2025-39969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39969">CVE-2025-39969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252044">SUSE bug 1252044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39970</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39970" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39970" ref_url="https://www.suse.com/security/cve/CVE-2025-39970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix input validation logic for action_meta

Fix condition to check 'greater or equal' to prevent OOB dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39970/">CVE-2025-39970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39970">CVE-2025-39970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252051">SUSE bug 1252051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39971</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39971" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39971" ref_url="https://www.suse.com/security/cve/CVE-2025-39971" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002256.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002295.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1581" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix idx validation in config queues msg

Ensure idx is within range of active/initialized TCs when iterating over
vf-&gt;ch[idx] in i40e_vc_config_queues_msg().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39971/">CVE-2025-39971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39971">CVE-2025-39971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252052">SUSE bug 1252052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39972</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39972" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39972" ref_url="https://www.suse.com/security/cve/CVE-2025-39972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix idx validation in i40e_validate_queue_map

Ensure idx is within range of active/initialized TCs when iterating over
vf-&gt;ch[idx] in i40e_validate_queue_map().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39972/">CVE-2025-39972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39972">CVE-2025-39972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252039">SUSE bug 1252039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39973</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39973" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39973" ref_url="https://www.suse.com/security/cve/CVE-2025-39973" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1263-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1285-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1287-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: add validation for ring_len param

The `ring_len` parameter provided by the virtual function (VF)
is assigned directly to the hardware memory context (HMC) without
any validation.

To address this, introduce an upper boundary check for both Tx and Rx
queue lengths. The maximum number of descriptors supported by the
hardware is 8k-32.
Additionally, enforce alignment constraints: Tx rings must be a multiple
of 8, and Rx rings must be a multiple of 32.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39973/">CVE-2025-39973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39973">CVE-2025-39973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252035">SUSE bug 1252035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252036">SUSE bug 1252036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056309" comment="kernel-livepatch-6_12_0-160000_5-rt-7-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056310" comment="kernel-livepatch-6_12_0-160000_6-rt-6-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39977</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39977" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39977" ref_url="https://www.suse.com/security/cve/CVE-2025-39977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

futex: Prevent use-after-free during requeue-PI

syzbot managed to trigger the following race:

   T1                               T2

 futex_wait_requeue_pi()
   futex_do_wait()
     schedule()
                               futex_requeue()
                                 futex_proxy_trylock_atomic()
                                   futex_requeue_pi_prepare()
                                   requeue_pi_wake_futex()
                                     futex_requeue_pi_complete()
                                      /* preempt */

         * timeout/ signal wakes T1 *

   futex_requeue_pi_wakeup_sync() // Q_REQUEUE_PI_LOCKED
   futex_hash_put()
  // back to userland, on stack futex_q is garbage

                                      /* back */
                                     wake_up_state(q-&gt;task, TASK_NORMAL);

In this scenario futex_wait_requeue_pi() is able to leave without using
futex_q::lock_ptr for synchronization.

This can be prevented by reading futex_q::task before updating the
futex_q::requeue_state. A reference on the task_struct is not needed
because requeue_pi_wake_futex() is invoked with a spinlock_t held which
implies a RCU read section.

Even if T1 terminates immediately after, the task_struct will remain valid
during T2's wake_up_state().  A READ_ONCE on futex_q::task before
futex_requeue_pi_complete() is enough because it ensures that the variable
is read before the state is updated.

Read futex_q::task before updating the requeue state, use it for the
following wakeup.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39977/">CVE-2025-39977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39977">CVE-2025-39977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252046">SUSE bug 1252046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252048">SUSE bug 1252048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39978</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39978" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39978" ref_url="https://www.suse.com/security/cve/CVE-2025-39978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: Fix potential use after free in otx2_tc_add_flow()

This code calls kfree_rcu(new_node, rcu) and then dereferences "new_node"
and then dereferences it on the next line.  Two lines later, we take
a mutex so I don't think this is an RCU safe region.  Re-order it to do
the dereferences before queuing up the free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39978/">CVE-2025-39978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39978">CVE-2025-39978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252069">SUSE bug 1252069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252071">SUSE bug 1252071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39979</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39979" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39979" ref_url="https://www.suse.com/security/cve/CVE-2025-39979" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22865" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: fs, fix UAF in flow counter release

Fix a kernel trace [1] caused by releasing an HWS action of a local flow
counter in mlx5_cmd_hws_delete_fte(), where the HWS action refcount and
mutex were not initialized and the counter struct could already be freed
when deleting the rule.

Fix it by adding the missing initializations and adding refcount for the
local flow counter struct.

[1] Kernel log:
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x34/0x48
  mlx5_fs_put_hws_action.part.0.cold+0x21/0x94 [mlx5_core]
  mlx5_fc_put_hws_action+0x96/0xad [mlx5_core]
  mlx5_fs_destroy_fs_actions+0x8b/0x152 [mlx5_core]
  mlx5_cmd_hws_delete_fte+0x5a/0xa0 [mlx5_core]
  del_hw_fte+0x1ce/0x260 [mlx5_core]
  mlx5_del_flow_rules+0x12d/0x240 [mlx5_core]
  ? ttwu_queue_wakelist+0xf4/0x110
  mlx5_ib_destroy_flow+0x103/0x1b0 [mlx5_ib]
  uverbs_free_flow+0x20/0x50 [ib_uverbs]
  destroy_hw_idr_uobject+0x1b/0x50 [ib_uverbs]
  uverbs_destroy_uobject+0x34/0x1a0 [ib_uverbs]
  uobj_destroy+0x3c/0x80 [ib_uverbs]
  ib_uverbs_run_method+0x23e/0x360 [ib_uverbs]
  ? uverbs_finalize_object+0x60/0x60 [ib_uverbs]
  ib_uverbs_cmd_verbs+0x14f/0x2c0 [ib_uverbs]
  ? do_tty_write+0x1a9/0x270
  ? file_tty_write.constprop.0+0x98/0xc0
  ? new_sync_write+0xfc/0x190
  ib_uverbs_ioctl+0xd7/0x160 [ib_uverbs]
  __x64_sys_ioctl+0x87/0xc0
  do_syscall_64+0x59/0x90
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39979/">CVE-2025-39979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39979">CVE-2025-39979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252067">SUSE bug 1252067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252068">SUSE bug 1252068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39980</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39980" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39980" ref_url="https://www.suse.com/security/cve/CVE-2025-39980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nexthop: Forbid FDB status change while nexthop is in a group

The kernel forbids the creation of non-FDB nexthop groups with FDB
nexthops:

 # ip nexthop add id 1 via 192.0.2.1 fdb
 # ip nexthop add id 2 group 1
 Error: Non FDB nexthop group cannot have fdb nexthops.

And vice versa:

 # ip nexthop add id 3 via 192.0.2.2 dev dummy1
 # ip nexthop add id 4 group 3 fdb
 Error: FDB nexthop group can only have fdb nexthops.

However, as long as no routes are pointing to a non-FDB nexthop group,
the kernel allows changing the type of a nexthop from FDB to non-FDB and
vice versa:

 # ip nexthop add id 5 via 192.0.2.2 dev dummy1
 # ip nexthop add id 6 group 5
 # ip nexthop replace id 5 via 192.0.2.2 fdb
 # echo $?
 0

This configuration is invalid and can result in a NPD [1] since FDB
nexthops are not associated with a nexthop device:

 # ip route add 198.51.100.1/32 nhid 6
 # ping 198.51.100.1

Fix by preventing nexthop FDB status change while the nexthop is in a
group:

 # ip nexthop add id 7 via 192.0.2.2 dev dummy1
 # ip nexthop add id 8 group 7
 # ip nexthop replace id 7 via 192.0.2.2 fdb
 Error: Cannot change nexthop FDB status while in a group.

[1]
BUG: kernel NULL pointer dereference, address: 00000000000003c0
[...]
Oops: Oops: 0000 [#1] SMP
CPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014
RIP: 0010:fib_lookup_good_nhc+0x1e/0x80
[...]
Call Trace:
 &lt;TASK&gt;
 fib_table_lookup+0x541/0x650
 ip_route_output_key_hash_rcu+0x2ea/0x970
 ip_route_output_key_hash+0x55/0x80
 __ip4_datagram_connect+0x250/0x330
 udp_connect+0x2b/0x60
 __sys_connect+0x9c/0xd0
 __x64_sys_connect+0x18/0x20
 do_syscall_64+0xa4/0x2a0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39980/">CVE-2025-39980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39980">CVE-2025-39980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252063">SUSE bug 1252063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39981</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39981" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39981" ref_url="https://www.suse.com/security/cve/CVE-2025-39981" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Fix possible UAFs

This attemps to fix possible UAFs caused by struct mgmt_pending being
freed while still being processed like in the following trace, in order
to fix mgmt_pending_valid is introduce and use to check if the
mgmt_pending hasn't been removed from the pending list, on the complete
callbacks it is used to check and in addtion remove the cmd from the list
while holding mgmt_pending_lock to avoid TOCTOU problems since if the cmd
is left on the list it can still be accessed and freed.

BUG: KASAN: slab-use-after-free in mgmt_add_adv_patterns_monitor_sync+0x35/0x50 net/bluetooth/mgmt.c:5223
Read of size 8 at addr ffff8880709d4dc0 by task kworker/u11:0/55

CPU: 0 UID: 0 PID: 55 Comm: kworker/u11:0 Not tainted 6.16.4 #2 PREEMPT(full)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014
Workqueue: hci0 hci_cmd_sync_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xca/0x240 mm/kasan/report.c:482
 kasan_report+0x118/0x150 mm/kasan/report.c:595
 mgmt_add_adv_patterns_monitor_sync+0x35/0x50 net/bluetooth/mgmt.c:5223
 hci_cmd_sync_work+0x210/0x3a0 net/bluetooth/hci_sync.c:332
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402
 kthread+0x711/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 home/kwqcheii/source/fuzzing/kernel/kasan/linux-6.16.4/arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

Allocated by task 12210:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4364
 kmalloc_noprof include/linux/slab.h:905 [inline]
 kzalloc_noprof include/linux/slab.h:1039 [inline]
 mgmt_pending_new+0x65/0x1e0 net/bluetooth/mgmt_util.c:269
 mgmt_pending_add+0x35/0x140 net/bluetooth/mgmt_util.c:296
 __add_adv_patterns_monitor+0x130/0x200 net/bluetooth/mgmt.c:5247
 add_adv_patterns_monitor+0x214/0x360 net/bluetooth/mgmt.c:5364
 hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719
 hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839
 sock_sendmsg_nosec net/socket.c:714 [inline]
 __sock_sendmsg+0x219/0x270 net/socket.c:729
 sock_write_iter+0x258/0x330 net/socket.c:1133
 new_sync_write fs/read_write.c:593 [inline]
 vfs_write+0x5c9/0xb30 fs/read_write.c:686
 ksys_write+0x145/0x250 fs/read_write.c:738
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 12221:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576
 poison_slab_object mm/kasan/common.c:247 [inline]
 __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264
 kasan_slab_free include/linux/kasan.h:233 [inline]
 slab_free_hook mm/slub.c:2381 [inline]
 slab_free mm/slub.c:4648 [inline]
 kfree+0x18e/0x440 mm/slub.c:4847
 mgmt_pending_free net/bluetooth/mgmt_util.c:311 [inline]
 mgmt_pending_foreach+0x30d/0x380 net/bluetooth/mgmt_util.c:257
 __mgmt_power_off+0x169/0x350 net/bluetooth/mgmt.c:9444
 hci_dev_close_sync+0x754/0x1330 net/bluetooth/hci_sync.c:5290
 hci_dev_do_close net/bluetooth/hci_core.c:501 [inline]
 hci_dev_close+0x108/0x200 net/bluetooth/hci_core.c:526
 sock_do_ioctl+0xd9/0x300 net/socket.c:1192
 sock_ioctl+0x576/0x790 net/socket.c:1313
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xf
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39981/">CVE-2025-39981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39981">CVE-2025-39981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252060">SUSE bug 1252060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252061">SUSE bug 1252061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39982</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39982" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39982" ref_url="https://www.suse.com/security/cve/CVE-2025-39982" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync

This fixes the following UFA in hci_acl_create_conn_sync where a
connection still pending is command submission (conn-&gt;state == BT_OPEN)
maybe freed, also since this also can happen with the likes of
hci_le_create_conn_sync fix it as well:

BUG: KASAN: slab-use-after-free in hci_acl_create_conn_sync+0x5ef/0x790 net/bluetooth/hci_sync.c:6861
Write of size 2 at addr ffff88805ffcc038 by task kworker/u11:2/9541

CPU: 1 UID: 0 PID: 9541 Comm: kworker/u11:2 Not tainted 6.16.0-rc7 #3 PREEMPT(full)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014
Workqueue: hci3 hci_cmd_sync_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xca/0x230 mm/kasan/report.c:480
 kasan_report+0x118/0x150 mm/kasan/report.c:593
 hci_acl_create_conn_sync+0x5ef/0x790 net/bluetooth/hci_sync.c:6861
 hci_cmd_sync_work+0x210/0x3a0 net/bluetooth/hci_sync.c:332
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402
 kthread+0x70e/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 home/kwqcheii/source/fuzzing/kernel/kasan/linux-6.16-rc7/arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

Allocated by task 123736:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4359
 kmalloc_noprof include/linux/slab.h:905 [inline]
 kzalloc_noprof include/linux/slab.h:1039 [inline]
 __hci_conn_add+0x233/0x1b30 net/bluetooth/hci_conn.c:939
 hci_conn_add_unset net/bluetooth/hci_conn.c:1051 [inline]
 hci_connect_acl+0x16c/0x4e0 net/bluetooth/hci_conn.c:1634
 pair_device+0x418/0xa70 net/bluetooth/mgmt.c:3556
 hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719
 hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg+0x219/0x270 net/socket.c:727
 sock_write_iter+0x258/0x330 net/socket.c:1131
 new_sync_write fs/read_write.c:593 [inline]
 vfs_write+0x54b/0xa90 fs/read_write.c:686
 ksys_write+0x145/0x250 fs/read_write.c:738
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 103680:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576
 poison_slab_object mm/kasan/common.c:247 [inline]
 __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264
 kasan_slab_free include/linux/kasan.h:233 [inline]
 slab_free_hook mm/slub.c:2381 [inline]
 slab_free mm/slub.c:4643 [inline]
 kfree+0x18e/0x440 mm/slub.c:4842
 device_release+0x9c/0x1c0
 kobject_cleanup lib/kobject.c:689 [inline]
 kobject_release lib/kobject.c:720 [inline]
 kref_put include/linux/kref.h:65 [inline]
 kobject_put+0x22b/0x480 lib/kobject.c:737
 hci_conn_cleanup net/bluetooth/hci_conn.c:175 [inline]
 hci_conn_del+0x8ff/0xcb0 net/bluetooth/hci_conn.c:1173
 hci_conn_complete_evt+0x3c7/0x1040 net/bluetooth/hci_event.c:3199
 hci_event_func net/bluetooth/hci_event.c:7477 [inline]
 hci_event_packet+0x7e0/0x1200 net/bluetooth/hci_event.c:7531
 hci_rx_work+0x46a/0xe80 net/bluetooth/hci_core.c:4070
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402
 kthread+0x70e/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 home/kwqcheii/sour
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39982/">CVE-2025-39982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39982">CVE-2025-39982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252083">SUSE bug 1252083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39984</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39984" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39984" ref_url="https://www.suse.com/security/cve/CVE-2025-39984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: tun: Update napi-&gt;skb after XDP process

The syzbot report a UAF issue:

  BUG: KASAN: slab-use-after-free in skb_reset_mac_header include/linux/skbuff.h:3150 [inline]
  BUG: KASAN: slab-use-after-free in napi_frags_skb net/core/gro.c:723 [inline]
  BUG: KASAN: slab-use-after-free in napi_gro_frags+0x6e/0x1030 net/core/gro.c:758
  Read of size 8 at addr ffff88802ef22c18 by task syz.0.17/6079
  CPU: 0 UID: 0 PID: 6079 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full)
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
   print_address_description mm/kasan/report.c:378 [inline]
   print_report+0xca/0x240 mm/kasan/report.c:482
   kasan_report+0x118/0x150 mm/kasan/report.c:595
   skb_reset_mac_header include/linux/skbuff.h:3150 [inline]
   napi_frags_skb net/core/gro.c:723 [inline]
   napi_gro_frags+0x6e/0x1030 net/core/gro.c:758
   tun_get_user+0x28cb/0x3e20 drivers/net/tun.c:1920
   tun_chr_write_iter+0x113/0x200 drivers/net/tun.c:1996
   new_sync_write fs/read_write.c:593 [inline]
   vfs_write+0x5c9/0xb30 fs/read_write.c:686
   ksys_write+0x145/0x250 fs/read_write.c:738
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
   &lt;/TASK&gt;

  Allocated by task 6079:
   kasan_save_stack mm/kasan/common.c:47 [inline]
   kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
   unpoison_slab_object mm/kasan/common.c:330 [inline]
   __kasan_mempool_unpoison_object+0xa0/0x170 mm/kasan/common.c:558
   kasan_mempool_unpoison_object include/linux/kasan.h:388 [inline]
   napi_skb_cache_get+0x37b/0x6d0 net/core/skbuff.c:295
   __alloc_skb+0x11e/0x2d0 net/core/skbuff.c:657
   napi_alloc_skb+0x84/0x7d0 net/core/skbuff.c:811
   napi_get_frags+0x69/0x140 net/core/gro.c:673
   tun_napi_alloc_frags drivers/net/tun.c:1404 [inline]
   tun_get_user+0x77c/0x3e20 drivers/net/tun.c:1784
   tun_chr_write_iter+0x113/0x200 drivers/net/tun.c:1996
   new_sync_write fs/read_write.c:593 [inline]
   vfs_write+0x5c9/0xb30 fs/read_write.c:686
   ksys_write+0x145/0x250 fs/read_write.c:738
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

  Freed by task 6079:
   kasan_save_stack mm/kasan/common.c:47 [inline]
   kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
   kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576
   poison_slab_object mm/kasan/common.c:243 [inline]
   __kasan_slab_free+0x5b/0x80 mm/kasan/common.c:275
   kasan_slab_free include/linux/kasan.h:233 [inline]
   slab_free_hook mm/slub.c:2422 [inline]
   slab_free mm/slub.c:4695 [inline]
   kmem_cache_free+0x18f/0x400 mm/slub.c:4797
   skb_pp_cow_data+0xdd8/0x13e0 net/core/skbuff.c:969
   netif_skb_check_for_xdp net/core/dev.c:5390 [inline]
   netif_receive_generic_xdp net/core/dev.c:5431 [inline]
   do_xdp_generic+0x699/0x11a0 net/core/dev.c:5499
   tun_get_user+0x2523/0x3e20 drivers/net/tun.c:1872
   tun_chr_write_iter+0x113/0x200 drivers/net/tun.c:1996
   new_sync_write fs/read_write.c:593 [inline]
   vfs_write+0x5c9/0xb30 fs/read_write.c:686
   ksys_write+0x145/0x250 fs/read_write.c:738
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

After commit e6d5dbdd20aa ("xdp: add multi-buff support for xdp running in
generic mode"), the original skb may be freed in skb_pp_cow_data() when
XDP program was attached, which was allocated in tun_napi_alloc_frags().
However, the napi-&gt;skb still point to the original skb, update it after
XDP process.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39984/">CVE-2025-39984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39984">CVE-2025-39984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252081">SUSE bug 1252081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39985</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39985" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39985" ref_url="https://www.suse.com/security/cve/CVE-2025-39985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow

Sending an PF_PACKET allows to bypass the CAN framework logic and to
directly reach the xmit() function of a CAN driver. The only check
which is performed by the PF_PACKET framework is to make sure that
skb-&gt;len fits the interface's MTU.

Unfortunately, because the mcba_usb driver does not populate its
net_device_ops-&gt;ndo_change_mtu(), it is possible for an attacker to
configure an invalid MTU by doing, for example:

  $ ip link set can0 mtu 9999

After doing so, the attacker could open a PF_PACKET socket using the
ETH_P_CANXL protocol:

	socket(PF_PACKET, SOCK_RAW, htons(ETH_P_CANXL))

to inject a malicious CAN XL frames. For example:

	struct canxl_frame frame = {
		.flags = 0xff,
		.len = 2048,
	};

The CAN drivers' xmit() function are calling can_dev_dropped_skb() to
check that the skb is valid, unfortunately under above conditions, the
malicious packet is able to go through can_dev_dropped_skb() checks:

  1. the skb-&gt;protocol is set to ETH_P_CANXL which is valid (the
     function does not check the actual device capabilities).

  2. the length is a valid CAN XL length.

And so, mcba_usb_start_xmit() receives a CAN XL frame which it is not
able to correctly handle and will thus misinterpret it as a CAN frame.

This can result in a buffer overflow. The driver will consume cf-&gt;len
as-is with no further checks on these lines:

	usb_msg.dlc = cf-&gt;len;

	memcpy(usb_msg.data, cf-&gt;data, usb_msg.dlc);

Here, cf-&gt;len corresponds to the flags field of the CAN XL frame. In
our previous example, we set canxl_frame-&gt;flags to 0xff. Because the
maximum expected length is 8, a buffer overflow of 247 bytes occurs!

Populate net_device_ops-&gt;ndo_change_mtu() to ensure that the
interface's MTU can not be set to anything bigger than CAN_MTU. By
fixing the root cause, this prevents the buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39985/">CVE-2025-39985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39985">CVE-2025-39985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252082">SUSE bug 1252082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39986</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39986" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39986" ref_url="https://www.suse.com/security/cve/CVE-2025-39986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow

Sending an PF_PACKET allows to bypass the CAN framework logic and to
directly reach the xmit() function of a CAN driver. The only check
which is performed by the PF_PACKET framework is to make sure that
skb-&gt;len fits the interface's MTU.

Unfortunately, because the sun4i_can driver does not populate its
net_device_ops-&gt;ndo_change_mtu(), it is possible for an attacker to
configure an invalid MTU by doing, for example:

  $ ip link set can0 mtu 9999

After doing so, the attacker could open a PF_PACKET socket using the
ETH_P_CANXL protocol:

	socket(PF_PACKET, SOCK_RAW, htons(ETH_P_CANXL))

to inject a malicious CAN XL frames. For example:

	struct canxl_frame frame = {
		.flags = 0xff,
		.len = 2048,
	};

The CAN drivers' xmit() function are calling can_dev_dropped_skb() to
check that the skb is valid, unfortunately under above conditions, the
malicious packet is able to go through can_dev_dropped_skb() checks:

  1. the skb-&gt;protocol is set to ETH_P_CANXL which is valid (the
     function does not check the actual device capabilities).

  2. the length is a valid CAN XL length.

And so, sun4ican_start_xmit() receives a CAN XL frame which it is not
able to correctly handle and will thus misinterpret it as a CAN frame.

This can result in a buffer overflow. The driver will consume cf-&gt;len
as-is with no further checks on this line:

	dlc = cf-&gt;len;

Here, cf-&gt;len corresponds to the flags field of the CAN XL frame. In
our previous example, we set canxl_frame-&gt;flags to 0xff. Because the
maximum expected length is 8, a buffer overflow of 247 bytes occurs a
couple line below when doing:

	for (i = 0; i &lt; dlc; i++)
		writel(cf-&gt;data[i], priv-&gt;base + (dreg + i * 4));

Populate net_device_ops-&gt;ndo_change_mtu() to ensure that the
interface's MTU can not be set to anything bigger than CAN_MTU. By
fixing the root cause, this prevents the buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39986/">CVE-2025-39986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39986">CVE-2025-39986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252078">SUSE bug 1252078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39987</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39987" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39987" ref_url="https://www.suse.com/security/cve/CVE-2025-39987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: hi311x: populate ndo_change_mtu() to prevent buffer overflow

Sending an PF_PACKET allows to bypass the CAN framework logic and to
directly reach the xmit() function of a CAN driver. The only check
which is performed by the PF_PACKET framework is to make sure that
skb-&gt;len fits the interface's MTU.

Unfortunately, because the sun4i_can driver does not populate its
net_device_ops-&gt;ndo_change_mtu(), it is possible for an attacker to
configure an invalid MTU by doing, for example:

  $ ip link set can0 mtu 9999

After doing so, the attacker could open a PF_PACKET socket using the
ETH_P_CANXL protocol:

	socket(PF_PACKET, SOCK_RAW, htons(ETH_P_CANXL))

to inject a malicious CAN XL frames. For example:

	struct canxl_frame frame = {
		.flags = 0xff,
		.len = 2048,
	};

The CAN drivers' xmit() function are calling can_dev_dropped_skb() to
check that the skb is valid, unfortunately under above conditions, the
malicious packet is able to go through can_dev_dropped_skb() checks:

  1. the skb-&gt;protocol is set to ETH_P_CANXL which is valid (the
     function does not check the actual device capabilities).

  2. the length is a valid CAN XL length.

And so, hi3110_hard_start_xmit() receives a CAN XL frame which it is
not able to correctly handle and will thus misinterpret it as a CAN
frame. The driver will consume frame-&gt;len as-is with no further
checks.

This can result in a buffer overflow later on in hi3110_hw_tx() on
this line:

	memcpy(buf + HI3110_FIFO_EXT_DATA_OFF,
	       frame-&gt;data, frame-&gt;len);

Here, frame-&gt;len corresponds to the flags field of the CAN XL frame.
In our previous example, we set canxl_frame-&gt;flags to 0xff. Because
the maximum expected length is 8, a buffer overflow of 247 bytes
occurs!

Populate net_device_ops-&gt;ndo_change_mtu() to ensure that the
interface's MTU can not be set to anything bigger than CAN_MTU. By
fixing the root cause, this prevents the buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39987/">CVE-2025-39987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39987">CVE-2025-39987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252079">SUSE bug 1252079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39988</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39988" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39988" ref_url="https://www.suse.com/security/cve/CVE-2025-39988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow

Sending an PF_PACKET allows to bypass the CAN framework logic and to
directly reach the xmit() function of a CAN driver. The only check
which is performed by the PF_PACKET framework is to make sure that
skb-&gt;len fits the interface's MTU.

Unfortunately, because the etas_es58x driver does not populate its
net_device_ops-&gt;ndo_change_mtu(), it is possible for an attacker to
configure an invalid MTU by doing, for example:

  $ ip link set can0 mtu 9999

After doing so, the attacker could open a PF_PACKET socket using the
ETH_P_CANXL protocol:

	socket(PF_PACKET, SOCK_RAW, htons(ETH_P_CANXL));

to inject a malicious CAN XL frames. For example:

	struct canxl_frame frame = {
		.flags = 0xff,
		.len = 2048,
	};

The CAN drivers' xmit() function are calling can_dev_dropped_skb() to
check that the skb is valid, unfortunately under above conditions, the
malicious packet is able to go through can_dev_dropped_skb() checks:

  1. the skb-&gt;protocol is set to ETH_P_CANXL which is valid (the
     function does not check the actual device capabilities).

  2. the length is a valid CAN XL length.

And so, es58x_start_xmit() receives a CAN XL frame which it is not
able to correctly handle and will thus misinterpret it as a CAN(FD)
frame.

This can result in a buffer overflow. For example, using the es581.4
variant, the frame will be dispatched to es581_4_tx_can_msg(), go
through the last check at the beginning of this function:

	if (can_is_canfd_skb(skb))
		return -EMSGSIZE;

and reach this line:

	memcpy(tx_can_msg-&gt;data, cf-&gt;data, cf-&gt;len);

Here, cf-&gt;len corresponds to the flags field of the CAN XL frame. In
our previous example, we set canxl_frame-&gt;flags to 0xff. Because the
maximum expected length is 8, a buffer overflow of 247 bytes occurs!

Populate net_device_ops-&gt;ndo_change_mtu() to ensure that the
interface's MTU can not be set to anything bigger than CAN_MTU or
CANFD_MTU (depending on the device capabilities). By fixing the root
cause, this prevents the buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39988/">CVE-2025-39988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39988">CVE-2025-39988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252074">SUSE bug 1252074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39990</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39990" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39990" ref_url="https://www.suse.com/security/cve/CVE-2025-39990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Check the helper function is valid in get_helper_proto

kernel test robot reported verifier bug [1] where the helper func
pointer could be NULL due to disabled config option.

As Alexei suggested we could check on that in get_helper_proto
directly. Marking tail_call helper func with BPF_PTR_POISON,
because it is unused by design.

  [1] https://lore.kernel.org/oe-lkp/202507160818.68358831-lkp@intel.com
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39990/">CVE-2025-39990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39990">CVE-2025-39990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252054">SUSE bug 1252054</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39991</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39991" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39991" ref_url="https://www.suse.com/security/cve/CVE-2025-39991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()

If ab-&gt;fw.m3_data points to data, then fw pointer remains null.
Further, if m3_mem is not allocated, then fw is dereferenced to be
passed to ath11k_err function.

Replace fw-&gt;size by m3_len.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39991/">CVE-2025-39991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39991">CVE-2025-39991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252075">SUSE bug 1252075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39992</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39992" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39992" ref_url="https://www.suse.com/security/cve/CVE-2025-39992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: swap: check for stable address space before operating on the VMA

It is possible to hit a zero entry while traversing the vmas in unuse_mm()
called from swapoff path and accessing it causes the OOPS:

Unable to handle kernel NULL pointer dereference at virtual address
0000000000000446--&gt; Loading the memory from offset 0x40 on the
XA_ZERO_ENTRY as address.
Mem abort info:
  ESR = 0x0000000096000005
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x05: level 1 translation fault

The issue is manifested from the below race between the fork() on a
process and swapoff:
fork(dup_mmap())			swapoff(unuse_mm)
---------------                         -----------------
1) Identical mtree is built using
   __mt_dup().

2) copy_pte_range()--&gt;
	copy_nonpresent_pte():
       The dst mm is added into the
    mmlist to be visible to the
    swapoff operation.

3) Fatal signal is sent to the parent
process(which is the current during the
fork) thus skip the duplication of the
vmas and mark the vma range with
XA_ZERO_ENTRY as a marker for this process
that helps during exit_mmap().

				     4) swapoff is tried on the
					'mm' added to the 'mmlist' as
					part of the 2.

				     5) unuse_mm(), that iterates
					through the vma's of this 'mm'
					will hit the non-NULL zero entry
					and operating on this zero entry
					as a vma is resulting into the
					oops.

The proper fix would be around not exposing this partially-valid tree to
others when droping the mmap lock, which is being solved with [1].  A
simpler solution would be checking for MMF_UNSTABLE, as it is set if
mm_struct is not fully initialized in dup_mmap().

Thanks to Liam/Lorenzo/David for all the suggestions in fixing this
issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39992/">CVE-2025-39992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39992">CVE-2025-39992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252076">SUSE bug 1252076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39993</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39993" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39993" ref_url="https://www.suse.com/security/cve/CVE-2025-39993" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: rc: fix races with imon_disconnect()

Syzbot reports a KASAN issue as below:
BUG: KASAN: use-after-free in __create_pipe include/linux/usb.h:1945 [inline]
BUG: KASAN: use-after-free in send_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627
Read of size 4 at addr ffff8880256fb000 by task syz-executor314/4465

CPU: 2 PID: 4465 Comm: syz-executor314 Not tainted 6.0.0-rc1-syzkaller #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
Call Trace:
 &lt;TASK&gt;
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_address_description mm/kasan/report.c:317 [inline]
print_report.cold+0x2ba/0x6e9 mm/kasan/report.c:433
kasan_report+0xb1/0x1e0 mm/kasan/report.c:495
__create_pipe include/linux/usb.h:1945 [inline]
send_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627
vfd_write+0x2d9/0x550 drivers/media/rc/imon.c:991
vfs_write+0x2d7/0xdd0 fs/read_write.c:576
ksys_write+0x127/0x250 fs/read_write.c:631
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

The iMON driver improperly releases the usb_device reference in
imon_disconnect without coordinating with active users of the
device.

Specifically, the fields usbdev_intf0 and usbdev_intf1 are not
protected by the users counter (ictx-&gt;users). During probe,
imon_init_intf0 or imon_init_intf1 increments the usb_device
reference count depending on the interface. However, during
disconnect, usb_put_dev is called unconditionally, regardless of
actual usage.

As a result, if vfd_write or other operations are still in
progress after disconnect, this can lead to a use-after-free of
the usb_device pointer.

Thread 1 vfd_write                      Thread 2 imon_disconnect
                                        ...
                                        if
                                          usb_put_dev(ictx-&gt;usbdev_intf0)
                                        else
                                          usb_put_dev(ictx-&gt;usbdev_intf1)
...
while
  send_packet
    if
      pipe = usb_sndintpipe(
        ictx-&gt;usbdev_intf0) UAF
    else
      pipe = usb_sndctrlpipe(
        ictx-&gt;usbdev_intf0, 0) UAF

Guard access to usbdev_intf0 and usbdev_intf1 after disconnect by
checking ictx-&gt;disconnected in all writer paths. Add early return
with -ENODEV in send_packet(), vfd_write(), lcd_write() and
display_open() if the device is no longer present.

Set and read ictx-&gt;disconnected under ictx-&gt;lock to ensure memory
synchronization. Acquire the lock in imon_disconnect() before setting
the flag to synchronize with any ongoing operations.

Ensure writers exit early and safely after disconnect before the USB
core proceeds with cleanup.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39993/">CVE-2025-39993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39993">CVE-2025-39993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252070">SUSE bug 1252070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39994</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39994" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39994" ref_url="https://www.suse.com/security/cve/CVE-2025-39994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: tuner: xc5000: Fix use-after-free in xc5000_release

The original code uses cancel_delayed_work() in xc5000_release(), which
does not guarantee that the delayed work item timer_sleep has fully
completed if it was already running. This leads to use-after-free scenarios
where xc5000_release() may free the xc5000_priv while timer_sleep is still
active and attempts to dereference the xc5000_priv.

A typical race condition is illustrated below:

CPU 0 (release thread)                 | CPU 1 (delayed work callback)
xc5000_release()                       | xc5000_do_timer_sleep()
  cancel_delayed_work()                |
  hybrid_tuner_release_state(priv)     |
    kfree(priv)                        |
                                       |   priv = container_of() // UAF

Replace cancel_delayed_work() with cancel_delayed_work_sync() to ensure
that the timer_sleep is properly canceled before the xc5000_priv memory
is deallocated.

A deadlock concern was considered: xc5000_release() is called in a process
context and is not holding any locks that the timer_sleep work item might
also need. Therefore, the use of the _sync() variant is safe here.

This bug was initially identified through static analysis.

[hverkuil: fix typo in Subject: tunner -&gt; tuner]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39994/">CVE-2025-39994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39994">CVE-2025-39994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252072">SUSE bug 1252072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39995</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39995" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39995" ref_url="https://www.suse.com/security/cve/CVE-2025-39995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe

The state-&gt;timer is a cyclic timer that schedules work_i2c_poll and
delayed_work_enable_hotplug, while rearming itself. Using timer_delete()
fails to guarantee the timer isn't still running when destroyed, similarly
cancel_delayed_work() cannot ensure delayed_work_enable_hotplug has
terminated if already executing. During probe failure after timer
initialization, these may continue running as orphans and reference the
already-freed tc358743_state object through tc358743_irq_poll_timer.

The following is the trace captured by KASAN.

BUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0
Write of size 8 at addr ffff88800ded83c8 by task swapper/1/0
...
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x55/0x70
 print_report+0xcf/0x610
 ? __pfx_sched_balance_find_src_group+0x10/0x10
 ? __run_timer_base.part.0+0x7d7/0x8c0
 kasan_report+0xb8/0xf0
 ? __run_timer_base.part.0+0x7d7/0x8c0
 __run_timer_base.part.0+0x7d7/0x8c0
 ? rcu_sched_clock_irq+0xb06/0x27d0
 ? __pfx___run_timer_base.part.0+0x10/0x10
 ? try_to_wake_up+0xb15/0x1960
 ? tmigr_update_events+0x280/0x740
 ? _raw_spin_lock_irq+0x80/0xe0
 ? __pfx__raw_spin_lock_irq+0x10/0x10
 tmigr_handle_remote_up+0x603/0x7e0
 ? __pfx_tmigr_handle_remote_up+0x10/0x10
 ? sched_balance_trigger+0x98/0x9f0
 ? sched_tick+0x221/0x5a0
 ? _raw_spin_lock_irq+0x80/0xe0
 ? __pfx__raw_spin_lock_irq+0x10/0x10
 ? tick_nohz_handler+0x339/0x440
 ? __pfx_tmigr_handle_remote_up+0x10/0x10
 __walk_groups.isra.0+0x42/0x150
 tmigr_handle_remote+0x1f4/0x2e0
 ? __pfx_tmigr_handle_remote+0x10/0x10
 ? ktime_get+0x60/0x140
 ? lapic_next_event+0x11/0x20
 ? clockevents_program_event+0x1d4/0x2a0
 ? hrtimer_interrupt+0x322/0x780
 handle_softirqs+0x16a/0x550
 irq_exit_rcu+0xaf/0xe0
 sysvec_apic_timer_interrupt+0x70/0x80
 &lt;/IRQ&gt;
...

Allocated by task 141:
 kasan_save_stack+0x24/0x50
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x7f/0x90
 __kmalloc_node_track_caller_noprof+0x198/0x430
 devm_kmalloc+0x7b/0x1e0
 tc358743_probe+0xb7/0x610  i2c_device_probe+0x51d/0x880
 really_probe+0x1ca/0x5c0
 __driver_probe_device+0x248/0x310
 driver_probe_device+0x44/0x120
 __device_attach_driver+0x174/0x220
 bus_for_each_drv+0x100/0x190
 __device_attach+0x206/0x370
 bus_probe_device+0x123/0x170
 device_add+0xd25/0x1470
 i2c_new_client_device+0x7a0/0xcd0
 do_one_initcall+0x89/0x300
 do_init_module+0x29d/0x7f0
 load_module+0x4f48/0x69e0
 init_module_from_file+0xe4/0x150
 idempotent_init_module+0x320/0x670
 __x64_sys_finit_module+0xbd/0x120
 do_syscall_64+0xac/0x280
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 141:
 kasan_save_stack+0x24/0x50
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3a/0x60
 __kasan_slab_free+0x3f/0x50
 kfree+0x137/0x370
 release_nodes+0xa4/0x100
 devres_release_group+0x1b2/0x380
 i2c_device_probe+0x694/0x880
 really_probe+0x1ca/0x5c0
 __driver_probe_device+0x248/0x310
 driver_probe_device+0x44/0x120
 __device_attach_driver+0x174/0x220
 bus_for_each_drv+0x100/0x190
 __device_attach+0x206/0x370
 bus_probe_device+0x123/0x170
 device_add+0xd25/0x1470
 i2c_new_client_device+0x7a0/0xcd0
 do_one_initcall+0x89/0x300
 do_init_module+0x29d/0x7f0
 load_module+0x4f48/0x69e0
 init_module_from_file+0xe4/0x150
 idempotent_init_module+0x320/0x670
 __x64_sys_finit_module+0xbd/0x120
 do_syscall_64+0xac/0x280
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
...

Replace timer_delete() with timer_delete_sync() and cancel_delayed_work()
with cancel_delayed_work_sync() to ensure proper termination of timer and
work items before resource cleanup.

This bug was initially identified through static analysis. For reproduction
and testing, I created a functional emulation of the tc358743 device via a
kernel module and introduced faults through the debugfs interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39995/">CVE-2025-39995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39995">CVE-2025-39995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252064">SUSE bug 1252064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39996</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39996" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39996" ref_url="https://www.suse.com/security/cve/CVE-2025-39996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove

The original code uses cancel_delayed_work() in flexcop_pci_remove(), which
does not guarantee that the delayed work item irq_check_work has fully
completed if it was already running. This leads to use-after-free scenarios
where flexcop_pci_remove() may free the flexcop_device while irq_check_work
is still active and attempts to dereference the device.

A typical race condition is illustrated below:

CPU 0 (remove)                         | CPU 1 (delayed work callback)
flexcop_pci_remove()                   | flexcop_pci_irq_check_work()
  cancel_delayed_work()                |
  flexcop_device_kfree(fc_pci-&gt;fc_dev) |
                                       |   fc = fc_pci-&gt;fc_dev; // UAF

This is confirmed by a KASAN report:

==================================================================
BUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0
Write of size 8 at addr ffff8880093aa8c8 by task bash/135
...
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x55/0x70
 print_report+0xcf/0x610
 ? __run_timer_base.part.0+0x7d7/0x8c0
 kasan_report+0xb8/0xf0
 ? __run_timer_base.part.0+0x7d7/0x8c0
 __run_timer_base.part.0+0x7d7/0x8c0
 ? __pfx___run_timer_base.part.0+0x10/0x10
 ? __pfx_read_tsc+0x10/0x10
 ? ktime_get+0x60/0x140
 ? lapic_next_event+0x11/0x20
 ? clockevents_program_event+0x1d4/0x2a0
 run_timer_softirq+0xd1/0x190
 handle_softirqs+0x16a/0x550
 irq_exit_rcu+0xaf/0xe0
 sysvec_apic_timer_interrupt+0x70/0x80
 &lt;/IRQ&gt;
...

Allocated by task 1:
 kasan_save_stack+0x24/0x50
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x7f/0x90
 __kmalloc_noprof+0x1be/0x460
 flexcop_device_kmalloc+0x54/0xe0
 flexcop_pci_probe+0x1f/0x9d0
 local_pci_probe+0xdc/0x190
 pci_device_probe+0x2fe/0x470
 really_probe+0x1ca/0x5c0
 __driver_probe_device+0x248/0x310
 driver_probe_device+0x44/0x120
 __driver_attach+0xd2/0x310
 bus_for_each_dev+0xed/0x170
 bus_add_driver+0x208/0x500
 driver_register+0x132/0x460
 do_one_initcall+0x89/0x300
 kernel_init_freeable+0x40d/0x720
 kernel_init+0x1a/0x150
 ret_from_fork+0x10c/0x1a0
 ret_from_fork_asm+0x1a/0x30

Freed by task 135:
 kasan_save_stack+0x24/0x50
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3a/0x60
 __kasan_slab_free+0x3f/0x50
 kfree+0x137/0x370
 flexcop_device_kfree+0x32/0x50
 pci_device_remove+0xa6/0x1d0
 device_release_driver_internal+0xf8/0x210
 pci_stop_bus_device+0x105/0x150
 pci_stop_and_remove_bus_device_locked+0x15/0x30
 remove_store+0xcc/0xe0
 kernfs_fop_write_iter+0x2c3/0x440
 vfs_write+0x871/0xd70
 ksys_write+0xee/0x1c0
 do_syscall_64+0xac/0x280
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
...

Replace cancel_delayed_work() with cancel_delayed_work_sync() to ensure
that the delayed work item is properly canceled and any executing delayed
work has finished before the device memory is deallocated.

This bug was initially identified through static analysis. To reproduce
and test it, I simulated the B2C2 FlexCop PCI device in QEMU and introduced
artificial delays within the flexcop_pci_irq_check_work() function to
increase the likelihood of triggering the bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39996/">CVE-2025-39996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39996">CVE-2025-39996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252065">SUSE bug 1252065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39997</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39997" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39997" ref_url="https://www.suse.com/security/cve/CVE-2025-39997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free

The previous commit 0718a78f6a9f ("ALSA: usb-audio: Kill timer properly at
removal") patched a UAF issue caused by the error timer.

However, because the error timer kill added in this patch occurs after the
endpoint delete, a race condition to UAF still occurs, albeit rarely.

Additionally, since kill-cleanup for urb is also missing, freed memory can
be accessed in interrupt context related to urb, which can cause UAF.

Therefore, to prevent this, error timer and urb must be killed before
freeing the heap memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39997/">CVE-2025-39997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39997">CVE-2025-39997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252056">SUSE bug 1252056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40000</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40000" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40000" ref_url="https://www.suse.com/security/cve/CVE-2025-40000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()

There is a bug observed when rtw89_core_tx_kick_off_and_wait() tries to
access already freed skb_data:

 BUG: KFENCE: use-after-free write in rtw89_core_tx_kick_off_and_wait drivers/net/wireless/realtek/rtw89/core.c:1110

 CPU: 6 UID: 0 PID: 41377 Comm: kworker/u64:24 Not tainted  6.17.0-rc1+ #1 PREEMPT(lazy)
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS edk2-20250523-14.fc42 05/23/2025
 Workqueue: events_unbound cfg80211_wiphy_work [cfg80211]

 Use-after-free write at 0x0000000020309d9d (in kfence-#251):
 rtw89_core_tx_kick_off_and_wait drivers/net/wireless/realtek/rtw89/core.c:1110
 rtw89_core_scan_complete drivers/net/wireless/realtek/rtw89/core.c:5338
 rtw89_hw_scan_complete_cb drivers/net/wireless/realtek/rtw89/fw.c:7979
 rtw89_chanctx_proceed_cb drivers/net/wireless/realtek/rtw89/chan.c:3165
 rtw89_chanctx_proceed drivers/net/wireless/realtek/rtw89/chan.h:141
 rtw89_hw_scan_complete drivers/net/wireless/realtek/rtw89/fw.c:8012
 rtw89_mac_c2h_scanofld_rsp drivers/net/wireless/realtek/rtw89/mac.c:5059
 rtw89_fw_c2h_work drivers/net/wireless/realtek/rtw89/fw.c:6758
 process_one_work kernel/workqueue.c:3241
 worker_thread kernel/workqueue.c:3400
 kthread kernel/kthread.c:463
 ret_from_fork arch/x86/kernel/process.c:154
 ret_from_fork_asm arch/x86/entry/entry_64.S:258

 kfence-#251: 0x0000000056e2393d-0x000000009943cb62, size=232, cache=skbuff_head_cache

 allocated by task 41377 on cpu 6 at 77869.159548s (0.009551s ago):
 __alloc_skb net/core/skbuff.c:659
 __netdev_alloc_skb net/core/skbuff.c:734
 ieee80211_nullfunc_get net/mac80211/tx.c:5844
 rtw89_core_send_nullfunc drivers/net/wireless/realtek/rtw89/core.c:3431
 rtw89_core_scan_complete drivers/net/wireless/realtek/rtw89/core.c:5338
 rtw89_hw_scan_complete_cb drivers/net/wireless/realtek/rtw89/fw.c:7979
 rtw89_chanctx_proceed_cb drivers/net/wireless/realtek/rtw89/chan.c:3165
 rtw89_chanctx_proceed drivers/net/wireless/realtek/rtw89/chan.c:3194
 rtw89_hw_scan_complete drivers/net/wireless/realtek/rtw89/fw.c:8012
 rtw89_mac_c2h_scanofld_rsp drivers/net/wireless/realtek/rtw89/mac.c:5059
 rtw89_fw_c2h_work drivers/net/wireless/realtek/rtw89/fw.c:6758
 process_one_work kernel/workqueue.c:3241
 worker_thread kernel/workqueue.c:3400
 kthread kernel/kthread.c:463
 ret_from_fork arch/x86/kernel/process.c:154
 ret_from_fork_asm arch/x86/entry/entry_64.S:258

 freed by task 1045 on cpu 9 at 77869.168393s (0.001557s ago):
 ieee80211_tx_status_skb net/mac80211/status.c:1117
 rtw89_pci_release_txwd_skb drivers/net/wireless/realtek/rtw89/pci.c:564
 rtw89_pci_release_tx_skbs.isra.0 drivers/net/wireless/realtek/rtw89/pci.c:651
 rtw89_pci_release_tx drivers/net/wireless/realtek/rtw89/pci.c:676
 rtw89_pci_napi_poll drivers/net/wireless/realtek/rtw89/pci.c:4238
 __napi_poll net/core/dev.c:7495
 net_rx_action net/core/dev.c:7557 net/core/dev.c:7684
 handle_softirqs kernel/softirq.c:580
 do_softirq.part.0 kernel/softirq.c:480
 __local_bh_enable_ip kernel/softirq.c:407
 rtw89_pci_interrupt_threadfn drivers/net/wireless/realtek/rtw89/pci.c:927
 irq_thread_fn kernel/irq/manage.c:1133
 irq_thread kernel/irq/manage.c:1257
 kthread kernel/kthread.c:463
 ret_from_fork arch/x86/kernel/process.c:154
 ret_from_fork_asm arch/x86/entry/entry_64.S:258

It is a consequence of a race between the waiting and the signaling side
of the completion:

            Waiting thread                            Completing thread

rtw89_core_tx_kick_off_and_wait()
  rcu_assign_pointer(skb_data-&gt;wait, wait)
  /* start waiting */
  wait_for_completion_timeout()
                                                rtw89_pci_tx_status()
                                                  rtw89_core_tx_wait_complete()
                                                    rcu_read_lock()
                                                    /* signals completion and
   
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40000/">CVE-2025-40000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40000">CVE-2025-40000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252062">SUSE bug 1252062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40001</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40001" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40001" ref_url="https://www.suse.com/security/cve/CVE-2025-40001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mvsas: Fix use-after-free bugs in mvs_work_queue

During the detaching of Marvell's SAS/SATA controller, the original code
calls cancel_delayed_work() in mvs_free() to cancel the delayed work
item mwq-&gt;work_q. However, if mwq-&gt;work_q is already running, the
cancel_delayed_work() may fail to cancel it. This can lead to
use-after-free scenarios where mvs_free() frees the mvs_info while
mvs_work_queue() is still executing and attempts to access the
already-freed mvs_info.

A typical race condition is illustrated below:

CPU 0 (remove)            | CPU 1 (delayed work callback)
mvs_pci_remove()          |
  mvs_free()              | mvs_work_queue()
    cancel_delayed_work() |
      kfree(mvi)          |
                          |   mvi-&gt; // UAF

Replace cancel_delayed_work() with cancel_delayed_work_sync() to ensure
that the delayed work item is properly canceled and any executing
delayed work item completes before the mvs_info is deallocated.

This bug was found by static analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40001/">CVE-2025-40001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40001">CVE-2025-40001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252303">SUSE bug 1252303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40003</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40003" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40003" ref_url="https://www.suse.com/security/cve/CVE-2025-40003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work

The origin code calls cancel_delayed_work() in ocelot_stats_deinit()
to cancel the cyclic delayed work item ocelot-&gt;stats_work. However,
cancel_delayed_work() may fail to cancel the work item if it is already
executing. While destroy_workqueue() does wait for all pending work items
in the work queue to complete before destroying the work queue, it cannot
prevent the delayed work item from being rescheduled within the
ocelot_check_stats_work() function. This limitation exists because the
delayed work item is only enqueued into the work queue after its timer
expires. Before the timer expiration, destroy_workqueue() has no visibility
of this pending work item. Once the work queue appears empty,
destroy_workqueue() proceeds with destruction. When the timer eventually
expires, the delayed work item gets queued again, leading to the following
warning:

workqueue: cannot queue ocelot_check_stats_work on wq ocelot-switch-stats
WARNING: CPU: 2 PID: 0 at kernel/workqueue.c:2255 __queue_work+0x875/0xaf0
...
RIP: 0010:__queue_work+0x875/0xaf0
...
RSP: 0018:ffff88806d108b10 EFLAGS: 00010086
RAX: 0000000000000000 RBX: 0000000000000101 RCX: 0000000000000027
RDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff88806d123e88
RBP: ffffffff813c3170 R08: 0000000000000000 R09: ffffed100da247d2
R10: ffffed100da247d1 R11: ffff88806d123e8b R12: ffff88800c00f000
R13: ffff88800d7285c0 R14: ffff88806d0a5580 R15: ffff88800d7285a0
FS:  0000000000000000(0000) GS:ffff8880e5725000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe18e45ea10 CR3: 0000000005e6c000 CR4: 00000000000006f0
Call Trace:
 &lt;IRQ&gt;
 ? kasan_report+0xc6/0xf0
 ? __pfx_delayed_work_timer_fn+0x10/0x10
 ? __pfx_delayed_work_timer_fn+0x10/0x10
 call_timer_fn+0x25/0x1c0
 __run_timer_base.part.0+0x3be/0x8c0
 ? __pfx_delayed_work_timer_fn+0x10/0x10
 ? rcu_sched_clock_irq+0xb06/0x27d0
 ? __pfx___run_timer_base.part.0+0x10/0x10
 ? try_to_wake_up+0xb15/0x1960
 ? _raw_spin_lock_irq+0x80/0xe0
 ? __pfx__raw_spin_lock_irq+0x10/0x10
 tmigr_handle_remote_up+0x603/0x7e0
 ? __pfx_tmigr_handle_remote_up+0x10/0x10
 ? sched_balance_trigger+0x1c0/0x9f0
 ? sched_tick+0x221/0x5a0
 ? _raw_spin_lock_irq+0x80/0xe0
 ? __pfx__raw_spin_lock_irq+0x10/0x10
 ? tick_nohz_handler+0x339/0x440
 ? __pfx_tmigr_handle_remote_up+0x10/0x10
 __walk_groups.isra.0+0x42/0x150
 tmigr_handle_remote+0x1f4/0x2e0
 ? __pfx_tmigr_handle_remote+0x10/0x10
 ? ktime_get+0x60/0x140
 ? lapic_next_event+0x11/0x20
 ? clockevents_program_event+0x1d4/0x2a0
 ? hrtimer_interrupt+0x322/0x780
 handle_softirqs+0x16a/0x550
 irq_exit_rcu+0xaf/0xe0
 sysvec_apic_timer_interrupt+0x70/0x80
 &lt;/IRQ&gt;
...

The following diagram reveals the cause of the above warning:

CPU 0 (remove)             | CPU 1 (delayed work callback)
mscc_ocelot_remove()       |
  ocelot_deinit()          | ocelot_check_stats_work()
    ocelot_stats_deinit()  |
      cancel_delayed_work()|   ...
                           |   queue_delayed_work()
      destroy_workqueue()  | (wait a time)
                           | __queue_work() //UAF

The above scenario actually constitutes a UAF vulnerability.

The ocelot_stats_deinit() is only invoked when initialization
failure or resource destruction, so we must ensure that any
delayed work items cannot be rescheduled.

Replace cancel_delayed_work() with disable_delayed_work_sync()
to guarantee proper cancellation of the delayed work item and
ensure completion of any currently executing work before the
workqueue is deallocated.

A deadlock concern was considered: ocelot_stats_deinit() is called
in a process context and is not holding any locks that the delayed
work item might also need. Therefore, the use of the _sync() variant
is safe here.

This bug was identified through static analysis. To reproduce the
issue and validate the fix, I simulated ocelot-swit
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40003/">CVE-2025-40003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40003">CVE-2025-40003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252301">SUSE bug 1252301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40005</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40005" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40005" ref_url="https://www.suse.com/security/cve/CVE-2025-40005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: cadence-quadspi: Implement refcount to handle unbind during busy

driver support indirect read and indirect write operation with
assumption no force device removal(unbind) operation. However
force device removal(removal) is still available to root superuser.

Unbinding driver during operation causes kernel crash. This changes
ensure driver able to handle such operation for indirect read and
indirect write by implementing refcount to track attached devices
to the controller and gracefully wait and until attached devices
remove operation completed before proceed with removal operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40005/">CVE-2025-40005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40005">CVE-2025-40005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252349">SUSE bug 1252349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40006</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40006" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40006" ref_url="https://www.suse.com/security/cve/CVE-2025-40006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: fix folio is still mapped when deleted

Migration may be raced with fallocating hole.  remove_inode_single_folio
will unmap the folio if the folio is still mapped.  However, it's called
without folio lock.  If the folio is migrated and the mapped pte has been
converted to migration entry, folio_mapped() returns false, and won't
unmap it.  Due to extra refcount held by remove_inode_single_folio,
migration fails, restores migration entry to normal pte, and the folio is
mapped again.  As a result, we triggered BUG in filemap_unaccount_folio.

The log is as follows:
 BUG: Bad page cache in process hugetlb  pfn:156c00
 page: refcount:515 mapcount:0 mapping:0000000099fef6e1 index:0x0 pfn:0x156c00
 head: order:9 mapcount:1 entire_mapcount:1 nr_pages_mapped:0 pincount:0
 aops:hugetlbfs_aops ino:dcc dentry name(?):"my_hugepage_file"
 flags: 0x17ffffc00000c1(locked|waiters|head|node=0|zone=2|lastcpupid=0x1fffff)
 page_type: f4(hugetlb)
 page dumped because: still mapped when deleted
 CPU: 1 UID: 0 PID: 395 Comm: hugetlb Not tainted 6.17.0-rc5-00044-g7aac71907bde-dirty #484 NONE
 Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x4f/0x70
  filemap_unaccount_folio+0xc4/0x1c0
  __filemap_remove_folio+0x38/0x1c0
  filemap_remove_folio+0x41/0xd0
  remove_inode_hugepages+0x142/0x250
  hugetlbfs_fallocate+0x471/0x5a0
  vfs_fallocate+0x149/0x380

Hold folio lock before checking if the folio is mapped to avold race with
migration.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40006/">CVE-2025-40006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40006">CVE-2025-40006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252342">SUSE bug 1252342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40009</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40009" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40009" ref_url="https://www.suse.com/security/cve/CVE-2025-40009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/proc/task_mmu: check p-&gt;vec_buf for NULL

When the PAGEMAP_SCAN ioctl is invoked with vec_len = 0 reaches
pagemap_scan_backout_range(), kernel panics with null-ptr-deref:

[   44.936808] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI
[   44.937797] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
[   44.938391] CPU: 1 UID: 0 PID: 2480 Comm: reproducer Not tainted 6.17.0-rc6 #22 PREEMPT(none)
[   44.939062] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[   44.939935] RIP: 0010:pagemap_scan_thp_entry.isra.0+0x741/0xa80

&lt;snip registers, unreliable trace&gt;

[   44.946828] Call Trace:
[   44.947030]  &lt;TASK&gt;
[   44.949219]  pagemap_scan_pmd_entry+0xec/0xfa0
[   44.952593]  walk_pmd_range.isra.0+0x302/0x910
[   44.954069]  walk_pud_range.isra.0+0x419/0x790
[   44.954427]  walk_p4d_range+0x41e/0x620
[   44.954743]  walk_pgd_range+0x31e/0x630
[   44.955057]  __walk_page_range+0x160/0x670
[   44.956883]  walk_page_range_mm+0x408/0x980
[   44.958677]  walk_page_range+0x66/0x90
[   44.958984]  do_pagemap_scan+0x28d/0x9c0
[   44.961833]  do_pagemap_cmd+0x59/0x80
[   44.962484]  __x64_sys_ioctl+0x18d/0x210
[   44.962804]  do_syscall_64+0x5b/0x290
[   44.963111]  entry_SYSCALL_64_after_hwframe+0x76/0x7e

vec_len = 0 in pagemap_scan_init_bounce_buffer() means no buffers are
allocated and p-&gt;vec_buf remains set to NULL.

This breaks an assumption made later in pagemap_scan_backout_range(), that
page_region is always allocated for p-&gt;vec_buf_index.

Fix it by explicitly checking p-&gt;vec_buf for NULL before dereferencing.

Other sites that might run into same deref-issue are already (directly or
transitively) protected by checking p-&gt;vec_buf.

Note:
From PAGEMAP_SCAN man page, it seems vec_len = 0 is valid when no output
is requested and it's only the side effects caller is interested in,
hence it passes check in pagemap_scan_get_args().

This issue was found by syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40009/">CVE-2025-40009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40009">CVE-2025-40009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252333">SUSE bug 1252333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40011</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40011" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40011" ref_url="https://www.suse.com/security/cve/CVE-2025-40011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/gma500: Fix null dereference in hdmi teardown

pci_set_drvdata sets the value of pdev-&gt;driver_data to NULL,
after which the driver_data obtained from the same dev is
dereferenced in oaktrail_hdmi_i2c_exit, and the i2c_dev is
extracted from it. To prevent this, swap these calls.

Found by Linux Verification Center (linuxtesting.org) with Svacer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40011/">CVE-2025-40011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40011">CVE-2025-40011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252336">SUSE bug 1252336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40012</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40012" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40012" ref_url="https://www.suse.com/security/cve/CVE-2025-40012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix warning in smc_rx_splice() when calling get_page()

smc_lo_register_dmb() allocates DMB buffers with kzalloc(), which are
later passed to get_page() in smc_rx_splice(). Since kmalloc memory is
not page-backed, this triggers WARN_ON_ONCE() in get_page() and prevents
holding a refcount on the buffer. This can lead to use-after-free if
the memory is released before splice_to_pipe() completes.

Use folio_alloc() instead, ensuring DMBs are page-backed and safe for
get_page().

WARNING: CPU: 18 PID: 12152 at ./include/linux/mm.h:1330 smc_rx_splice+0xaf8/0xe20 [smc]
CPU: 18 UID: 0 PID: 12152 Comm: smcapp Kdump: loaded Not tainted 6.17.0-rc3-11705-g9cf4672ecfee #10 NONE
Hardware name: IBM 3931 A01 704 (z/VM 7.4.0)
Krnl PSW : 0704e00180000000 000793161032696c (smc_rx_splice+0xafc/0xe20 [smc])
           R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3
Krnl GPRS: 0000000000000000 001cee80007d3001 00077400000000f8 0000000000000005
           0000000000000001 001cee80007d3006 0007740000001000 001c000000000000
           000000009b0c99e0 0000000000001000 001c0000000000f8 001c000000000000
           000003ffcc6f7c88 0007740003e98000 0007931600000005 000792969b2ff7b8
Krnl Code: 0007931610326960: af000000		mc	0,0
           0007931610326964: a7f4ff43		brc	15,00079316103267ea
          #0007931610326968: af000000		mc	0,0
          &gt;000793161032696c: a7f4ff3f		brc	15,00079316103267ea
           0007931610326970: e320f1000004	lg	%r2,256(%r15)
           0007931610326976: c0e53fd1b5f5	brasl	%r14,000793168fd5d560
           000793161032697c: a7f4fbb5		brc	15,00079316103260e6
           0007931610326980: b904002b		lgr	%r2,%r11
Call Trace:
 smc_rx_splice+0xafc/0xe20 [smc]
 smc_rx_splice+0x756/0xe20 [smc])
 smc_rx_recvmsg+0xa74/0xe00 [smc]
 smc_splice_read+0x1ce/0x3b0 [smc]
 sock_splice_read+0xa2/0xf0
 do_splice_read+0x198/0x240
 splice_file_to_pipe+0x7e/0x110
 do_splice+0x59e/0xde0
 __do_splice+0x11a/0x2d0
 __s390x_sys_splice+0x140/0x1f0
 __do_syscall+0x122/0x280
 system_call+0x6e/0x90
Last Breaking-Event-Address:
smc_rx_splice+0x960/0xe20 [smc]
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40012/">CVE-2025-40012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40012">CVE-2025-40012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252330">SUSE bug 1252330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40013</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40013" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40013" ref_url="https://www.suse.com/security/cve/CVE-2025-40013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: qcom: audioreach: fix potential null pointer dereference

It is possible that the topology parsing function
audioreach_widget_load_module_common() could return NULL or an error
pointer. Add missing NULL check so that we do not dereference it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40013/">CVE-2025-40013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40013">CVE-2025-40013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252348">SUSE bug 1252348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40016</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40016" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40016" ref_url="https://www.suse.com/security/cve/CVE-2025-40016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID

Per UVC 1.1+ specification 3.7.2, units and terminals must have a non-zero
unique ID.

```
Each Unit and Terminal within the video function is assigned a unique
identification number, the Unit ID (UID) or Terminal ID (TID), contained in
the bUnitID or bTerminalID field of the descriptor. The value 0x00 is
reserved for undefined ID,
```

If we add a new entity with id 0 or a duplicated ID, it will be marked
as UVC_INVALID_ENTITY_ID.

In a previous attempt commit 3dd075fe8ebb ("media: uvcvideo: Require
entities to have a non-zero unique ID"), we ignored all the invalid units,
this broke a lot of non-compatible cameras. Hopefully we are more lucky
this time.

This also prevents some syzkaller reproducers from triggering warnings due
to a chain of entities referring to themselves. In one particular case, an
Output Unit is connected to an Input Unit, both with the same ID of 1. But
when looking up for the source ID of the Output Unit, that same entity is
found instead of the input entity, which leads to such warnings.

In another case, a backward chain was considered finished as the source ID
was 0. Later on, that entity was found, but its pads were not valid.

Here is a sample stack trace for one of those cases.

[   20.650953] usb 1-1: new high-speed USB device number 2 using dummy_hcd
[   20.830206] usb 1-1: Using ep0 maxpacket: 8
[   20.833501] usb 1-1: config 0 descriptor??
[   21.038518] usb 1-1: string descriptor 0 read error: -71
[   21.038893] usb 1-1: Found UVC 0.00 device &lt;unnamed&gt; (2833:0201)
[   21.039299] uvcvideo 1-1:0.0: Entity type for entity Output 1 was not initialized!
[   21.041583] uvcvideo 1-1:0.0: Entity type for entity Input 1 was not initialized!
[   21.042218] ------------[ cut here ]------------
[   21.042536] WARNING: CPU: 0 PID: 9 at drivers/media/mc/mc-entity.c:1147 media_create_pad_link+0x2c4/0x2e0
[   21.043195] Modules linked in:
[   21.043535] CPU: 0 UID: 0 PID: 9 Comm: kworker/0:1 Not tainted 6.11.0-rc7-00030-g3480e43aeccf #444
[   21.044101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
[   21.044639] Workqueue: usb_hub_wq hub_event
[   21.045100] RIP: 0010:media_create_pad_link+0x2c4/0x2e0
[   21.045508] Code: fe e8 20 01 00 00 b8 f4 ff ff ff 48 83 c4 30 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 0f 0b eb e9 0f 0b eb 0a 0f 0b eb 06 &lt;0f&gt; 0b eb 02 0f 0b b8 ea ff ff ff eb d4 66 2e 0f 1f 84 00 00 00 00
[   21.046801] RSP: 0018:ffffc9000004b318 EFLAGS: 00010246
[   21.047227] RAX: ffff888004e5d458 RBX: 0000000000000000 RCX: ffffffff818fccf1
[   21.047719] RDX: 000000000000007b RSI: 0000000000000000 RDI: ffff888004313290
[   21.048241] RBP: ffff888004313290 R08: 0001ffffffffffff R09: 0000000000000000
[   21.048701] R10: 0000000000000013 R11: 0001888004313290 R12: 0000000000000003
[   21.049138] R13: ffff888004313080 R14: ffff888004313080 R15: 0000000000000000
[   21.049648] FS:  0000000000000000(0000) GS:ffff88803ec00000(0000) knlGS:0000000000000000
[   21.050271] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   21.050688] CR2: 0000592cc27635b0 CR3: 000000000431c000 CR4: 0000000000750ef0
[   21.051136] PKRU: 55555554
[   21.051331] Call Trace:
[   21.051480]  &lt;TASK&gt;
[   21.051611]  ? __warn+0xc4/0x210
[   21.051861]  ? media_create_pad_link+0x2c4/0x2e0
[   21.052252]  ? report_bug+0x11b/0x1a0
[   21.052540]  ? trace_hardirqs_on+0x31/0x40
[   21.052901]  ? handle_bug+0x3d/0x70
[   21.053197]  ? exc_invalid_op+0x1a/0x50
[   21.053511]  ? asm_exc_invalid_op+0x1a/0x20
[   21.053924]  ? media_create_pad_link+0x91/0x2e0
[   21.054364]  ? media_create_pad_link+0x2c4/0x2e0
[   21.054834]  ? media_create_pad_link+0x91/0x2e0
[   21.055131]  ? _raw_spin_unlock+0x1e/0x40
[   21.055441]  ? __v4l2_device_register_subdev+0x202/0x210
[   21.055837]  uvc_mc_register_entities+0x358/0x400
[   21.056144]  uvc_register_chains+0x1
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40016/">CVE-2025-40016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40016">CVE-2025-40016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252346">SUSE bug 1252346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40018</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40018" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40018" ref_url="https://www.suse.com/security/cve/CVE-2025-40018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1263-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1285-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1287-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipvs: Defer ip_vs_ftp unregister during netns cleanup

On the netns cleanup path, __ip_vs_ftp_exit() may unregister ip_vs_ftp
before connections with valid cp-&gt;app pointers are flushed, leading to a
use-after-free.

Fix this by introducing a global `exiting_module` flag, set to true in
ip_vs_ftp_exit() before unregistering the pernet subsystem. In
__ip_vs_ftp_exit(), skip ip_vs_ftp unregister if called during netns
cleanup (when exiting_module is false) and defer it to
__ip_vs_cleanup_batch(), which unregisters all apps after all connections
are flushed. If called during module exit, unregister ip_vs_ftp
immediately.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40018/">CVE-2025-40018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40018">CVE-2025-40018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252688">SUSE bug 1252688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252689">SUSE bug 1252689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253291">SUSE bug 1253291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056309" comment="kernel-livepatch-6_12_0-160000_5-rt-7-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056310" comment="kernel-livepatch-6_12_0-160000_6-rt-6-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40019</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40019" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40019" ref_url="https://www.suse.com/security/cve/CVE-2025-40019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: essiv - Check ssize for decryption and in-place encryption

Move the ssize check to the start in essiv_aead_crypt so that
it's also checked for decryption and in-place encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40019/">CVE-2025-40019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40019">CVE-2025-40019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252678">SUSE bug 1252678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252719">SUSE bug 1252719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40020</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40020" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40020" ref_url="https://www.suse.com/security/cve/CVE-2025-40020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: peak_usb: fix shift-out-of-bounds issue

Explicitly uses a 64-bit constant when the number of bits used for its
shifting is 32 (which is the case for PC CAN FD interfaces supported by
this driver).

[mkl: update subject, apply manually]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40020/">CVE-2025-40020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40020">CVE-2025-40020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252679">SUSE bug 1252679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40021</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40021" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40021" ref_url="https://www.suse.com/security/cve/CVE-2025-40021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: dynevent: Add a missing lockdown check on dynevent

Since dynamic_events interface on tracefs is compatible with
kprobe_events and uprobe_events, it should also check the lockdown
status and reject if it is set.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40021/">CVE-2025-40021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40021">CVE-2025-40021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252681">SUSE bug 1252681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40024</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40024" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40024" ref_url="https://www.suse.com/security/cve/CVE-2025-40024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost: Take a reference on the task in struct vhost_task.

vhost_task_create() creates a task and keeps a reference to its
task_struct. That task may exit early via a signal and its task_struct
will be released.
A pending vhost_task_wake() will then attempt to wake the task and
access a task_struct which is no longer there.

Acquire a reference on the task_struct while creating the thread and
release the reference while the struct vhost_task itself is removed.
If the task exits early due to a signal, then the vhost_task_wake() will
still access a valid task_struct. The wake is safe and will be skipped
in this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40024/">CVE-2025-40024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40024">CVE-2025-40024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252686">SUSE bug 1252686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40027</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40027" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40027" ref_url="https://www.suse.com/security/cve/CVE-2025-40027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/9p: fix double req put in p9_fd_cancelled

Syzkaller reports a KASAN issue as below:

general protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]
CPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:__list_del include/linux/list.h:114 [inline]
RIP: 0010:__list_del_entry include/linux/list.h:137 [inline]
RIP: 0010:list_del include/linux/list.h:148 [inline]
RIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734

Call Trace:
 &lt;TASK&gt;
 p9_client_flush+0x351/0x440 net/9p/client.c:614
 p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734
 p9_client_version net/9p/client.c:920 [inline]
 p9_client_create+0xb51/0x1240 net/9p/client.c:1027
 v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408
 v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126
 legacy_get_tree+0x108/0x220 fs/fs_context.c:632
 vfs_get_tree+0x8e/0x300 fs/super.c:1573
 do_new_mount fs/namespace.c:3056 [inline]
 path_mount+0x6a6/0x1e90 fs/namespace.c:3386
 do_mount fs/namespace.c:3399 [inline]
 __do_sys_mount fs/namespace.c:3607 [inline]
 __se_sys_mount fs/namespace.c:3584 [inline]
 __x64_sys_mount+0x283/0x300 fs/namespace.c:3584
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x6e/0xd8

This happens because of a race condition between:

- The 9p client sending an invalid flush request and later cleaning it up;
- The 9p client in p9_read_work() canceled all pending requests.

      Thread 1                              Thread 2
    ...
    p9_client_create()
    ...
    p9_fd_create()
    ...
    p9_conn_create()
    ...
    // start Thread 2
    INIT_WORK(&amp;m-&gt;rq, p9_read_work);
                                        p9_read_work()
    ...
    p9_client_rpc()
    ...
                                        ...
                                        p9_conn_cancel()
                                        ...
                                        spin_lock(&amp;m-&gt;req_lock);
    ...
    p9_fd_cancelled()
    ...
                                        ...
                                        spin_unlock(&amp;m-&gt;req_lock);
                                        // status rewrite
                                        p9_client_cb(m-&gt;client, req, REQ_STATUS_ERROR)
                                        // first remove
                                        list_del(&amp;req-&gt;req_list);
                                        ...

    spin_lock(&amp;m-&gt;req_lock)
    ...
    // second remove
    list_del(&amp;req-&gt;req_list);
    spin_unlock(&amp;m-&gt;req_lock)
  ...

Commit 74d6a5d56629 ("9p/trans_fd: Fix concurrency del of req_list in
p9_fd_cancelled/p9_read_work") fixes a concurrency issue in the 9p filesystem
client where the req_list could be deleted simultaneously by both
p9_read_work and p9_fd_cancelled functions, but for the case where req-&gt;status
equals REQ_STATUS_RCVD.

Update the check for req-&gt;status in p9_fd_cancelled to skip processing not
just received requests, but anything that is not SENT, as whatever
changed the state from SENT also removed the request from its list.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

[updated the check from status == RECV || status == ERROR to status != SENT]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40027/">CVE-2025-40027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40027">CVE-2025-40027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252763">SUSE bug 1252763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40029</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40029" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40029" ref_url="https://www.suse.com/security/cve/CVE-2025-40029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: fsl-mc: Check return value of platform_get_resource()

platform_get_resource() returns NULL in case of failure, so check its
return value and propagate the error in order to prevent NULL pointer
dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40029/">CVE-2025-40029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40029">CVE-2025-40029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252772">SUSE bug 1252772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40030</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40030" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40030" ref_url="https://www.suse.com/security/cve/CVE-2025-40030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: check the return value of pinmux_ops::get_function_name()

While the API contract in docs doesn't specify it explicitly, the
generic implementation of the get_function_name() callback from struct
pinmux_ops - pinmux_generic_get_function_name() - can fail and return
NULL. This is already checked in pinmux_check_ops() so add a similar
check in pinmux_func_name_to_selector() instead of passing the returned
pointer right down to strcmp() where the NULL can get dereferenced. This
is normal operation when adding new pinfunctions.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40030/">CVE-2025-40030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40030">CVE-2025-40030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252773">SUSE bug 1252773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40031</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40031" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40031" ref_url="https://www.suse.com/security/cve/CVE-2025-40031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tee: fix register_shm_helper()

In register_shm_helper(), fix incorrect error handling for a call to
iov_iter_extract_pages(). A case is missing for when
iov_iter_extract_pages() only got some pages and return a number larger
than 0, but not the requested amount.

This fixes a possible NULL pointer dereference following a bad input from
ioctl(TEE_IOC_SHM_REGISTER) where parts of the buffer isn't mapped.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40031/">CVE-2025-40031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40031">CVE-2025-40031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252779">SUSE bug 1252779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40032</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40032" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40032" ref_url="https://www.suse.com/security/cve/CVE-2025-40032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release

The fields dma_chan_tx and dma_chan_rx of the struct pci_epf_test can be
NULL even after EPF initialization. Then it is prudent to check that
they have non-NULL values before releasing the channels. Add the checks
in pci_epf_test_clean_dma_chan().

Without the checks, NULL pointer dereferences happen and they can lead
to a kernel panic in some cases:

  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050
  Call trace:
   dma_release_channel+0x2c/0x120 (P)
   pci_epf_test_epc_deinit+0x94/0xc0 [pci_epf_test]
   pci_epc_deinit_notify+0x74/0xc0
   tegra_pcie_ep_pex_rst_irq+0x250/0x5d8
   irq_thread_fn+0x34/0xb8
   irq_thread+0x18c/0x2e8
   kthread+0x14c/0x210
   ret_from_fork+0x10/0x20

[mani: trimmed the stack trace]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40032/">CVE-2025-40032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40032">CVE-2025-40032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252841">SUSE bug 1252841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40033</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40033" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40033" ref_url="https://www.suse.com/security/cve/CVE-2025-40033" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()

pru_rproc_set_ctable() accessed rproc-&gt;priv before the IS_ERR_OR_NULL
check, which could lead to a null pointer dereference. Move the pru
assignment, ensuring we never dereference a NULL rproc pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40033/">CVE-2025-40033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40033">CVE-2025-40033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252824">SUSE bug 1252824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40035</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40035" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40035" ref_url="https://www.suse.com/security/cve/CVE-2025-40035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak

Struct ff_effect_compat is embedded twice inside
uinput_ff_upload_compat, contains internal padding. In particular, there
is a hole after struct ff_replay to satisfy alignment requirements for
the following union member. Without clearing the structure,
copy_to_user() may leak stack data to userspace.

Initialize ff_up_compat to zero before filling valid fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40035/">CVE-2025-40035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40035">CVE-2025-40035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252866">SUSE bug 1252866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40036</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40036" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40036" ref_url="https://www.suse.com/security/cve/CVE-2025-40036" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: fastrpc: fix possible map leak in fastrpc_put_args

copy_to_user() failure would cause an early return without cleaning up
the fdlist, which has been updated by the DSP. This could lead to map
leak. Fix this by redirecting to a cleanup path on failure, ensuring
that all mapped buffers are properly released before returning.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40036/">CVE-2025-40036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40036">CVE-2025-40036 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252865">SUSE bug 1252865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40037</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40037" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40037" ref_url="https://www.suse.com/security/cve/CVE-2025-40037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: simplefb: Fix use after free in simplefb_detach_genpds()

The pm_domain cleanup can not be devres managed as it uses struct
simplefb_par which is allocated within struct fb_info by
framebuffer_alloc(). This allocation is explicitly freed by
unregister_framebuffer() in simplefb_remove().
Devres managed cleanup runs after the device remove call and thus can no
longer access struct simplefb_par.
Call simplefb_detach_genpds() explicitly from simplefb_destroy() like
the cleanup functions for clocks and regulators.

Fixes an use after free on M2 Mac mini during
aperture_remove_conflicting_devices() using the downstream asahi kernel
with Debian's kernel config. For unknown reasons this started to
consistently dereference an invalid pointer in v6.16.3 based kernels.

[    6.736134] BUG: KASAN: slab-use-after-free in simplefb_detach_genpds+0x58/0x220
[    6.743545] Read of size 4 at addr ffff8000304743f0 by task (udev-worker)/227
[    6.750697]
[    6.752182] CPU: 6 UID: 0 PID: 227 Comm: (udev-worker) Tainted: G S                  6.16.3-asahi+ #16 PREEMPTLAZY
[    6.752186] Tainted: [S]=CPU_OUT_OF_SPEC
[    6.752187] Hardware name: Apple Mac mini (M2, 2023) (DT)
[    6.752189] Call trace:
[    6.752190]  show_stack+0x34/0x98 (C)
[    6.752194]  dump_stack_lvl+0x60/0x80
[    6.752197]  print_report+0x17c/0x4d8
[    6.752201]  kasan_report+0xb4/0x100
[    6.752206]  __asan_report_load4_noabort+0x20/0x30
[    6.752209]  simplefb_detach_genpds+0x58/0x220
[    6.752213]  devm_action_release+0x50/0x98
[    6.752216]  release_nodes+0xd0/0x2c8
[    6.752219]  devres_release_all+0xfc/0x178
[    6.752221]  device_unbind_cleanup+0x28/0x168
[    6.752224]  device_release_driver_internal+0x34c/0x470
[    6.752228]  device_release_driver+0x20/0x38
[    6.752231]  bus_remove_device+0x1b0/0x380
[    6.752234]  device_del+0x314/0x820
[    6.752238]  platform_device_del+0x3c/0x1e8
[    6.752242]  platform_device_unregister+0x20/0x50
[    6.752246]  aperture_detach_platform_device+0x1c/0x30
[    6.752250]  aperture_detach_devices+0x16c/0x290
[    6.752253]  aperture_remove_conflicting_devices+0x34/0x50
...
[    6.752343]
[    6.967409] Allocated by task 62:
[    6.970724]  kasan_save_stack+0x3c/0x70
[    6.974560]  kasan_save_track+0x20/0x40
[    6.978397]  kasan_save_alloc_info+0x40/0x58
[    6.982670]  __kasan_kmalloc+0xd4/0xd8
[    6.986420]  __kmalloc_noprof+0x194/0x540
[    6.990432]  framebuffer_alloc+0xc8/0x130
[    6.994444]  simplefb_probe+0x258/0x2378
...
[    7.054356]
[    7.055838] Freed by task 227:
[    7.058891]  kasan_save_stack+0x3c/0x70
[    7.062727]  kasan_save_track+0x20/0x40
[    7.066565]  kasan_save_free_info+0x4c/0x80
[    7.070751]  __kasan_slab_free+0x6c/0xa0
[    7.074675]  kfree+0x10c/0x380
[    7.077727]  framebuffer_release+0x5c/0x90
[    7.081826]  simplefb_destroy+0x1b4/0x2c0
[    7.085837]  put_fb_info+0x98/0x100
[    7.089326]  unregister_framebuffer+0x178/0x320
[    7.093861]  simplefb_remove+0x3c/0x60
[    7.097611]  platform_remove+0x60/0x98
[    7.101361]  device_remove+0xb8/0x160
[    7.105024]  device_release_driver_internal+0x2fc/0x470
[    7.110256]  device_release_driver+0x20/0x38
[    7.114529]  bus_remove_device+0x1b0/0x380
[    7.118628]  device_del+0x314/0x820
[    7.122116]  platform_device_del+0x3c/0x1e8
[    7.126302]  platform_device_unregister+0x20/0x50
[    7.131012]  aperture_detach_platform_device+0x1c/0x30
[    7.136157]  aperture_detach_devices+0x16c/0x290
[    7.140779]  aperture_remove_conflicting_devices+0x34/0x50
...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40037/">CVE-2025-40037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40037">CVE-2025-40037 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252819">SUSE bug 1252819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40038</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40038" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40038" ref_url="https://www.suse.com/security/cve/CVE-2025-40038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid

Skip the WRMSR and HLT fastpaths in SVM's VM-Exit handler if the next RIP
isn't valid, e.g. because KVM is running with nrips=false.  SVM must
decode and emulate to skip the instruction if the CPU doesn't provide the
next RIP, and getting the instruction bytes to decode requires reading
guest memory.  Reading guest memory through the emulator can fault, i.e.
can sleep, which is disallowed since the fastpath handlers run with IRQs
disabled.

 BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106
 in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu
 preempt_count: 1, expected: 0
 INFO: lockdep is turned off.
 irq event stamp: 30580
 hardirqs last  enabled at (30579): [&lt;ffffffffc08b2527&gt;] vcpu_run+0x1787/0x1db0 [kvm]
 hardirqs last disabled at (30580): [&lt;ffffffffb4f62e32&gt;] __schedule+0x1e2/0xed0
 softirqs last  enabled at (30570): [&lt;ffffffffb4247a64&gt;] fpu_swap_kvm_fpstate+0x44/0x210
 softirqs last disabled at (30568): [&lt;ffffffffb4247a64&gt;] fpu_swap_kvm_fpstate+0x44/0x210
 CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G     U              6.16.0-smp--e6c618b51cfe-sleep #782 NONE
 Tainted: [U]=USER
 Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x7d/0xb0
  __might_resched+0x271/0x290
  __might_fault+0x28/0x80
  kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]
  kvm_fetch_guest_virt+0x92/0xc0 [kvm]
  __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]
  x86_decode_insn+0xd1/0x1010 [kvm]
  x86_emulate_instruction+0x105/0x810 [kvm]
  __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]
  handle_fastpath_invd+0xc4/0x1a0 [kvm]
  vcpu_run+0x11a1/0x1db0 [kvm]
  kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]
  kvm_vcpu_ioctl+0x578/0x6a0 [kvm]
  __se_sys_ioctl+0x6d/0xb0
  do_syscall_64+0x8a/0x2c0
  entry_SYSCALL_64_after_hwframe+0x4b/0x53
 RIP: 0033:0x7f479d57a94b
  &lt;/TASK&gt;

Note, this is essentially a reapply of commit 5c30e8101e8d ("KVM: SVM:
Skip WRMSR fastpath on VM-Exit if next RIP isn't valid"), but with
different justification (KVM now grabs SRCU when skipping the instruction
for other reasons).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40038/">CVE-2025-40038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40038">CVE-2025-40038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252817">SUSE bug 1252817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40040</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40040" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40040" ref_url="https://www.suse.com/security/cve/CVE-2025-40040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/ksm: fix flag-dropping behavior in ksm_madvise

syzkaller discovered the following crash: (kernel BUG)

[   44.607039] ------------[ cut here ]------------
[   44.607422] kernel BUG at mm/userfaultfd.c:2067!
[   44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI
[   44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)
[   44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[   44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460

&lt;snip other registers, drop unreliable trace&gt;

[   44.617726] Call Trace:
[   44.617926]  &lt;TASK&gt;
[   44.619284]  userfaultfd_release+0xef/0x1b0
[   44.620976]  __fput+0x3f9/0xb60
[   44.621240]  fput_close_sync+0x110/0x210
[   44.622222]  __x64_sys_close+0x8f/0x120
[   44.622530]  do_syscall_64+0x5b/0x2f0
[   44.622840]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[   44.623244] RIP: 0033:0x7f365bb3f227

Kernel panics because it detects UFFD inconsistency during
userfaultfd_release_all().  Specifically, a VMA which has a valid pointer
to vma-&gt;vm_userfaultfd_ctx, but no UFFD flags in vma-&gt;vm_flags.

The inconsistency is caused in ksm_madvise(): when user calls madvise()
with MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,
it accidentally clears all flags stored in the upper 32 bits of
vma-&gt;vm_flags.

Assuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and
int are 32-bit wide.  This setup causes the following mishap during the &amp;=
~VM_MERGEABLE assignment.

VM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000'0000. 
After ~ is applied, it becomes 0x7fff'ffff unsigned int, which is then
promoted to unsigned long before the &amp; operation.  This promotion fills
upper 32 bits with leading 0s, as we're doing unsigned conversion (and
even for a signed conversion, this wouldn't help as the leading bit is 0).
&amp; operation thus ends up AND-ing vm_flags with 0x0000'0000'7fff'ffff
instead of intended 0xffff'ffff'7fff'ffff and hence accidentally clears
the upper 32-bits of its value.

Fix it by changing `VM_MERGEABLE` constant to unsigned long, using the
BIT() macro.

Note: other VM_* flags are not affected: This only happens to the
VM_MERGEABLE flag, as the other VM_* flags are all constants of type int
and after ~ operation, they end up with leading 1 and are thus converted
to unsigned long with leading 1s.

Note 2:
After commit 31defc3b01d9 ("userfaultfd: remove (VM_)BUG_ON()s"), this is
no longer a kernel BUG, but a WARNING at the same place:

[   45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067

but the root-cause (flag-drop) remains the same.

[akpm@linux-foundation.org: rust bindgen wasn't able to handle BIT(), from Miguel]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40040/">CVE-2025-40040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40040">CVE-2025-40040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252780">SUSE bug 1252780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40042</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40042" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40042" ref_url="https://www.suse.com/security/cve/CVE-2025-40042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix race condition in kprobe initialization causing NULL pointer dereference

There is a critical race condition in kprobe initialization that can lead to
NULL pointer dereference and kernel crash.

[1135630.084782] Unable to handle kernel paging request at virtual address 0000710a04630000
...
[1135630.260314] pstate: 404003c9 (nZcv DAIF +PAN -UAO)
[1135630.269239] pc : kprobe_perf_func+0x30/0x260
[1135630.277643] lr : kprobe_dispatcher+0x44/0x60
[1135630.286041] sp : ffffaeff4977fa40
[1135630.293441] x29: ffffaeff4977fa40 x28: ffffaf015340e400
[1135630.302837] x27: 0000000000000000 x26: 0000000000000000
[1135630.312257] x25: ffffaf029ed108a8 x24: ffffaf015340e528
[1135630.321705] x23: ffffaeff4977fc50 x22: ffffaeff4977fc50
[1135630.331154] x21: 0000000000000000 x20: ffffaeff4977fc50
[1135630.340586] x19: ffffaf015340e400 x18: 0000000000000000
[1135630.349985] x17: 0000000000000000 x16: 0000000000000000
[1135630.359285] x15: 0000000000000000 x14: 0000000000000000
[1135630.368445] x13: 0000000000000000 x12: 0000000000000000
[1135630.377473] x11: 0000000000000000 x10: 0000000000000000
[1135630.386411] x9 : 0000000000000000 x8 : 0000000000000000
[1135630.395252] x7 : 0000000000000000 x6 : 0000000000000000
[1135630.403963] x5 : 0000000000000000 x4 : 0000000000000000
[1135630.412545] x3 : 0000710a04630000 x2 : 0000000000000006
[1135630.421021] x1 : ffffaeff4977fc50 x0 : 0000710a04630000
[1135630.429410] Call trace:
[1135630.434828]  kprobe_perf_func+0x30/0x260
[1135630.441661]  kprobe_dispatcher+0x44/0x60
[1135630.448396]  aggr_pre_handler+0x70/0xc8
[1135630.454959]  kprobe_breakpoint_handler+0x140/0x1e0
[1135630.462435]  brk_handler+0xbc/0xd8
[1135630.468437]  do_debug_exception+0x84/0x138
[1135630.475074]  el1_dbg+0x18/0x8c
[1135630.480582]  security_file_permission+0x0/0xd0
[1135630.487426]  vfs_write+0x70/0x1c0
[1135630.493059]  ksys_write+0x5c/0xc8
[1135630.498638]  __arm64_sys_write+0x24/0x30
[1135630.504821]  el0_svc_common+0x78/0x130
[1135630.510838]  el0_svc_handler+0x38/0x78
[1135630.516834]  el0_svc+0x8/0x1b0

kernel/trace/trace_kprobe.c: 1308
0xffff3df8995039ec &lt;kprobe_perf_func+0x2c&gt;:     ldr     x21, [x24,#120]
include/linux/compiler.h: 294
0xffff3df8995039f0 &lt;kprobe_perf_func+0x30&gt;:     ldr     x1, [x21,x0]

kernel/trace/trace_kprobe.c
1308: head = this_cpu_ptr(call-&gt;perf_events);
1309: if (hlist_empty(head))
1310: 	return 0;

crash&gt; struct trace_event_call -o
struct trace_event_call {
  ...
  [120] struct hlist_head *perf_events;  //(call-&gt;perf_event)
  ...
}

crash&gt; struct trace_event_call ffffaf015340e528
struct trace_event_call {
  ...
  perf_events = 0xffff0ad5fa89f088, //this value is correct, but x21 = 0
  ...
}

Race Condition Analysis:

The race occurs between kprobe activation and perf_events initialization:

  CPU0                                    CPU1
  ====                                    ====
  perf_kprobe_init
    perf_trace_event_init
      tp_event-&gt;perf_events = list;(1)
      tp_event-&gt;class-&gt;reg (2)&lt;- KPROBE ACTIVE
                                          Debug exception triggers
                                          ...
                                          kprobe_dispatcher
                                            kprobe_perf_func (tk-&gt;tp.flags &amp; TP_FLAG_PROFILE)
                                              head = this_cpu_ptr(call-&gt;perf_events)(3)
                                              (perf_events is still NULL)

Problem:
1. CPU0 executes (1) assigning tp_event-&gt;perf_events = list
2. CPU0 executes (2) enabling kprobe functionality via class-&gt;reg()
3. CPU1 triggers and reaches kprobe_dispatcher
4. CPU1 checks TP_FLAG_PROFILE - condition passes (step 2 completed)
5. CPU1 calls kprobe_perf_func() and crashes at (3) because
   call-&gt;perf_events is still NULL

CPU1 sees that kprobe functionality is enabled but does not see that
perf_events has been assigned.

Add pairing read an
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40042/">CVE-2025-40042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40042">CVE-2025-40042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252861">SUSE bug 1252861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40043</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40043" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40043" ref_url="https://www.suse.com/security/cve/CVE-2025-40043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: nfc: nci: Add parameter validation for packet data

Syzbot reported an uninitialized value bug in nci_init_req, which was
introduced by commit 5aca7966d2a7 ("Merge tag
'perf-tools-fixes-for-v6.17-2025-09-16' of
git://git.kernel.org/pub/scm/linux/kernel/git/perf/perf-tools").

This bug arises due to very limited and poor input validation
that was done at nic_valid_size(). This validation only
validates the skb-&gt;len (directly reflects size provided at the
userspace interface) with the length provided in the buffer
itself (interpreted as NCI_HEADER). This leads to the processing
of memory content at the address assuming the correct layout
per what opcode requires there. This leads to the accesses to
buffer of `skb_buff-&gt;data` which is not assigned anything yet.

Following the same silent drop of packets of invalid sizes at
`nic_valid_size()`, add validation of the data in the respective
handlers and return error values in case of failure. Release
the skb if error values are returned from handlers in
`nci_nft_packet` and effectively do a silent drop

Possible TODO: because we silently drop the packets, the
call to `nci_request` will be waiting for completion of request
and will face timeouts. These timeouts can get excessively logged
in the dmesg. A proper handling of them may require to export
`nci_request_cancel` (or propagate error handling from the
nft packets handlers).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40043/">CVE-2025-40043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40043">CVE-2025-40043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252787">SUSE bug 1252787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40044</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40044" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40044" ref_url="https://www.suse.com/security/cve/CVE-2025-40044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: udf: fix OOB read in lengthAllocDescs handling

When parsing Allocation Extent Descriptor, lengthAllocDescs comes from
on-disk data and must be validated against the block size. Crafted or
corrupted images may set lengthAllocDescs so that the total descriptor
length (sizeof(allocExtDesc) + lengthAllocDescs) exceeds the buffer,
leading udf_update_tag() to call crc_itu_t() on out-of-bounds memory and
trigger a KASAN use-after-free read.

BUG: KASAN: use-after-free in crc_itu_t+0x1d5/0x2b0 lib/crc-itu-t.c:60
Read of size 1 at addr ffff888041e7d000 by task syz-executor317/5309

CPU: 0 UID: 0 PID: 5309 Comm: syz-executor317 Not tainted 6.12.0-rc4-syzkaller-00261-g850925a8133c #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
 kasan_report+0x143/0x180 mm/kasan/report.c:601
 crc_itu_t+0x1d5/0x2b0 lib/crc-itu-t.c:60
 udf_update_tag+0x70/0x6a0 fs/udf/misc.c:261
 udf_write_aext+0x4d8/0x7b0 fs/udf/inode.c:2179
 extent_trunc+0x2f7/0x4a0 fs/udf/truncate.c:46
 udf_truncate_tail_extent+0x527/0x7e0 fs/udf/truncate.c:106
 udf_release_file+0xc1/0x120 fs/udf/file.c:185
 __fput+0x23f/0x880 fs/file_table.c:431
 task_work_run+0x24f/0x310 kernel/task_work.c:239
 exit_task_work include/linux/task_work.h:43 [inline]
 do_exit+0xa2f/0x28e0 kernel/exit.c:939
 do_group_exit+0x207/0x2c0 kernel/exit.c:1088
 __do_sys_exit_group kernel/exit.c:1099 [inline]
 __se_sys_exit_group kernel/exit.c:1097 [inline]
 __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1097
 x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
 &lt;/TASK&gt;

Validate the computed total length against epos-&gt;bh-&gt;b_size.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40044/">CVE-2025-40044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40044">CVE-2025-40044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252785">SUSE bug 1252785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40045</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40045" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40045" ref_url="https://www.suse.com/security/cve/CVE-2025-40045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: codecs: wcd937x: set the comp soundwire port correctly

For some reason we endup with setting soundwire port for
HPHL_COMP and HPHR_COMP as zero, this can potentially result
in a memory corruption due to accessing and setting -1 th element of
port_map array.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40045/">CVE-2025-40045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40045">CVE-2025-40045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252784">SUSE bug 1252784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40047</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40047" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40047" ref_url="https://www.suse.com/security/cve/CVE-2025-40047" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/waitid: always prune wait queue entry in io_waitid_wait()

For a successful return, always remove our entry from the wait queue
entry list. Previously this was skipped if a cancelation was in
progress, but this can race with another invocation of the wait queue
entry callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40047/">CVE-2025-40047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40047">CVE-2025-40047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252790">SUSE bug 1252790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40048</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40048" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40048" ref_url="https://www.suse.com/security/cve/CVE-2025-40048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uio_hv_generic: Let userspace take care of interrupt mask

Remove the logic to set interrupt mask by default in uio_hv_generic
driver as the interrupt mask value is supposed to be controlled
completely by the user space. If the mask bit gets changed
by the driver, concurrently with user mode operating on the ring,
the mask bit may be set when it is supposed to be clear, and the
user-mode driver will miss an interrupt which will cause a hang.

For eg- when the driver sets inbound ring buffer interrupt mask to 1,
the host does not interrupt the guest on the UIO VMBus channel.
However, setting the mask does not prevent the host from putting a
message in the inbound ring buffer.  So let's assume that happens,
the host puts a message into the ring buffer but does not interrupt.

Subsequently, the user space code in the guest sets the inbound ring
buffer interrupt mask to 0, saying “Hey, I'm ready for interrupts”.
User space code then calls pread() to wait for an interrupt.
Then one of two things happens:

* The host never sends another message. So the pread() waits forever.
* The host does send another message. But because there's already a
  message in the ring buffer, it doesn't generate an interrupt.
  This is the correct behavior, because the host should only send an
  interrupt when the inbound ring buffer transitions from empty to
  not-empty. Adding an additional message to a ring buffer that is not
  empty is not supposed to generate an interrupt on the guest.
  Since the guest is waiting in pread() and not removing messages from
  the ring buffer, the pread() waits forever.

This could be easily reproduced in hv_fcopy_uio_daemon if we delay
setting interrupt mask to 0.

Similarly if hv_uio_channel_cb() sets the interrupt_mask to 1,
there's a race condition. Once user space empties the inbound ring
buffer, but before user space sets interrupt_mask to 0, the host could
put another message in the ring buffer but it wouldn't interrupt.
Then the next pread() would hang.

Fix these by removing all instances where interrupt_mask is changed,
while keeping the one in set_event() unchanged to enable userspace
control the interrupt mask by writing 0/1 to /dev/uioX.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40048/">CVE-2025-40048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40048">CVE-2025-40048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252862">SUSE bug 1252862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40049</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40049" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40049" ref_url="https://www.suse.com/security/cve/CVE-2025-40049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Squashfs: fix uninit-value in squashfs_get_parent

Syzkaller reports a "KMSAN: uninit-value in squashfs_get_parent" bug.

This is caused by open_by_handle_at() being called with a file handle
containing an invalid parent inode number.  In particular the inode number
is that of a symbolic link, rather than a directory.

Squashfs_get_parent() gets called with that symbolic link inode, and
accesses the parent member field.

	unsigned int parent_ino = squashfs_i(inode)-&gt;parent;

Because non-directory inodes in Squashfs do not have a parent value, this
is uninitialised, and this causes an uninitialised value access.

The fix is to initialise parent with the invalid inode 0, which will cause
an EINVAL error to be returned.

Regular inodes used to share the parent field with the block_list_start
field.  This is removed in this commit to enable the parent field to
contain the invalid inode number 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40049/">CVE-2025-40049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40049">CVE-2025-40049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252822">SUSE bug 1252822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40051</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40051" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40051" ref_url="https://www.suse.com/security/cve/CVE-2025-40051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost: vringh: Modify the return value check

The return value of copy_from_iter and copy_to_iter can't be negative,
check whether the copied lengths are equal.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40051/">CVE-2025-40051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40051">CVE-2025-40051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252858">SUSE bug 1252858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40052</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40052" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40052" ref_url="https://www.suse.com/security/cve/CVE-2025-40052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix crypto buffers in non-linear memory

The crypto API, through the scatterlist API, expects input buffers to be
in linear memory.  We handle this with the cifs_sg_set_buf() helper
that converts vmalloc'd memory to their corresponding pages.

However, when we allocate our aead_request buffer (@creq in
smb2ops.c::crypt_message()), we do so with kvzalloc(), which possibly
puts aead_request-&gt;__ctx in vmalloc area.

AEAD algorithm then uses -&gt;__ctx for its private/internal data and
operations, and uses sg_set_buf() for such data on a few places.

This works fine as long as @creq falls into kmalloc zone (small
requests) or vmalloc'd memory is still within linear range.

Tasks' stacks are vmalloc'd by default (CONFIG_VMAP_STACK=y), so too
many tasks will increment the base stacks' addresses to a point where
virt_addr_valid(buf) will fail (BUG() in sg_set_buf()) when that
happens.

In practice: too many parallel reads and writes on an encrypted mount
will trigger this bug.

To fix this, always alloc @creq with kmalloc() instead.
Also drop the @sensitive_size variable/arguments since
kfree_sensitive() doesn't need it.

Backtrace:

[  945.272081] ------------[ cut here ]------------
[  945.272774] kernel BUG at include/linux/scatterlist.h:209!
[  945.273520] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC NOPTI
[  945.274412] CPU: 7 UID: 0 PID: 56 Comm: kworker/u33:0 Kdump: loaded Not tainted 6.15.0-lku-11779-g8e9d6efccdd7-dirty #1 PREEMPT(voluntary)
[  945.275736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-2-gc13ff2cd-prebuilt.qemu.org 04/01/2014
[  945.276877] Workqueue: writeback wb_workfn (flush-cifs-2)
[  945.277457] RIP: 0010:crypto_gcm_init_common+0x1f9/0x220
[  945.278018] Code: b0 00 00 00 48 83 c4 08 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 48 c7 c0 00 00 00 80 48 2b 05 5c 58 e5 00 e9 58 ff ff ff &lt;0f&gt; 0b 0f 0b 0f 0b 0f 0b 0f 0b 0f 0b 48 c7 04 24 01 00 00 00 48 8b
[  945.279992] RSP: 0018:ffffc90000a27360 EFLAGS: 00010246
[  945.280578] RAX: 0000000000000000 RBX: ffffc90001d85060 RCX: 0000000000000030
[  945.281376] RDX: 0000000000080000 RSI: 0000000000000000 RDI: ffffc90081d85070
[  945.282145] RBP: ffffc90001d85010 R08: ffffc90001d85000 R09: 0000000000000000
[  945.282898] R10: ffffc90001d85090 R11: 0000000000001000 R12: ffffc90001d85070
[  945.283656] R13: ffff888113522948 R14: ffffc90001d85060 R15: ffffc90001d85010
[  945.284407] FS:  0000000000000000(0000) GS:ffff8882e66cf000(0000) knlGS:0000000000000000
[  945.285262] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  945.285884] CR2: 00007fa7ffdd31f4 CR3: 000000010540d000 CR4: 0000000000350ef0
[  945.286683] Call Trace:
[  945.286952]  &lt;TASK&gt;
[  945.287184]  ? crypt_message+0x33f/0xad0 [cifs]
[  945.287719]  crypto_gcm_encrypt+0x36/0xe0
[  945.288152]  crypt_message+0x54a/0xad0 [cifs]
[  945.288724]  smb3_init_transform_rq+0x277/0x300 [cifs]
[  945.289300]  smb_send_rqst+0xa3/0x160 [cifs]
[  945.289944]  cifs_call_async+0x178/0x340 [cifs]
[  945.290514]  ? __pfx_smb2_writev_callback+0x10/0x10 [cifs]
[  945.291177]  smb2_async_writev+0x3e3/0x670 [cifs]
[  945.291759]  ? find_held_lock+0x32/0x90
[  945.292212]  ? netfs_advance_write+0xf2/0x310
[  945.292723]  netfs_advance_write+0xf2/0x310
[  945.293210]  netfs_write_folio+0x346/0xcc0
[  945.293689]  ? __pfx__raw_spin_unlock_irq+0x10/0x10
[  945.294250]  netfs_writepages+0x117/0x460
[  945.294724]  do_writepages+0xbe/0x170
[  945.295152]  ? find_held_lock+0x32/0x90
[  945.295600]  ? kvm_sched_clock_read+0x11/0x20
[  945.296103]  __writeback_single_inode+0x56/0x4b0
[  945.296643]  writeback_sb_inodes+0x229/0x550
[  945.297140]  __writeback_inodes_wb+0x4c/0xe0
[  945.297642]  wb_writeback+0x2f1/0x3f0
[  945.298069]  wb_workfn+0x300/0x490
[  945.298472]  process_one_work+0x1fe/0x590
[  945.298949]  worker_thread+0x1ce/0x3c0
[  945.299397]  ? __pfx_worker_thread+0x10/0x10
[  945.299900]  kthr
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40052/">CVE-2025-40052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40052">CVE-2025-40052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252851">SUSE bug 1252851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40053</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40053" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40053" ref_url="https://www.suse.com/security/cve/CVE-2025-40053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dlink: handle copy_thresh allocation failure

The driver did not handle failure of `netdev_alloc_skb_ip_align()`.
If the allocation failed, dereferencing `skb-&gt;protocol` could lead to
a NULL pointer dereference.

This patch tries to allocate `skb`. If the allocation fails, it falls
back to the normal path.

Tested-on: D-Link DGE-550T Rev-A3
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40053/">CVE-2025-40053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40053">CVE-2025-40053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252808">SUSE bug 1252808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40055</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40055" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40055" ref_url="https://www.suse.com/security/cve/CVE-2025-40055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix double free in user_cluster_connect()

user_cluster_disconnect() frees "conn-&gt;cc_private" which is "lc" but then
the error handling frees "lc" a second time.  Set "lc" to NULL on this
path to avoid a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40055/">CVE-2025-40055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40055">CVE-2025-40055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252821">SUSE bug 1252821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40056</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40056" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40056" ref_url="https://www.suse.com/security/cve/CVE-2025-40056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost: vringh: Fix copy_to_iter return value check

The return value of copy_to_iter can't be negative, check whether the
copied length is equal to the requested length instead of checking for
negative values.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40056/">CVE-2025-40056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40056">CVE-2025-40056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252826">SUSE bug 1252826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40058</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40058" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40058" ref_url="https://www.suse.com/security/cve/CVE-2025-40058" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Disallow dirty tracking if incoherent page walk

Dirty page tracking relies on the IOMMU atomically updating the dirty bit
in the paging-structure entry. For this operation to succeed, the paging-
structure memory must be coherent between the IOMMU and the CPU. In
another word, if the iommu page walk is incoherent, dirty page tracking
doesn't work.

The Intel VT-d specification, Section 3.10 "Snoop Behavior" states:

"Remapping hardware encountering the need to atomically update A/EA/D bits
 in a paging-structure entry that is not snooped will result in a non-
 recoverable fault."

To prevent an IOMMU from being incorrectly configured for dirty page
tracking when it is operating in an incoherent mode, mark SSADS as
supported only when both ecap_slads and ecap_smpwc are supported.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40058/">CVE-2025-40058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40058">CVE-2025-40058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252854">SUSE bug 1252854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40059</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40059" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40059" ref_url="https://www.suse.com/security/cve/CVE-2025-40059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

coresight: Fix incorrect handling for return value of devm_kzalloc

The return value of devm_kzalloc could be an null pointer,
use "!desc.pdata" to fix incorrect handling return value
of devm_kzalloc.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40059/">CVE-2025-40059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40059">CVE-2025-40059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252809">SUSE bug 1252809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40060</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40060" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40060" ref_url="https://www.suse.com/security/cve/CVE-2025-40060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

coresight: trbe: Return NULL pointer for allocation failures

When the TRBE driver fails to allocate a buffer, it currently returns
the error code "-ENOMEM". However, the caller etm_setup_aux() only
checks for a NULL pointer, so it misses the error. As a result, the
driver continues and eventually causes a kernel panic.

Fix this by returning a NULL pointer from arm_trbe_alloc_buffer() on
allocation failures. This allows that the callers can properly handle
the failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40060/">CVE-2025-40060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40060">CVE-2025-40060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252848">SUSE bug 1252848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40061</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40061" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40061" ref_url="https://www.suse.com/security/cve/CVE-2025-40061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix race in do_task() when draining

When do_task() exhausts its iteration budget (!ret), it sets the state
to TASK_STATE_IDLE to reschedule, without a secondary check on the
current task-&gt;state. This can overwrite the TASK_STATE_DRAINING state
set by a concurrent call to rxe_cleanup_task() or rxe_disable_task().

While state changes are protected by a spinlock, both rxe_cleanup_task()
and rxe_disable_task() release the lock while waiting for the task to
finish draining in the while(!is_done(task)) loop. The race occurs if
do_task() hits its iteration limit and acquires the lock in this window.
The cleanup logic may then proceed while the task incorrectly
reschedules itself, leading to a potential use-after-free.

This bug was introduced during the migration from tasklets to workqueues,
where the special handling for the draining case was lost.

Fix this by restoring the original pre-migration behavior. If the state is
TASK_STATE_DRAINING when iterations are exhausted, set cont to 1 to
force a new loop iteration. This allows the task to finish its work, so
that a subsequent iteration can reach the switch statement and correctly
transition the state to TASK_STATE_DRAINED, stopping the task as intended.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40061/">CVE-2025-40061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40061">CVE-2025-40061 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252849">SUSE bug 1252849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40062</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40062" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40062" ref_url="https://www.suse.com/security/cve/CVE-2025-40062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: hisilicon/qm - set NULL to qm-&gt;debug.qm_diff_regs

When the initialization of qm-&gt;debug.acc_diff_reg fails,
the probe process does not exit. However, after qm-&gt;debug.qm_diff_regs is
freed, it is not set to NULL. This can lead to a double free when the
remove process attempts to free it again. Therefore, qm-&gt;debug.qm_diff_regs
should be set to NULL after it is freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40062/">CVE-2025-40062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40062">CVE-2025-40062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252850">SUSE bug 1252850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40064</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40064" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40064" ref_url="https://www.suse.com/security/cve/CVE-2025-40064" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3083" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smc: Fix use-after-free in __pnet_find_base_ndev().

syzbot reported use-after-free of net_device in __pnet_find_base_ndev(),
which was called during connect(). [0]

smc_pnet_find_ism_resource() fetches sk_dst_get(sk)-&gt;dev and passes
down to pnet_find_base_ndev(), where RTNL is held.  Then, UAF happened
at __pnet_find_base_ndev() when the dev is first used.

This means dev had already been freed before acquiring RTNL in
pnet_find_base_ndev().

While dev is going away, dst-&gt;dev could be swapped with blackhole_netdev,
and the dev's refcnt by dst will be released.

We must hold dev's refcnt before calling smc_pnet_find_ism_resource().

Also, smc_pnet_find_roce_resource() has the same problem.

Let's use __sk_dst_get() and dst_dev_rcu() in the two functions.

[0]:
BUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926
Read of size 1 at addr ffff888036bac33a by task syz.0.3632/18609

CPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xca/0x240 mm/kasan/report.c:482
 kasan_report+0x118/0x150 mm/kasan/report.c:595
 __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926
 pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]
 smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]
 smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154
 smc_find_ism_device net/smc/af_smc.c:1030 [inline]
 smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]
 __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545
 smc_connect+0x877/0xd90 net/smc/af_smc.c:1715
 __sys_connect_file net/socket.c:2086 [inline]
 __sys_connect+0x313/0x440 net/socket.c:2105
 __do_sys_connect net/socket.c:2111 [inline]
 __se_sys_connect net/socket.c:2108 [inline]
 __x64_sys_connect+0x7a/0x90 net/socket.c:2108
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f47cbf8eba9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
RAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9
RDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b
RBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8
 &lt;/TASK&gt;

The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000
raw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466
 set_page_owner include/linux/page_owner.h:32 [inline]
 post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851
 prep_new_page mm/page_alloc.c:1859 [inline]
 get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858
 __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148
 alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416
 ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317
 __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348
 __do_kmalloc_node mm/slub.c:4364 [inline]
 __kvmalloc_node
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40064/">CVE-2025-40064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40064">CVE-2025-40064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252845">SUSE bug 1252845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40070</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40070" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40070" ref_url="https://www.suse.com/security/cve/CVE-2025-40070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pps: fix warning in pps_register_cdev when register device fail

Similar to previous commit 2a934fdb01db ("media: v4l2-dev: fix error
handling in __video_register_device()"), the release hook should be set
before device_register(). Otherwise, when device_register() return error
and put_device() try to callback the release function, the below warning
may happen.

  ------------[ cut here ]------------
  WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567
  Modules linked in:
  CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE
  RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567
  Call Trace:
   &lt;TASK&gt;
   kobject_cleanup+0x136/0x410 lib/kobject.c:689
   kobject_release lib/kobject.c:720 [inline]
   kref_put include/linux/kref.h:65 [inline]
   kobject_put+0xe9/0x130 lib/kobject.c:737
   put_device+0x24/0x30 drivers/base/core.c:3797
   pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402
   pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108
   pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57
   tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432
   tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563
   tiocsetd drivers/tty/tty_io.c:2429 [inline]
   tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:598 [inline]
   __se_sys_ioctl fs/ioctl.c:584 [inline]
   __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
   &lt;/TASK&gt;

Before commit c79a39dc8d06 ("pps: Fix a use-after-free"),
pps_register_cdev() call device_create() to create pps-&gt;dev, which will
init dev-&gt;release to device_create_release(). Now the comment is outdated,
just remove it.

Thanks for the reminder from Calvin Owens, 'kfree_pps' should be removed
in pps_register_source() to avoid a double free in the failure case.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40070/">CVE-2025-40070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40070">CVE-2025-40070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252836">SUSE bug 1252836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40071</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40071" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40071" ref_url="https://www.suse.com/security/cve/CVE-2025-40071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: Don't block input queue by waiting MSC

Currently gsm_queue() processes incoming frames and when opening
a DLC channel it calls gsm_dlci_open() which calls gsm_modem_update().
If basic mode is used it calls gsm_modem_upd_via_msc() and it
cannot block the input queue by waiting the response to come
into the same input queue.

Instead allow sending Modem Status Command without waiting for remote
end to respond. Define a new function gsm_modem_send_initial_msc()
for this purpose. As MSC is only valid for basic encoding, it does
not do anything for advanced or when convergence layer type 2 is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40071/">CVE-2025-40071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40071">CVE-2025-40071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252797">SUSE bug 1252797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40074</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40074" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40074" ref_url="https://www.suse.com/security/cve/CVE-2025-40074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: start using dst_dev_rcu()

Change icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.

Change ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),
ipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40074/">CVE-2025-40074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40074">CVE-2025-40074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252794">SUSE bug 1252794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40075</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40075" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40075" ref_url="https://www.suse.com/security/cve/CVE-2025-40075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp_metrics: use dst_dev_net_rcu()

Replace three dst_dev() with a lockdep enabled helper.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40075/">CVE-2025-40075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40075">CVE-2025-40075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252795">SUSE bug 1252795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40078</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40078" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40078" ref_url="https://www.suse.com/security/cve/CVE-2025-40078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Explicitly check accesses to bpf_sock_addr

Syzkaller found a kernel warning on the following sock_addr program:

    0: r0 = 0
    1: r2 = *(u32 *)(r1 +60)
    2: exit

which triggers:

    verifier bug: error during ctx access conversion (0)

This is happening because offset 60 in bpf_sock_addr corresponds to an
implicit padding of 4 bytes, right after msg_src_ip4. Access to this
padding isn't rejected in sock_addr_is_valid_access and it thus later
fails to convert the access.

This patch fixes it by explicitly checking the various fields of
bpf_sock_addr in sock_addr_is_valid_access.

I checked the other ctx structures and is_valid_access functions and
didn't find any other similar cases. Other cases of (properly handled)
padding are covered in new tests in a subsequent patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40078/">CVE-2025-40078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40078">CVE-2025-40078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252789">SUSE bug 1252789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40080</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40080" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40080" ref_url="https://www.suse.com/security/cve/CVE-2025-40080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nbd: restrict sockets to TCP and UDP

Recently, syzbot started to abuse NBD with all kinds of sockets.

Commit cf1b2326b734 ("nbd: verify socket is supported during setup")
made sure the socket supported a shutdown() method.

Explicitely accept TCP and UNIX stream sockets.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40080/">CVE-2025-40080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40080">CVE-2025-40080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252774">SUSE bug 1252774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40081</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40081" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40081" ref_url="https://www.suse.com/security/cve/CVE-2025-40081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: arm_spe: Prevent overflow in PERF_IDX2OFF()

Cast nr_pages to unsigned long to avoid overflow when handling large
AUX buffer sizes (&gt;= 2 GiB).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40081/">CVE-2025-40081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40081">CVE-2025-40081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252776">SUSE bug 1252776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40083</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40083" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40083" ref_url="https://www.suse.com/security/cve/CVE-2025-40083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_qfq: Fix null-deref in agg_dequeue

To prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)
when cl-&gt;qdisc-&gt;ops-&gt;peek(cl-&gt;qdisc) returns NULL, we check the return
value before using it, similar to the existing approach in sch_hfsc.c.

To avoid code duplication, the following changes are made:

1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static
inline function.

2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to
include/net/pkt_sched.h so that sch_qfq can reuse it.

3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40083/">CVE-2025-40083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40083">CVE-2025-40083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252912">SUSE bug 1252912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40085</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40085" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40085" ref_url="https://www.suse.com/security/cve/CVE-2025-40085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card

In try_to_register_card(), the return value of usb_ifnum_to_if() is
passed directly to usb_interface_claimed() without a NULL check, which
will lead to a NULL pointer dereference when creating an invalid
USB audio device. Fix this by adding a check to ensure the interface
pointer is valid before passing it to usb_interface_claimed().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40085/">CVE-2025-40085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40085">CVE-2025-40085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252873">SUSE bug 1252873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40086</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40086" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40086" ref_url="https://www.suse.com/security/cve/CVE-2025-40086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Don't allow evicting of BOs in same VM in array of VM binds

An array of VM binds can potentially evict other buffer objects (BOs)
within the same VM under certain conditions, which may lead to NULL
pointer dereferences later in the bind pipeline. To prevent this, clear
the allow_res_evict flag in the xe_bo_validate call.

v2:
 - Invert polarity of no_res_evict (Thomas)
 - Add comment in code explaining issue (Thomas)

(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40086/">CVE-2025-40086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40086">CVE-2025-40086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252923">SUSE bug 1252923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40087</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40087" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40087" ref_url="https://www.suse.com/security/cve/CVE-2025-40087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Define a proc_layoutcommit for the FlexFiles layout type

Avoid a crash if a pNFS client should happen to send a LAYOUTCOMMIT
operation on a FlexFiles layout.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40087/">CVE-2025-40087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40087">CVE-2025-40087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252909">SUSE bug 1252909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40091</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40091" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40091" ref_url="https://www.suse.com/security/cve/CVE-2025-40091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ixgbe: fix too early devlink_free() in ixgbe_remove()

Since ixgbe_adapter is embedded in devlink, calling devlink_free()
prematurely in the ixgbe_remove() path can lead to UAF. Move devlink_free()
to the end.

KASAN report:

 BUG: KASAN: use-after-free in ixgbe_reset_interrupt_capability+0x140/0x180 [ixgbe]
 Read of size 8 at addr ffff0000adf813e0 by task bash/2095
 CPU: 1 UID: 0 PID: 2095 Comm: bash Tainted: G S  6.17.0-rc2-tnguy.net-queue+ #1 PREEMPT(full)
 [...]
 Call trace:
  show_stack+0x30/0x90 (C)
  dump_stack_lvl+0x9c/0xd0
  print_address_description.constprop.0+0x90/0x310
  print_report+0x104/0x1f0
  kasan_report+0x88/0x180
  __asan_report_load8_noabort+0x20/0x30
  ixgbe_reset_interrupt_capability+0x140/0x180 [ixgbe]
  ixgbe_clear_interrupt_scheme+0xf8/0x130 [ixgbe]
  ixgbe_remove+0x2d0/0x8c0 [ixgbe]
  pci_device_remove+0xa0/0x220
  device_remove+0xb8/0x170
  device_release_driver_internal+0x318/0x490
  device_driver_detach+0x40/0x68
  unbind_store+0xec/0x118
  drv_attr_store+0x64/0xb8
  sysfs_kf_write+0xcc/0x138
  kernfs_fop_write_iter+0x294/0x440
  new_sync_write+0x1fc/0x588
  vfs_write+0x480/0x6a0
  ksys_write+0xf0/0x1e0
  __arm64_sys_write+0x70/0xc0
  invoke_syscall.constprop.0+0xcc/0x280
  el0_svc_common.constprop.0+0xa8/0x248
  do_el0_svc+0x44/0x68
  el0_svc+0x54/0x160
  el0t_64_sync_handler+0xa0/0xe8
  el0t_64_sync+0x1b0/0x1b8
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40091/">CVE-2025-40091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40091">CVE-2025-40091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252915">SUSE bug 1252915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40096</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40096" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40096" ref_url="https://www.suse.com/security/cve/CVE-2025-40096" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002404.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies

When adding dependencies with drm_sched_job_add_dependency(), that
function consumes the fence reference both on success and failure, so in
the latter case the dma_fence_put() on the error path (xarray failed to
expand) is a double free.

Interestingly this bug appears to have been present ever since
commit ebd5f74255b9 ("drm/sched: Add dependency tracking"), since the code
back then looked like this:

drm_sched_job_add_implicit_dependencies():
...
       for (i = 0; i &lt; fence_count; i++) {
               ret = drm_sched_job_add_dependency(job, fences[i]);
               if (ret)
                       break;
       }

       for (; i &lt; fence_count; i++)
               dma_fence_put(fences[i]);

Which means for the failing 'i' the dma_fence_put was already a double
free. Possibly there were no users at that time, or the test cases were
insufficient to hit it.

The bug was then only noticed and fixed after
commit 9c2ba265352a ("drm/scheduler: use new iterator in drm_sched_job_add_implicit_dependencies v2")
landed, with its fixup of
commit 4eaf02d6076c ("drm/scheduler: fix drm_sched_job_add_implicit_dependencies").

At that point it was a slightly different flavour of a double free, which
commit 963d0b356935 ("drm/scheduler: fix drm_sched_job_add_implicit_dependencies harder")
noticed and attempted to fix.

But it only moved the double free from happening inside the
drm_sched_job_add_dependency(), when releasing the reference not yet
obtained, to the caller, when releasing the reference already released by
the former in the failure case.

As such it is not easy to identify the right target for the fixes tag so
lets keep it simple and just continue the chain.

While fixing we also improve the comment and explain the reason for taking
the reference and not dropping it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40096/">CVE-2025-40096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40096">CVE-2025-40096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252902">SUSE bug 1252902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40097</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40097" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40097" ref_url="https://www.suse.com/security/cve/CVE-2025-40097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: Fix missing pointer check in hda_component_manager_init function

The __component_match_add function may assign the 'matchptr' pointer
the value ERR_PTR(-ENOMEM), which will subsequently be dereferenced.

The call stack leading to the error looks like this:

hda_component_manager_init
|-&gt; component_match_add
    |-&gt; component_match_add_release
        |-&gt; __component_match_add ( ... ,**matchptr, ... )
            |-&gt; *matchptr = ERR_PTR(-ENOMEM);       // assign
|-&gt; component_master_add_with_match( ...  match)
    |-&gt; component_match_realloc(match, match-&gt;num); // dereference

Add IS_ERR() check to prevent the crash.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40097/">CVE-2025-40097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40097">CVE-2025-40097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252900">SUSE bug 1252900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40098</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40098" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40098" ref_url="https://www.suse.com/security/cve/CVE-2025-40098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()

Return value of a function acpi_evaluate_dsm() is dereferenced  without
checking for NULL, but it is usually checked for this function.

acpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns
acpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40098/">CVE-2025-40098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40098">CVE-2025-40098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252917">SUSE bug 1252917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40099</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40099" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40099" ref_url="https://www.suse.com/security/cve/CVE-2025-40099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: parse_dfs_referrals: prevent oob on malformed input

Malicious SMB server can send invalid reply to FSCTL_DFS_GET_REFERRALS

- reply smaller than sizeof(struct get_dfs_referral_rsp)
- reply with number of referrals smaller than NumberOfReferrals in the
header

Processing of such replies will cause oob.

Return -EINVAL error on such replies to prevent oob-s.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40099/">CVE-2025-40099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40099">CVE-2025-40099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252911">SUSE bug 1252911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40100</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40100" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40100" ref_url="https://www.suse.com/security/cve/CVE-2025-40100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not assert we found block group item when creating free space tree

Currently, when building a free space tree at populate_free_space_tree(),
if we are not using the block group tree feature, we always expect to find
block group items (either extent items or a block group item with key type
BTRFS_BLOCK_GROUP_ITEM_KEY) when we search the extent tree with
btrfs_search_slot_for_read(), so we assert that we found an item. However
this expectation is wrong since we can have a new block group created in
the current transaction which is still empty and for which we still have
not added the block group's item to the extent tree, in which case we do
not have any items in the extent tree associated to the block group.

The insertion of a new block group's block group item in the extent tree
happens at btrfs_create_pending_block_groups() when it calls the helper
insert_block_group_item(). This typically is done when a transaction
handle is released, committed or when running delayed refs (either as
part of a transaction commit or when serving tickets for space reservation
if we are low on free space).

So remove the assertion at populate_free_space_tree() even when the block
group tree feature is not enabled and update the comment to mention this
case.

Syzbot reported this with the following stack trace:

  BTRFS info (device loop3 state M): rebuilding free space tree
  assertion failed: ret == 0 :: 0, in fs/btrfs/free-space-tree.c:1115
  ------------[ cut here ]------------
  kernel BUG at fs/btrfs/free-space-tree.c:1115!
  Oops: invalid opcode: 0000 [#1] SMP KASAN PTI
  CPU: 1 UID: 0 PID: 6352 Comm: syz.3.25 Not tainted syzkaller #0 PREEMPT(full)
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
  RIP: 0010:populate_free_space_tree+0x700/0x710 fs/btrfs/free-space-tree.c:1115
  Code: ff ff e8 d3 (...)
  RSP: 0018:ffffc9000430f780 EFLAGS: 00010246
  RAX: 0000000000000043 RBX: ffff88805b709630 RCX: fea61d0e2e79d000
  RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000
  RBP: ffffc9000430f8b0 R08: ffffc9000430f4a7 R09: 1ffff92000861e94
  R10: dffffc0000000000 R11: fffff52000861e95 R12: 0000000000000001
  R13: 1ffff92000861f00 R14: dffffc0000000000 R15: 0000000000000000
  FS:  00007f424d9fe6c0(0000) GS:ffff888125afc000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007fd78ad212c0 CR3: 0000000076d68000 CR4: 00000000003526f0
  Call Trace:
   &lt;TASK&gt;
   btrfs_rebuild_free_space_tree+0x1ba/0x6d0 fs/btrfs/free-space-tree.c:1364
   btrfs_start_pre_rw_mount+0x128f/0x1bf0 fs/btrfs/disk-io.c:3062
   btrfs_remount_rw fs/btrfs/super.c:1334 [inline]
   btrfs_reconfigure+0xaed/0x2160 fs/btrfs/super.c:1559
   reconfigure_super+0x227/0x890 fs/super.c:1076
   do_remount fs/namespace.c:3279 [inline]
   path_mount+0xd1a/0xfe0 fs/namespace.c:4027
   do_mount fs/namespace.c:4048 [inline]
   __do_sys_mount fs/namespace.c:4236 [inline]
   __se_sys_mount+0x313/0x410 fs/namespace.c:4213
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
   RIP: 0033:0x7f424e39066a
  Code: d8 64 89 02 (...)
  RSP: 002b:00007f424d9fde68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
  RAX: ffffffffffffffda RBX: 00007f424d9fdef0 RCX: 00007f424e39066a
  RDX: 0000200000000180 RSI: 0000200000000380 RDI: 0000000000000000
  RBP: 0000200000000180 R08: 00007f424d9fdef0 R09: 0000000000000020
  R10: 0000000000000020 R11: 0000000000000246 R12: 0000200000000380
  R13: 00007f424d9fdeb0 R14: 0000000000000000 R15: 00002000000002c0
   &lt;/TASK&gt;
  Modules linked in:
  ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40100/">CVE-2025-40100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40100">CVE-2025-40100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252918">SUSE bug 1252918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40101</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40101" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40101" ref_url="https://www.suse.com/security/cve/CVE-2025-40101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST

At the end of btrfs_load_block_group_zone_info() the first thing we do
is to ensure that if the mapping type is not a SINGLE one and there is
no RAID stripe tree, then we return early with an error.

Doing that, though, prevents the code from running the last calls from
this function which are about freeing memory allocated during its
run. Hence, in this case, instead of returning early, we set the ret
value and fall through the rest of the cleanup code.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40101/">CVE-2025-40101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40101">CVE-2025-40101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252901">SUSE bug 1252901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40102</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40102" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40102" ref_url="https://www.suse.com/security/cve/CVE-2025-40102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Prevent access to vCPU events before init

Another day, another syzkaller bug. KVM erroneously allows userspace to
pend vCPU events for a vCPU that hasn't been initialized yet, leading to
KVM interpreting a bunch of uninitialized garbage for routing /
injecting the exception.

In one case the injection code and the hyp disagree on whether the vCPU
has a 32bit EL1 and put the vCPU into an illegal mode for AArch64,
tripping the BUG() in exception_target_el() during the next injection:

  kernel BUG at arch/arm64/kvm/inject_fault.c:40!
  Internal error: Oops - BUG: 00000000f2000800 [#1]  SMP
  CPU: 3 UID: 0 PID: 318 Comm: repro Not tainted 6.17.0-rc4-00104-g10fd0285305d #6 PREEMPT
  Hardware name: linux,dummy-virt (DT)
  pstate: 21402009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
  pc : exception_target_el+0x88/0x8c
  lr : pend_serror_exception+0x18/0x13c
  sp : ffff800082f03a10
  x29: ffff800082f03a10 x28: ffff0000cb132280 x27: 0000000000000000
  x26: 0000000000000000 x25: ffff0000c2a99c20 x24: 0000000000000000
  x23: 0000000000008000 x22: 0000000000000002 x21: 0000000000000004
  x20: 0000000000008000 x19: ffff0000c2a99c20 x18: 0000000000000000
  x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200000c0
  x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
  x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
  x8 : ffff800082f03af8 x7 : 0000000000000000 x6 : 0000000000000000
  x5 : ffff800080f621f0 x4 : 0000000000000000 x3 : 0000000000000000
  x2 : 000000000040009b x1 : 0000000000000003 x0 : ffff0000c2a99c20
  Call trace:
   exception_target_el+0x88/0x8c (P)
   kvm_inject_serror_esr+0x40/0x3b4
   __kvm_arm_vcpu_set_events+0xf0/0x100
   kvm_arch_vcpu_ioctl+0x180/0x9d4
   kvm_vcpu_ioctl+0x60c/0x9f4
   __arm64_sys_ioctl+0xac/0x104
   invoke_syscall+0x48/0x110
   el0_svc_common.constprop.0+0x40/0xe0
   do_el0_svc+0x1c/0x28
   el0_svc+0x34/0xf0
   el0t_64_sync_handler+0xa0/0xe4
   el0t_64_sync+0x198/0x19c
  Code: f946bc01 b4fffe61 9101e020 17fffff2 (d4210000)

Reject the ioctls outright as no sane VMM would call these before
KVM_ARM_VCPU_INIT anyway. Even if it did the exception would've been
thrown away by the eventual reset of the vCPU's state.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40102/">CVE-2025-40102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40102">CVE-2025-40102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252919">SUSE bug 1252919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40103</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40103" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40103" ref_url="https://www.suse.com/security/cve/CVE-2025-40103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: Fix refcount leak for cifs_sb_tlink

Fix three refcount inconsistency issues related to `cifs_sb_tlink`.

Comments for `cifs_sb_tlink` state that `cifs_put_tlink()` needs to be
called after successful calls to `cifs_sb_tlink()`. Three calls fail to
update refcount accordingly, leading to possible resource leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40103/">CVE-2025-40103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40103">CVE-2025-40103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252924">SUSE bug 1252924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40104</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40104" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40104" ref_url="https://www.suse.com/security/cve/CVE-2025-40104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ixgbevf: fix mailbox API compatibility by negotiating supported features

There was backward compatibility in the terms of mailbox API. Various
drivers from various OSes supporting 10G adapters from Intel portfolio
could easily negotiate mailbox API.

This convention has been broken since introducing API 1.4.
Commit 0062e7cc955e ("ixgbevf: add VF IPsec offload code") added support
for IPSec which is specific only for the kernel ixgbe driver. None of the
rest of the Intel 10G PF/VF drivers supports it. And actually lack of
support was not included in the IPSec implementation - there were no such
code paths. No possibility to negotiate support for the feature was
introduced along with introduction of the feature itself.

Commit 339f28964147 ("ixgbevf: Add support for new mailbox communication
between PF and VF") increasing API version to 1.5 did the same - it
introduced code supported specifically by the PF ESX driver. It altered API
version for the VF driver in the same time not touching the version
defined for the PF ixgbe driver. It led to additional discrepancies,
as the code provided within API 1.6 cannot be supported for Linux ixgbe
driver as it causes crashes.

The issue was noticed some time ago and mitigated by Jake within the commit
d0725312adf5 ("ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5").
As a result we have regression for IPsec support and after increasing API
to version 1.6 ixgbevf driver stopped to support ESX MBX.

To fix this mess add new mailbox op asking PF driver about supported
features. Basing on a response determine whether to set support for IPSec
and ESX-specific enhanced mailbox.

New mailbox op, for compatibility purposes, must be added within new API
revision, as API version of OOT PF &amp; VF drivers is already increased to
1.6 and doesn't incorporate features negotiate op.

Features negotiation mechanism gives possibility to be extended with new
features when needed in the future.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40104/">CVE-2025-40104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40104">CVE-2025-40104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252921">SUSE bug 1252921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40105</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40105" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40105" ref_url="https://www.suse.com/security/cve/CVE-2025-40105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfs: Don't leak disconnected dentries on umount

When user calls open_by_handle_at() on some inode that is not cached, we
will create disconnected dentry for it. If such dentry is a directory,
exportfs_decode_fh_raw() will then try to connect this dentry to the
dentry tree through reconnect_path(). It may happen for various reasons
(such as corrupted fs or race with rename) that the call to
lookup_one_unlocked() in reconnect_one() will fail to find the dentry we
are trying to reconnect and instead create a new dentry under the
parent. Now this dentry will not be marked as disconnected although the
parent still may well be disconnected (at least in case this
inconsistency happened because the fs is corrupted and .. doesn't point
to the real parent directory). This creates inconsistency in
disconnected flags but AFAICS it was mostly harmless. At least until
commit f1ee616214cb ("VFS: don't keep disconnected dentries on d_anon")
which removed adding of most disconnected dentries to sb-&gt;s_anon list.
Thus after this commit cleanup of disconnected dentries implicitely
relies on the fact that dput() will immediately reclaim such dentries.
However when some leaf dentry isn't marked as disconnected, as in the
scenario described above, the reclaim doesn't happen and the dentries
are "leaked". Memory reclaim can eventually reclaim them but otherwise
they stay in memory and if umount comes first, we hit infamous "Busy
inodes after unmount" bug. Make sure all dentries created under a
disconnected parent are marked as disconnected as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40105/">CVE-2025-40105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40105">CVE-2025-40105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252928">SUSE bug 1252928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40106</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40106" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40106" ref_url="https://www.suse.com/security/cve/CVE-2025-40106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: fix divide-by-zero in comedi_buf_munge()

The comedi_buf_munge() function performs a modulo operation
`async-&gt;munge_chan %= async-&gt;cmd.chanlist_len` without first
checking if chanlist_len is zero. If a user program submits a command with
chanlist_len set to zero, this causes a divide-by-zero error when the device
processes data in the interrupt handler path.

Add a check for zero chanlist_len at the beginning of the
function, similar to the existing checks for !map and
CMDF_RAWDATA flag. When chanlist_len is zero, update
munge_count and return early, indicating the data was
handled without munging.

This prevents potential kernel panics from malformed user commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40106/">CVE-2025-40106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40106">CVE-2025-40106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252891">SUSE bug 1252891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40107</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40107" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40107" ref_url="https://www.suse.com/security/cve/CVE-2025-40107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled

This issue is similar to the vulnerability in the `mcp251x` driver,
which was fixed in commit 03c427147b2d ("can: mcp251x: fix resume from
sleep before interface was brought up").

In the `hi311x` driver, when the device resumes from sleep, the driver
schedules `priv-&gt;restart_work`. However, if the network interface was
not previously enabled, the `priv-&gt;wq` (workqueue) is not allocated and
initialized, leading to a null pointer dereference.

To fix this, we move the allocation and initialization of the workqueue
from the `hi3110_open` function to the `hi3110_can_probe` function.
This ensures that the workqueue is properly initialized before it is
used during device resume. And added logic to destroy the workqueue
in the error handling paths of `hi3110_can_probe` and in the
`hi3110_can_remove` function to prevent resource leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40107/">CVE-2025-40107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40107">CVE-2025-40107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253018">SUSE bug 1253018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40109</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40109" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40109" ref_url="https://www.suse.com/security/cve/CVE-2025-40109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: rng - Ensure set_ent is always present

Ensure that set_ent is always set since only drbg provides it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40109/">CVE-2025-40109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40109">CVE-2025-40109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253176">SUSE bug 1253176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40110</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40110" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40110" ref_url="https://www.suse.com/security/cve/CVE-2025-40110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Fix a null-ptr access in the cursor snooper

Check that the resource which is converted to a surface exists before
trying to use the cursor snooper on it.

vmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers
because some svga commands accept SVGA3D_INVALID_ID to mean "no surface",
unfortunately functions that accept the actual surfaces as objects might
(and in case of the cursor snooper, do not) be able to handle null
objects. Make sure that we validate not only the identifier (via the
vmw_cmd_res_check) but also check that the actual resource exists before
trying to do something with it.

Fixes unchecked null-ptr reference in the snooping code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40110/">CVE-2025-40110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40110">CVE-2025-40110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253275">SUSE bug 1253275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40111</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40111" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40111" ref_url="https://www.suse.com/security/cve/CVE-2025-40111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Fix Use-after-free in validation

Nodes stored in the validation duplicates hashtable come from an arena
allocator that is cleared at the end of vmw_execbuf_process. All nodes
are expected to be cleared in vmw_validation_drop_ht but this node escaped
because its resource was destroyed prematurely.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-40111/">CVE-2025-40111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40111">CVE-2025-40111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253362">SUSE bug 1253362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40115</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40115" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40115" ref_url="https://www.suse.com/security/cve/CVE-2025-40115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Fix crash in transport port remove by using ioc_info()

During mpt3sas_transport_port_remove(), messages were logged with
dev_printk() against &amp;mpt3sas_port-&gt;port-&gt;dev. At this point the SAS
transport device may already be partially unregistered or freed, leading
to a crash when accessing its struct device.

Using ioc_info(), which logs via the PCI device (ioc-&gt;pdev-&gt;dev),
guaranteed to remain valid until driver removal.

[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI
[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G           OE       6.16.0-rc1+ #1 PREEMPT(voluntary)
[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024
[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70
[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 &lt;48&gt; 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff
[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206
[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32
[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845
[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8
[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000
[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30
[83428.295833] FS:  00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000
[83428.295837] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0
[83428.295844] PKRU: 55555554
[83428.295846] Call Trace:
[83428.295848]  &lt;TASK&gt;
[83428.295850]  _dev_printk+0x5c/0x80
[83428.295857]  ? srso_alias_return_thunk+0x5/0xfbef5
[83428.295863]  mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]
[83428.295882]  _scsih_remove_device+0x21b/0x280 [mpt3sas]
[83428.295894]  ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]
[83428.295906]  ? srso_alias_return_thunk+0x5/0xfbef5
[83428.295910]  mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]
[83428.295921]  _scsih_expander_node_remove+0x129/0x140 [mpt3sas]
[83428.295933]  _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]
[83428.295944]  scsih_remove+0x3f0/0x4a0 [mpt3sas]
[83428.295957]  pci_device_remove+0x3b/0xb0
[83428.295962]  device_release_driver_internal+0x193/0x200
[83428.295968]  driver_detach+0x44/0x90
[83428.295971]  bus_remove_driver+0x69/0xf0
[83428.295975]  pci_unregister_driver+0x2a/0xb0
[83428.295979]  _mpt3sas_exit+0x1f/0x300 [mpt3sas]
[83428.295991]  __do_sys_delete_module.constprop.0+0x174/0x310
[83428.295997]  ? srso_alias_return_thunk+0x5/0xfbef5
[83428.296000]  ? __x64_sys_getdents64+0x9a/0x110
[83428.296005]  ? srso_alias_return_thunk+0x5/0xfbef5
[83428.296009]  ? syscall_trace_enter+0xf6/0x1b0
[83428.296014]  do_syscall_64+0x7b/0x2c0
[83428.296019]  ? srso_alias_return_thunk+0x5/0xfbef5
[83428.296023]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40115/">CVE-2025-40115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40115">CVE-2025-40115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253318">SUSE bug 1253318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40116</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40116" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40116" ref_url="https://www.suse.com/security/cve/CVE-2025-40116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup

The kthread_run() function returns error pointers so the
max3421_hcd-&gt;spi_thread pointer can be either error pointers or NULL.
Check for both before dereferencing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40116/">CVE-2025-40116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40116">CVE-2025-40116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253324">SUSE bug 1253324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40118</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40118" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40118" ref_url="https://www.suse.com/security/cve/CVE-2025-40118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod

Since commit f7b705c238d1 ("scsi: pm80xx: Set phy_attached to zero when
device is gone") UBSAN reports:

  UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17
  index 28 is out of range for type 'pm8001_phy [16]'

on rmmod when using an expander.

For a direct attached device, attached_phy contains the local phy id.
For a device behind an expander, attached_phy contains the remote phy
id, not the local phy id.

I.e. while pm8001_ha will have pm8001_ha-&gt;chip-&gt;n_phy local phys, for a
device behind an expander, attached_phy can be much larger than
pm8001_ha-&gt;chip-&gt;n_phy (depending on the amount of phys of the
expander).

E.g. on my system pm8001_ha has 8 phys with phy ids 0-7.  One of the
ports has an expander connected.  The expander has 31 phys with phy ids
0-30.

The pm8001_ha-&gt;phy array only contains the phys of the HBA.  It does not
contain the phys of the expander.  Thus, it is wrong to use attached_phy
to index the pm8001_ha-&gt;phy array for a device behind an expander.

Thus, we can only clear phy_attached for devices that are directly
attached.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40118/">CVE-2025-40118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40118">CVE-2025-40118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253363">SUSE bug 1253363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40120</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40120" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40120" ref_url="https://www.suse.com/security/cve/CVE-2025-40120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock

Prevent USB runtime PM (autosuspend) for AX88772* in bind.

usbnet enables runtime PM (autosuspend) by default, so disabling it via
the usb_driver flag is ineffective. On AX88772B, autosuspend shows no
measurable power saving with current driver (no link partner, admin
up/down). The ~0.453 W -&gt; ~0.248 W drop on v6.1 comes from phylib powering
the PHY off on admin-down, not from USB autosuspend.

The real hazard is that with runtime PM enabled, ndo_open() (under RTNL)
may synchronously trigger autoresume (usb_autopm_get_interface()) into
asix_resume() while the USB PM lock is held. Resume paths then invoke
phylink/phylib and MDIO, which also expect RTNL, leading to possible
deadlocks or PM lock vs MDIO wake issues.

To avoid this, keep the device runtime-PM active by taking a usage
reference in ax88772_bind() and dropping it in unbind(). A non-zero PM
usage count blocks runtime suspend regardless of userspace policy
(.../power/control - pm_runtime_allow/forbid), making this approach
robust against sysfs overrides.

Holding a runtime-PM usage ref does not affect system-wide suspend;
system sleep/resume callbacks continue to run as before.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40120/">CVE-2025-40120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40120">CVE-2025-40120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253360">SUSE bug 1253360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40121</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40121" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40121" ref_url="https://www.suse.com/security/cve/CVE-2025-40121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping

When an invalid value is passed via quirk option, currently
bytcr_rt5640 driver just ignores and leaves as is, which may lead to
unepxected results like OOB access.

This patch adds the sanity check and corrects the input mapping to the
certain default value if an invalid value is passed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40121/">CVE-2025-40121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40121">CVE-2025-40121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253367">SUSE bug 1253367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253430">SUSE bug 1253430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40123</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40123" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40123" ref_url="https://www.suse.com/security/cve/CVE-2025-40123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Enforce expected_attach_type for tailcall compatibility

Yinhao et al. recently reported:

  Our fuzzer tool discovered an uninitialized pointer issue in the
  bpf_prog_test_run_xdp() function within the Linux kernel's BPF subsystem.
  This leads to a NULL pointer dereference when a BPF program attempts to
  deference the txq member of struct xdp_buff object.

The test initializes two programs of BPF_PROG_TYPE_XDP: progA acts as the
entry point for bpf_prog_test_run_xdp() and its expected_attach_type can
neither be of be BPF_XDP_DEVMAP nor BPF_XDP_CPUMAP. progA calls into a slot
of a tailcall map it owns. progB's expected_attach_type must be BPF_XDP_DEVMAP
to pass xdp_is_valid_access() validation. The program returns struct xdp_md's
egress_ifindex, and the latter is only allowed to be accessed under mentioned
expected_attach_type. progB is then inserted into the tailcall which progA
calls.

The underlying issue goes beyond XDP though. Another example are programs
of type BPF_PROG_TYPE_CGROUP_SOCK_ADDR. sock_addr_is_valid_access() as well
as sock_addr_func_proto() have different logic depending on the programs'
expected_attach_type. Similarly, a program attached to BPF_CGROUP_INET4_GETPEERNAME
should not be allowed doing a tailcall into a program which calls bpf_bind()
out of BPF which is only enabled for BPF_CGROUP_INET4_CONNECT.

In short, specifying expected_attach_type allows to open up additional
functionality or restrictions beyond what the basic bpf_prog_type enables.
The use of tailcalls must not violate these constraints. Fix it by enforcing
expected_attach_type in __bpf_prog_map_compatible().

Note that we only enforce this for tailcall maps, but not for BPF devmaps or
cpumaps: There, the programs are invoked through dev_map_bpf_prog_run*() and
cpu_map_bpf_prog_run*() which set up a new environment / context and therefore
these situations are not prone to this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40123/">CVE-2025-40123 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40123">CVE-2025-40123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253365">SUSE bug 1253365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40124</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40124" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40124" ref_url="https://www.suse.com/security/cve/CVE-2025-40124" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC III

Anthony Yznaga tracked down that a BUG_ON in ext4 code with large folios
enabled resulted from copy_from_user() returning impossibly large values
greater than the size to be copied. This lead to __copy_from_iter()
returning impossible values instead of the actual number of bytes it was
able to copy.

The BUG_ON has been reported in
https://lore.kernel.org/r/b14f55642207e63e907965e209f6323a0df6dcee.camel@physik.fu-berlin.de

The referenced commit introduced exception handlers on user-space memory
references in copy_from_user and copy_to_user. These handlers return from
the respective function and calculate the remaining bytes left to copy
using the current register contents. The exception handlers expect that
%o2 has already been masked during the bulk copy loop, but the masking was
performed after that loop. This will fix the return value of copy_from_user
and copy_to_user in the faulting case. The behaviour of memcpy stays
unchanged.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40124/">CVE-2025-40124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40124">CVE-2025-40124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253372">SUSE bug 1253372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40126</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40126" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40126" ref_url="https://www.suse.com/security/cve/CVE-2025-40126" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC

The referenced commit introduced exception handlers on user-space memory
references in copy_from_user and copy_to_user. These handlers return from
the respective function and calculate the remaining bytes left to copy
using the current register contents. This commit fixes a couple of bad
calculations. This will fix the return value of copy_from_user and
copy_to_user in the faulting case. The behaviour of memcpy stays unchanged.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40126/">CVE-2025-40126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40126">CVE-2025-40126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253370">SUSE bug 1253370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40127</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40127" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40127" ref_url="https://www.suse.com/security/cve/CVE-2025-40127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwrng: ks-sa - fix division by zero in ks_sa_rng_init

Fix division by zero in ks_sa_rng_init caused by missing clock
pointer initialization. The clk_get_rate() call is performed on
an uninitialized clk pointer, resulting in division by zero when
calculating delay values.

Add clock initialization code before using the clock.


 drivers/char/hw_random/ks-sa-rng.c | 7 +++++++
 1 file changed, 7 insertions(+)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40127/">CVE-2025-40127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40127">CVE-2025-40127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253369">SUSE bug 1253369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40129</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40129" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40129" ref_url="https://www.suse.com/security/cve/CVE-2025-40129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20457-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20458-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20460-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20464-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20471-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20472-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024655.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sunrpc: fix null pointer dereference on zero-length checksum

In xdr_stream_decode_opaque_auth(), zero-length checksum.len causes
checksum.data to be set to NULL. This triggers a NPD when accessing
checksum.data in gss_krb5_verify_mic_v2(). This patch ensures that
the value of checksum.len is not less than XDR_UNIT.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40129/">CVE-2025-40129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40129">CVE-2025-40129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253472">SUSE bug 1253472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253473">SUSE bug 1253473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047551" comment="kernel-livepatch-6_12_0-160000_5-default-7-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047556" comment="kernel-livepatch-6_12_0-160000_5-rt-5-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40130</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40130" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40130" ref_url="https://www.suse.com/security/cve/CVE-2025-40130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024652.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Fix data race in CPU latency PM QoS request handling

The cpu_latency_qos_add/remove/update_request interfaces lack internal
synchronization by design, requiring the caller to ensure thread safety.
The current implementation relies on the 'pm_qos_enabled' flag, which is
insufficient to prevent concurrent access and cannot serve as a proper
synchronization mechanism. This has led to data races and list
corruption issues.

A typical race condition call trace is:

[Thread A]
ufshcd_pm_qos_exit()
  --&gt; cpu_latency_qos_remove_request()
    --&gt; cpu_latency_qos_apply();
      --&gt; pm_qos_update_target()
        --&gt; plist_del              &lt;--(1) delete plist node
    --&gt; memset(req, 0, sizeof(*req));
  --&gt; hba-&gt;pm_qos_enabled = false;

[Thread B]
ufshcd_devfreq_target
  --&gt; ufshcd_devfreq_scale
    --&gt; ufshcd_scale_clks
      --&gt; ufshcd_pm_qos_update     &lt;--(2) pm_qos_enabled is true
        --&gt; cpu_latency_qos_update_request
          --&gt; pm_qos_update_target
            --&gt; plist_del          &lt;--(3) plist node use-after-free

Introduces a dedicated mutex to serialize PM QoS operations, preventing
data races and ensuring safe access to PM QoS resources, including sysfs
interface reads.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40130/">CVE-2025-40130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40130">CVE-2025-40130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253414">SUSE bug 1253414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253415">SUSE bug 1253415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047551" comment="kernel-livepatch-6_12_0-160000_5-default-7-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047325" comment="kernel-livepatch-6_12_0-160000_6-default-5-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047324" comment="kernel-livepatch-6_12_0-160000_7-default-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047337" comment="kernel-livepatch-6_12_0-160000_8-default-2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40132</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40132" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40132" ref_url="https://www.suse.com/security/cve/CVE-2025-40132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback

In create_sdw_dailink() check that sof_end-&gt;codec_info-&gt;add_sidecar
is not NULL before calling it.

The original code assumed that if include_sidecar is true, the codec
on that link has an add_sidecar callback. But there could be other
codecs on the same link that do not have an add_sidecar callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40132/">CVE-2025-40132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40132">CVE-2025-40132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253330">SUSE bug 1253330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40133</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40133" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40133" ref_url="https://www.suse.com/security/cve/CVE-2025-40133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().

mptcp_active_enable() is called from subflow_finish_connect(),
which is icsk-&gt;icsk_af_ops-&gt;sk_rx_dst_set() and it's not always
under RCU.

Using sk_dst_get(sk)-&gt;dev could trigger UAF.

Let's use __sk_dst_get() and dst_dev_rcu().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40133/">CVE-2025-40133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40133">CVE-2025-40133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253328">SUSE bug 1253328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40134</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40134" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40134" ref_url="https://www.suse.com/security/cve/CVE-2025-40134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: fix NULL pointer dereference in __dm_suspend()

There is a race condition between dm device suspend and table load that
can lead to null pointer dereference. The issue occurs when suspend is
invoked before table load completes:

BUG: kernel NULL pointer dereference, address: 0000000000000054
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 6 PID: 6798 Comm: dmsetup Not tainted 6.6.0-g7e52f5f0ca9b #62
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014
RIP: 0010:blk_mq_wait_quiesce_done+0x0/0x50
Call Trace:
  &lt;TASK&gt;
  blk_mq_quiesce_queue+0x2c/0x50
  dm_stop_queue+0xd/0x20
  __dm_suspend+0x130/0x330
  dm_suspend+0x11a/0x180
  dev_suspend+0x27e/0x560
  ctl_ioctl+0x4cf/0x850
  dm_ctl_ioctl+0xd/0x20
  vfs_ioctl+0x1d/0x50
  __se_sys_ioctl+0x9b/0xc0
  __x64_sys_ioctl+0x19/0x30
  x64_sys_call+0x2c4a/0x4620
  do_syscall_64+0x9e/0x1b0

The issue can be triggered as below:

T1 						T2
dm_suspend					table_load
__dm_suspend					dm_setup_md_queue
						dm_mq_init_request_queue
						blk_mq_init_allocated_queue
						=&gt; q-&gt;mq_ops = set-&gt;ops; (1)
dm_stop_queue / dm_wait_for_completion
=&gt; q-&gt;tag_set NULL pointer!	(2)
						=&gt; q-&gt;tag_set = set; (3)

Fix this by checking if a valid table (map) exists before performing
request-based suspend and waiting for target I/O. When map is NULL,
skip these table-dependent suspend steps.

Even when map is NULL, no I/O can reach any target because there is
no table loaded; I/O submitted in this state will fail early in the
DM layer. Skipping the table-dependent suspend logic in this case
is safe and avoids NULL pointer dereferences.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40134/">CVE-2025-40134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40134">CVE-2025-40134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253386">SUSE bug 1253386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40135</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40135" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40135" ref_url="https://www.suse.com/security/cve/CVE-2025-40135" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: use RCU in ip6_xmit()

Use RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent
possible UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40135/">CVE-2025-40135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40135">CVE-2025-40135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253342">SUSE bug 1253342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40139</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40139" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40139" ref_url="https://www.suse.com/security/cve/CVE-2025-40139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().

smc_clc_prfx_set() is called during connect() and not under RCU
nor RTNL.

Using sk_dst_get(sk)-&gt;dev could trigger UAF.

Let's use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()
after kernel_getsockname().

Note that the returned value of smc_clc_prfx_set() is not used
in the caller.

While at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()
not to touch dst there.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40139/">CVE-2025-40139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40139">CVE-2025-40139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253409">SUSE bug 1253409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253411">SUSE bug 1253411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40140</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40140" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40140" ref_url="https://www.suse.com/security/cve/CVE-2025-40140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast

syzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.
This is the sequence of events that leads to the warning:

rtl8150_start_xmit() {
	netif_stop_queue();
	usb_submit_urb(dev-&gt;tx_urb);
}

rtl8150_set_multicast() {
	netif_stop_queue();
	netif_wake_queue();		&lt;-- wakes up TX queue before URB is done
}

rtl8150_start_xmit() {
	netif_stop_queue();
	usb_submit_urb(dev-&gt;tx_urb);	&lt;-- double submission
}

rtl8150_set_multicast being the ndo_set_rx_mode callback should not be
calling netif_stop_queue and notif_start_queue as these handle
TX queue synchronization.

The net core function dev_set_rx_mode handles the synchronization
for rtl8150_set_multicast making it safe to remove these locks.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40140/">CVE-2025-40140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40140">CVE-2025-40140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253349">SUSE bug 1253349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40141</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40141" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40141" ref_url="https://www.suse.com/security/cve/CVE-2025-40141" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: ISO: Fix possible UAF on iso_conn_free

This attempt to fix similar issue to sco_conn_free where if the
conn-&gt;sk is not set to NULL may lead to UAF on iso_conn_free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40141/">CVE-2025-40141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40141">CVE-2025-40141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253352">SUSE bug 1253352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40142</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40142" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40142" ref_url="https://www.suse.com/security/cve/CVE-2025-40142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT

snd_pcm_group_lock_irq() acquires a spinlock_t and disables interrupts
via spin_lock_irq(). This also implicitly disables the handling of
softirqs such as TIMER_SOFTIRQ.
On PREEMPT_RT softirqs are preemptible and spin_lock_irq() does not
disable them. That means a timer can be invoked during spin_lock_irq()
on the same CPU. Due to synchronisations reasons local_bh_disable() has
a per-CPU lock named softirq_ctrl.lock which synchronizes individual
softirq against each other.
syz-bot managed to trigger a lockdep report where softirq_ctrl.lock is
acquired in hrtimer_cancel() in addition to hrtimer_run_softirq(). This
is a possible deadlock.

The softirq_ctrl.lock can not be made part of spin_lock_irq() as this
would lead to too much synchronisation against individual threads on the
system. To avoid the possible deadlock, softirqs must be manually
disabled before the lock is acquired.

Disable softirqs before the lock is acquired on PREEMPT_RT.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40142/">CVE-2025-40142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40142">CVE-2025-40142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253348">SUSE bug 1253348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40147</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40147" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40147" ref_url="https://www.suse.com/security/cve/CVE-2025-40147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-throttle: fix access race during throttle policy activation

On repeated cold boots we occasionally hit a NULL pointer crash in
blk_should_throtl() when throttling is consulted before the throttle
policy is fully enabled for the queue. Checking only q-&gt;td != NULL is
insufficient during early initialization, so blkg_to_pd() for the
throttle policy can still return NULL and blkg_to_tg() becomes NULL,
which later gets dereferenced.

 Unable to handle kernel NULL pointer dereference
 at virtual address 0000000000000156
 ...
 pc : submit_bio_noacct+0x14c/0x4c8
 lr : submit_bio_noacct+0x48/0x4c8
 sp : ffff800087f0b690
 x29: ffff800087f0b690 x28: 0000000000005f90 x27: ffff00068af393c0
 x26: 0000000000080000 x25: 000000000002fbc0 x24: ffff000684ddcc70
 x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
 x20: 0000000000080000 x19: ffff000684ddcd08 x18: ffffffffffffffff
 x17: 0000000000000000 x16: ffff80008132a550 x15: 0000ffff98020fff
 x14: 0000000000000000 x13: 1fffe000d11d7021 x12: ffff000688eb810c
 x11: ffff00077ec4bb80 x10: ffff000688dcb720 x9 : ffff80008068ef60
 x8 : 00000a6fb8a86e85 x7 : 000000000000111e x6 : 0000000000000002
 x5 : 0000000000000246 x4 : 0000000000015cff x3 : 0000000000394500
 x2 : ffff000682e35e40 x1 : 0000000000364940 x0 : 000000000000001a
 Call trace:
  submit_bio_noacct+0x14c/0x4c8
  verity_map+0x178/0x2c8
  __map_bio+0x228/0x250
  dm_submit_bio+0x1c4/0x678
  __submit_bio+0x170/0x230
  submit_bio_noacct_nocheck+0x16c/0x388
  submit_bio_noacct+0x16c/0x4c8
  submit_bio+0xb4/0x210
  f2fs_submit_read_bio+0x4c/0xf0
  f2fs_mpage_readpages+0x3b0/0x5f0
  f2fs_readahead+0x90/0xe8

Tighten blk_throtl_activated() to also require that the throttle policy
bit is set on the queue:

  return q-&gt;td != NULL &amp;&amp;
         test_bit(blkcg_policy_throtl.plid, q-&gt;blkcg_pols);

This prevents blk_should_throtl() from accessing throttle group state
until policy data has been attached to blkgs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40147/">CVE-2025-40147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40147">CVE-2025-40147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253344">SUSE bug 1253344</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40149</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40149" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40149" ref_url="https://www.suse.com/security/cve/CVE-2025-40149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().

get_netdev_for_sock() is called during setsockopt(),
so not under RCU.

Using sk_dst_get(sk)-&gt;dev could trigger UAF.

Let's use __sk_dst_get() and dst_dev_rcu().

Note that the only -&gt;ndo_sk_get_lower_dev() user is
bond_sk_get_lower_dev(), which uses RCU.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40149/">CVE-2025-40149 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40149">CVE-2025-40149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253355">SUSE bug 1253355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40153</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40153" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40153" ref_url="https://www.suse.com/security/cve/CVE-2025-40153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: hugetlb: avoid soft lockup when mprotect to large memory area

When calling mprotect() to a large hugetlb memory area in our customer's
workload (~300GB hugetlb memory), soft lockup was observed:

watchdog: BUG: soft lockup - CPU#98 stuck for 23s! [t2_new_sysv:126916]

CPU: 98 PID: 126916 Comm: t2_new_sysv Kdump: loaded Not tainted 6.17-rc7
Hardware name: GIGACOMPUTING R2A3-T40-AAV1/Jefferson CIO, BIOS 5.4.4.1 07/15/2025
pstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc  : mte_clear_page_tags+0x14/0x24
lr  : mte_sync_tags+0x1c0/0x240
sp  : ffff80003150bb80
x29: ffff80003150bb80 x28: ffff00739e9705a8 x27: 0000ffd2d6a00000
x26: 0000ff8e4bc00000 x25: 00e80046cde00f45 x24: 0000000000022458
x23: 0000000000000000 x22: 0000000000000004 x21: 000000011b380000
x20: ffff000000000000 x19: 000000011b379f40 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
x11: 0000000000000000 x10: 0000000000000000 x9 : ffffc875e0aa5e2c
x8  : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000
x5  : fffffc01ce7a5c00 x4 : 00000000046cde00 x3 : fffffc0000000000
x2  : 0000000000000004 x1 : 0000000000000040 x0 : ffff0046cde7c000

Call trace:
    mte_clear_page_tags+0x14/0x24
    set_huge_pte_at+0x25c/0x280
    hugetlb_change_protection+0x220/0x430
    change_protection+0x5c/0x8c
    mprotect_fixup+0x10c/0x294
    do_mprotect_pkey.constprop.0+0x2e0/0x3d4
    __arm64_sys_mprotect+0x24/0x44
    invoke_syscall+0x50/0x160
    el0_svc_common+0x48/0x144
    do_el0_svc+0x30/0xe0
    el0_svc+0x30/0xf0
    el0t_64_sync_handler+0xc4/0x148
    el0t_64_sync+0x1a4/0x1a8

Soft lockup is not triggered with THP or base page because there is
cond_resched() called for each PMD size.

Although the soft lockup was triggered by MTE, it should be not MTE
specific.  The other processing which takes long time in the loop may
trigger soft lockup too.

So add cond_resched() for hugetlb to avoid soft lockup.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40153/">CVE-2025-40153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40153">CVE-2025-40153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253408">SUSE bug 1253408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40154</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40154" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40154" ref_url="https://www.suse.com/security/cve/CVE-2025-40154" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1142" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002437.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping

When an invalid value is passed via quirk option, currently
bytcr_rt5640 driver only shows an error message but leaves as is.
This may lead to unepxected results like OOB access.

This patch corrects the input mapping to the certain default value if
an invalid value is passed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40154/">CVE-2025-40154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40154">CVE-2025-40154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253431">SUSE bug 1253431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253432">SUSE bug 1253432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40156</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40156" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40156" ref_url="https://www.suse.com/security/cve/CVE-2025-40156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()

The drv-&gt;sram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which
would lead to a error pointer dereference.  Use IS_ERR_OR_NULL() to check
that the pointer is valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40156/">CVE-2025-40156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40156">CVE-2025-40156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253428">SUSE bug 1253428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40157</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40157" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40157" ref_url="https://www.suse.com/security/cve/CVE-2025-40157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller

When loading the i10nm_edac driver on some Intel Granite Rapids servers,
a call trace may appear as follows:

  UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16
  shift exponent -66 is negative
  ...
  __ubsan_handle_shift_out_of_bounds+0x1e3/0x390
  skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]
  i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]
  skx_register_mci+0x159/0x220 [skx_edac_common]
  i10nm_init+0xcb0/0x1ff0 [i10nm_edac]
  ...

This occurs because some BIOS may disable a memory controller if there
aren't any memory DIMMs populated on this memory controller. The DIMMMTR
register of this disabled memory controller contains the invalid value
~0, resulting in the call trace above.

Fix this call trace by skipping DIMM enumeration on a disabled memory
controller.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40157/">CVE-2025-40157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40157">CVE-2025-40157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253423">SUSE bug 1253423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40158</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40158" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40158" ref_url="https://www.suse.com/security/cve/CVE-2025-40158" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: use RCU in ip6_output()

Use RCU in ip6_output() in order to use dst_dev_rcu() to prevent
possible UAF.

We can remove rcu_read_lock()/rcu_read_unlock() pairs
from ip6_finish_output2().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40158/">CVE-2025-40158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40158">CVE-2025-40158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253402">SUSE bug 1253402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40159</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40159" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40159" ref_url="https://www.suse.com/security/cve/CVE-2025-40159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xsk: Harden userspace-supplied xdp_desc validation

Turned out certain clearly invalid values passed in xdp_desc from
userspace can pass xp_{,un}aligned_validate_desc() and then lead
to UBs or just invalid frames to be queued for xmit.

desc-&gt;len close to ``U32_MAX`` with a non-zero pool-&gt;tx_metadata_len
can cause positive integer overflow and wraparound, the same way low
enough desc-&gt;addr with a non-zero pool-&gt;tx_metadata_len can cause
negative integer overflow. Both scenarios can then pass the
validation successfully.
This doesn't happen with valid XSk applications, but can be used
to perform attacks.

Always promote desc-&gt;len to ``u64`` first to exclude positive
overflows of it. Use explicit check_{add,sub}_overflow() when
validating desc-&gt;addr (which is ``u64`` already).

bloat-o-meter reports a little growth of the code size:

add/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)
Function                                     old     new   delta
xskq_cons_peek_desc                          299     330     +31
xsk_tx_peek_release_desc_batch               973    1002     +29
xsk_generic_xmit                            3148    3132     -16

but hopefully this doesn't hurt the performance much.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40159/">CVE-2025-40159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40159">CVE-2025-40159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253403">SUSE bug 1253403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253404">SUSE bug 1253404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056309" comment="kernel-livepatch-6_12_0-160000_5-rt-7-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056310" comment="kernel-livepatch-6_12_0-160000_6-rt-6-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056311" comment="kernel-livepatch-6_12_0-160000_7-rt-4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40160</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40160" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40160" ref_url="https://www.suse.com/security/cve/CVE-2025-40160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen/events: Return -EEXIST for bound VIRQs

Change find_virq() to return -EEXIST when a VIRQ is bound to a
different CPU than the one passed in.  With that, remove the BUG_ON()
from bind_virq_to_irq() to propogate the error upwards.

Some VIRQs are per-cpu, but others are per-domain or global.  Those must
be bound to CPU0 and can then migrate elsewhere.  The lookup for
per-domain and global will probably fail when migrated off CPU 0,
especially when the current CPU is tracked.  This now returns -EEXIST
instead of BUG_ON().

A second call to bind a per-domain or global VIRQ is not expected, but
make it non-fatal to avoid trying to look up the irq, since we don't
know which per_cpu(virq_to_irq) it will be in.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40160/">CVE-2025-40160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40160">CVE-2025-40160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253400">SUSE bug 1253400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40161</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40161" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40161" ref_url="https://www.suse.com/security/cve/CVE-2025-40161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mailbox: zynqmp-ipi: Fix SGI cleanup on unbind

The driver incorrectly determines SGI vs SPI interrupts by checking IRQ
number &lt; 16, which fails with dynamic IRQ allocation. During unbind,
this causes improper SGI cleanup leading to kernel crash.

Add explicit irq_type field to pdata for reliable identification of SGI
interrupts (type-2) and only clean up SGI resources when appropriate.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40161/">CVE-2025-40161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40161">CVE-2025-40161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253410">SUSE bug 1253410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40162</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40162" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40162" ref_url="https://www.suse.com/security/cve/CVE-2025-40162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails

devm_kasprintf() may return NULL on memory allocation failure,
but the debug message prints cpus-&gt;dai_name before checking it.
Move the dev_dbg() call after the NULL check to prevent potential
NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40162/">CVE-2025-40162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40162">CVE-2025-40162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253422">SUSE bug 1253422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40164</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40164" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40164" ref_url="https://www.suse.com/security/cve/CVE-2025-40164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usbnet: Fix using smp_processor_id() in preemptible code warnings

Syzbot reported the following warning:

BUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879
caller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331
CPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
 check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49
 usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331
 usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708
 usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417
 __dev_set_mtu net/core/dev.c:9443 [inline]
 netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496
 netif_set_mtu+0xb0/0x160 net/core/dev.c:9520
 dev_set_mtu+0xae/0x170 net/core/dev_api.c:247
 dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572
 dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821
 sock_do_ioctl+0x19d/0x280 net/socket.c:1204
 sock_ioctl+0x42f/0x6a0 net/socket.c:1311
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:906 [inline]
 __se_sys_ioctl fs/ioctl.c:892 [inline]
 __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

For historical and portability reasons, the netif_rx() is usually
run in the softirq or interrupt context, this commit therefore add
local_bh_disable/enable() protection in the usbnet_resume_rx().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40164/">CVE-2025-40164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40164">CVE-2025-40164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253407">SUSE bug 1253407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40165</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40165" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40165" ref_url="https://www.suse.com/security/cve/CVE-2025-40165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: nxp: imx8-isi: m2m: Fix streaming cleanup on release

If streamon/streamoff calls are imbalanced, such as when exiting an
application with Ctrl+C when streaming, the m2m usage_count will never
reach zero and the ISI channel won't be freed. Besides from that, if the
input line width is more than 2K, it will trigger a WARN_ON():

[ 59.222120] ------------[ cut here ]------------
[ 59.226758] WARNING: drivers/media/platform/nxp/imx8-isi/imx8-isi-hw.c:631 at mxc_isi_channel_chain+0xa4/0x120, CPU#4: v4l2-ctl/654
[ 59.238569] Modules linked in: ap1302
[ 59.242231] CPU: 4 UID: 0 PID: 654 Comm: v4l2-ctl Not tainted 6.16.0-rc4-next-20250704-06511-gff0e002d480a-dirty #258 PREEMPT
[ 59.253597] Hardware name: NXP i.MX95 15X15 board (DT)
[ 59.258720] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 59.265669] pc : mxc_isi_channel_chain+0xa4/0x120
[ 59.270358] lr : mxc_isi_channel_chain+0x44/0x120
[ 59.275047] sp : ffff8000848c3b40
[ 59.278348] x29: ffff8000848c3b40 x28: ffff0000859b4c98 x27: ffff800081939f00
[ 59.285472] x26: 000000000000000a x25: ffff0000859b4cb8 x24: 0000000000000001
[ 59.292597] x23: ffff0000816f4760 x22: ffff0000816f4258 x21: ffff000084ceb780
[ 59.299720] x20: ffff000084342ff8 x19: ffff000084340000 x18: 0000000000000000
[ 59.306845] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffdb369e1c
[ 59.313969] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 59.321093] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 59.328217] x8 : ffff8000848c3d48 x7 : ffff800081930b30 x6 : ffff800081930b30
[ 59.335340] x5 : ffff0000859b6000 x4 : ffff80008193ae80 x3 : ffff800081022420
[ 59.342464] x2 : ffff0000852f6900 x1 : 0000000000000001 x0 : ffff000084341000
[ 59.349590] Call trace:
[ 59.352025]  mxc_isi_channel_chain+0xa4/0x120 (P)
[ 59.356722]  mxc_isi_m2m_streamon+0x160/0x20c
[ 59.361072]  v4l_streamon+0x24/0x30
[ 59.364556]  __video_do_ioctl+0x40c/0x4a0
[ 59.368560]  video_usercopy+0x2bc/0x690
[ 59.372382]  video_ioctl2+0x18/0x24
[ 59.375857]  v4l2_ioctl+0x40/0x60
[ 59.379168]  __arm64_sys_ioctl+0xac/0x104
[ 59.383172]  invoke_syscall+0x48/0x104
[ 59.386916]  el0_svc_common.constprop.0+0xc0/0xe0
[ 59.391613]  do_el0_svc+0x1c/0x28
[ 59.394915]  el0_svc+0x34/0xf4
[ 59.397966]  el0t_64_sync_handler+0xa0/0xe4
[ 59.402143]  el0t_64_sync+0x198/0x19c
[ 59.405801] ---[ end trace 0000000000000000 ]---

Address this issue by moving the streaming preparation and cleanup to
the vb2 .prepare_streaming() and .unprepare_streaming() operations. This
also simplifies the driver by allowing direct usage of the
v4l2_m2m_ioctl_streamon() and v4l2_m2m_ioctl_streamoff() helpers.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40165/">CVE-2025-40165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40165">CVE-2025-40165 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253405">SUSE bug 1253405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40166</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40166" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40166" ref_url="https://www.suse.com/security/cve/CVE-2025-40166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/guc: Check GuC running state before deregistering exec queue

In normal operation, a registered exec queue is disabled and
deregistered through the GuC, and freed only after the GuC confirms
completion. However, if the driver is forced to unbind while the exec
queue is still running, the user may call exec_destroy() after the GuC
has already been stopped and CT communication disabled.

In this case, the driver cannot receive a response from the GuC,
preventing proper cleanup of exec queue resources. Fix this by directly
releasing the resources when GuC is not running.

Here is the failure dmesg log:
"
[  468.089581] ---[ end trace 0000000000000000 ]---
[  468.089608] pci 0000:03:00.0: [drm] *ERROR* GT0: GUC ID manager unclean (1/65535)
[  468.090558] pci 0000:03:00.0: [drm] GT0:     total 65535
[  468.090562] pci 0000:03:00.0: [drm] GT0:     used 1
[  468.090564] pci 0000:03:00.0: [drm] GT0:     range 1..1 (1)
[  468.092716] ------------[ cut here ]------------
[  468.092719] WARNING: CPU: 14 PID: 4775 at drivers/gpu/drm/xe/xe_ttm_vram_mgr.c:298 ttm_vram_mgr_fini+0xf8/0x130 [xe]
"

v2: use xe_uc_fw_is_running() instead of xe_guc_ct_enabled().
    As CT may go down and come back during VF migration.

(cherry picked from commit 9b42321a02c50a12b2beb6ae9469606257fbecea)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40166/">CVE-2025-40166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40166">CVE-2025-40166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253433">SUSE bug 1253433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40167</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40167" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40167" ref_url="https://www.suse.com/security/cve/CVE-2025-40167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: detect invalid INLINE_DATA + EXTENTS flag combination

syzbot reported a BUG_ON in ext4_es_cache_extent() when opening a verity
file on a corrupted ext4 filesystem mounted without a journal.

The issue is that the filesystem has an inode with both the INLINE_DATA
and EXTENTS flags set:

    EXT4-fs error (device loop0): ext4_cache_extents:545: inode #15:
    comm syz.0.17: corrupted extent tree: lblk 0 &lt; prev 66

Investigation revealed that the inode has both flags set:
    DEBUG: inode 15 - flag=1, i_inline_off=164, has_inline=1, extents_flag=1

This is an invalid combination since an inode should have either:
- INLINE_DATA: data stored directly in the inode
- EXTENTS: data stored in extent-mapped blocks

Having both flags causes ext4_has_inline_data() to return true, skipping
extent tree validation in __ext4_iget(). The unvalidated out-of-order
extents then trigger a BUG_ON in ext4_es_cache_extent() due to integer
underflow when calculating hole sizes.

Fix this by detecting this invalid flag combination early in ext4_iget()
and rejecting the corrupted inode.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40167/">CVE-2025-40167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40167">CVE-2025-40167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253458">SUSE bug 1253458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40168</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40168" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40168" ref_url="https://www.suse.com/security/cve/CVE-2025-40168" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2720" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002516.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3488" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().

smc_clc_prfx_match() is called from smc_listen_work() and
not under RCU nor RTNL.

Using sk_dst_get(sk)-&gt;dev could trigger UAF.

Let's use __sk_dst_get() and dst_dev_rcu().

Note that the returned value of smc_clc_prfx_match() is not
used in the caller.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40168/">CVE-2025-40168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40168">CVE-2025-40168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253427">SUSE bug 1253427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40169</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40169" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40169" ref_url="https://www.suse.com/security/cve/CVE-2025-40169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Reject negative offsets for ALU ops

When verifying BPF programs, the check_alu_op() function validates
instructions with ALU operations. The 'offset' field in these
instructions is a signed 16-bit integer.

The existing check 'insn-&gt;off &gt; 1' was intended to ensure the offset is
either 0, or 1 for BPF_MOD/BPF_DIV. However, because 'insn-&gt;off' is
signed, this check incorrectly accepts all negative values (e.g., -1).

This commit tightens the validation by changing the condition to
'(insn-&gt;off != 0 &amp;&amp; insn-&gt;off != 1)'. This ensures that any value
other than the explicitly permitted 0 and 1 is rejected, hardening the
verifier against malformed BPF programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40169/">CVE-2025-40169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40169">CVE-2025-40169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253416">SUSE bug 1253416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40170</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40170" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40170" ref_url="https://www.suse.com/security/cve/CVE-2025-40170" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: use dst_dev_rcu() in sk_setup_caps()

Use RCU to protect accesses to dst-&gt;dev from sk_setup_caps()
and sk_dst_gso_max_size().

Also use dst_dev_rcu() in ip6_dst_mtu_maybe_forward(),
and ip_dst_mtu_maybe_forward().

ip4_dst_hoplimit() can use dst_dev_net_rcu().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40170/">CVE-2025-40170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40170">CVE-2025-40170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253413">SUSE bug 1253413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40171</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40171" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40171" ref_url="https://www.suse.com/security/cve/CVE-2025-40171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-fc: move lsop put work to nvmet_fc_ls_req_op

It's possible for more than one async command to be in flight from
__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.

In the current code, only one put work item is queued at a time, which
results in a leaked reference.

To fix this, move the work item to the nvmet_fc_ls_req_op struct, which
already tracks all resources related to the command.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40171/">CVE-2025-40171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40171">CVE-2025-40171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253412">SUSE bug 1253412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40172</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40172" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40172" ref_url="https://www.suse.com/security/cve/CVE-2025-40172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()

Currently, if find_and_map_user_pages() takes a DMA xfer request from the
user with a length field set to 0, or in a rare case, the host receives
QAIC_TRANS_DMA_XFER_CONT from the device where resources-&gt;xferred_dma_size
is equal to the requested transaction size, the function will return 0
before allocating an sgt or setting the fields of the dma_xfer struct.
In that case, encode_addr_size_pairs() will try to access the sgt which
will lead to a general protection fault.

Return an EINVAL in case the user provides a zero-sized ALP, or the device
requests continuation after all of the bytes have been transferred.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40172/">CVE-2025-40172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40172">CVE-2025-40172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253424">SUSE bug 1253424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40173</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40173" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40173" ref_url="https://www.suse.com/security/cve/CVE-2025-40173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/ip6_tunnel: Prevent perpetual tunnel growth

Similarly to ipv4 tunnel, ipv6 version updates dev-&gt;needed_headroom, too.
While ipv4 tunnel headroom adjustment growth was limited in
commit 5ae1e9922bbd ("net: ip_tunnel: prevent perpetual headroom growth"),
ipv6 tunnel yet increases the headroom without any ceiling.

Reflect ipv4 tunnel headroom adjustment limit on ipv6 version.

Credits to Francesco Ruggeri, who was originally debugging this issue
and wrote local Arista-specific patch and a reproducer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40173/">CVE-2025-40173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40173">CVE-2025-40173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253421">SUSE bug 1253421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40175</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40175" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40175" ref_url="https://www.suse.com/security/cve/CVE-2025-40175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: cleanup remaining SKBs in PTP flows

When the driver requests Tx timestamp value, one of the first steps is
to clone SKB using skb_get. It increases the reference counter for that
SKB to prevent unexpected freeing by another component.
However, there may be a case where the index is requested, SKB is
assigned and never consumed by PTP flows - for example due to reset during
running PTP apps.

Add a check in release timestamping function to verify if the SKB
assigned to Tx timestamp latch was freed, and release remaining SKBs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40175/">CVE-2025-40175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40175">CVE-2025-40175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253426">SUSE bug 1253426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40176</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40176" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40176" ref_url="https://www.suse.com/security/cve/CVE-2025-40176" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: wait for pending async decryptions if tls_strp_msg_hold fails

Async decryption calls tls_strp_msg_hold to create a clone of the
input skb to hold references to the memory it uses. If we fail to
allocate that clone, proceeding with async decryption can lead to
various issues (UAF on the skb, writing into userspace memory after
the recv() call has returned).

In this case, wait for all pending decryption requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40176/">CVE-2025-40176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40176">CVE-2025-40176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253425">SUSE bug 1253425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254100">SUSE bug 1254100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40177</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40177" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40177" ref_url="https://www.suse.com/security/cve/CVE-2025-40177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

accel/qaic: Fix bootlog initialization ordering

As soon as we queue MHI buffers to receive the bootlog from the device,
we could be receiving data. Therefore all the resources needed to
process that data need to be setup prior to queuing the buffers.

We currently initialize some of the resources after queuing the buffers
which creates a race between the probe() and any data that comes back
from the device. If the uninitialized resources are accessed, we could
see page faults.

Fix the init ordering to close the race.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40177/">CVE-2025-40177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40177">CVE-2025-40177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253443">SUSE bug 1253443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40178</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40178" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40178" ref_url="https://www.suse.com/security/cve/CVE-2025-40178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pid: Add a judgment for ns null in pid_nr_ns

__task_pid_nr_ns
        ns = task_active_pid_ns(current);
        pid_nr_ns(rcu_dereference(*task_pid_ptr(task, type)), ns);
                if (pid &amp;&amp; ns-&gt;level &lt;= pid-&gt;level) {

Sometimes null is returned for task_active_pid_ns. Then it will trigger kernel panic in pid_nr_ns.

For example:
	Unable to handle kernel NULL pointer dereference at virtual address 0000000000000058
	Mem abort info:
	ESR = 0x0000000096000007
	EC = 0x25: DABT (current EL), IL = 32 bits
	SET = 0, FnV = 0
	EA = 0, S1PTW = 0
	FSC = 0x07: level 3 translation fault
	Data abort info:
	ISV = 0, ISS = 0x00000007, ISS2 = 0x00000000
	CM = 0, WnR = 0, TnD = 0, TagAccess = 0
	GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
	user pgtable: 4k pages, 39-bit VAs, pgdp=00000002175aa000
	[0000000000000058] pgd=08000002175ab003, p4d=08000002175ab003, pud=08000002175ab003, pmd=08000002175be003, pte=0000000000000000
	pstate: 834000c5 (Nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
	pc : __task_pid_nr_ns+0x74/0xd0
	lr : __task_pid_nr_ns+0x24/0xd0
	sp : ffffffc08001bd10
	x29: ffffffc08001bd10 x28: ffffffd4422b2000 x27: 0000000000000001
	x26: ffffffd442821168 x25: ffffffd442821000 x24: 00000f89492eab31
	x23: 00000000000000c0 x22: ffffff806f5693c0 x21: ffffff806f5693c0
	x20: 0000000000000001 x19: 0000000000000000 x18: 0000000000000000
	x17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 00000000023a1adc
	x14: 0000000000000003 x13: 00000000007ef6d8 x12: 001167c391c78800
	x11: 00ffffffffffffff x10: 0000000000000000 x9 : 0000000000000001
	x8 : ffffff80816fa3c0 x7 : 0000000000000000 x6 : 49534d702d535449
	x5 : ffffffc080c4c2c0 x4 : ffffffd43ee128c8 x3 : ffffffd43ee124dc
	x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffffff806f5693c0
	Call trace:
	__task_pid_nr_ns+0x74/0xd0
	...
	__handle_irq_event_percpu+0xd4/0x284
	handle_irq_event+0x48/0xb0
	handle_fasteoi_irq+0x160/0x2d8
	generic_handle_domain_irq+0x44/0x60
	gic_handle_irq+0x4c/0x114
	call_on_irq_stack+0x3c/0x74
	do_interrupt_handler+0x4c/0x84
	el1_interrupt+0x34/0x58
	el1h_64_irq_handler+0x18/0x24
	el1h_64_irq+0x68/0x6c
	account_kernel_stack+0x60/0x144
	exit_task_stack_account+0x1c/0x80
	do_exit+0x7e4/0xaf8
	...
	get_signal+0x7bc/0x8d8
	do_notify_resume+0x128/0x828
	el0_svc+0x6c/0x70
	el0t_64_sync_handler+0x68/0xbc
	el0t_64_sync+0x1a8/0x1ac
	Code: 35fffe54 911a02a8 f9400108 b4000128 (b9405a69)
	---[ end trace 0000000000000000 ]---
	Kernel panic - not syncing: Oops: Fatal exception in interrupt
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40178/">CVE-2025-40178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40178">CVE-2025-40178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253463">SUSE bug 1253463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40179</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40179" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40179" ref_url="https://www.suse.com/security/cve/CVE-2025-40179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: verify orphan file size is not too big

In principle orphan file can be arbitrarily large. However orphan replay
needs to traverse it all and we also pin all its buffers in memory. Thus
filesystems with absurdly large orphan files can lead to big amounts of
memory consumed. Limit orphan file size to a sane value and also use
kvmalloc() for allocating array of block descriptor structures to avoid
large order allocations for sane but large orphan files.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40179/">CVE-2025-40179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40179">CVE-2025-40179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253442">SUSE bug 1253442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40180</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40180" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40180" ref_url="https://www.suse.com/security/cve/CVE-2025-40180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop

The cleanup loop was starting at the wrong array index, causing
out-of-bounds access.
Start the loop at the correct index for zero-indexed arrays to prevent
accessing memory beyond the allocated array bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40180/">CVE-2025-40180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40180">CVE-2025-40180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253440">SUSE bug 1253440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40183</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40183" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40183" ref_url="https://www.suse.com/security/cve/CVE-2025-40183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}

Cilium has a BPF egress gateway feature which forces outgoing K8s Pod
traffic to pass through dedicated egress gateways which then SNAT the
traffic in order to interact with stable IPs outside the cluster.

The traffic is directed to the gateway via vxlan tunnel in collect md
mode. A recent BPF change utilized the bpf_redirect_neigh() helper to
forward packets after the arrival and decap on vxlan, which turned out
over time that the kmalloc-256 slab usage in kernel was ever-increasing.

The issue was that vxlan allocates the metadata_dst object and attaches
it through a fake dst entry to the skb. The latter was never released
though given bpf_redirect_neigh() was merely setting the new dst entry
via skb_dst_set() without dropping an existing one first.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40183/">CVE-2025-40183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40183">CVE-2025-40183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253441">SUSE bug 1253441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40185</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40185" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40185" ref_url="https://www.suse.com/security/cve/CVE-2025-40185" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: ice_adapter: release xa entry on adapter allocation failure

When ice_adapter_new() fails, the reserved XArray entry created by
xa_insert() is not released. This causes subsequent insertions at
the same index to return -EBUSY, potentially leading to
NULL pointer dereferences.

Reorder the operations as suggested by Przemek Kitszel:
1. Check if adapter already exists (xa_load)
2. Reserve the XArray slot (xa_reserve)
3. Allocate the adapter (ice_adapter_new)
4. Store the adapter (xa_store)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40185/">CVE-2025-40185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40185">CVE-2025-40185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253394">SUSE bug 1253394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40186</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40186" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40186" ref_url="https://www.suse.com/security/cve/CVE-2025-40186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20457-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20458-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20460-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20464-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20471-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20472-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024655.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request().

syzbot reported the splat below in tcp_conn_request(). [0]

If a listener is close()d while a TFO socket is being processed in
tcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-&gt;sk
and calls inet_child_forget(), which calls tcp_disconnect() for the
TFO socket.

After the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),
where reqsk_put() is called due to !reqsk-&gt;sk.

Then, reqsk_fastopen_remove() in tcp_conn_request() decrements the
last req-&gt;rsk_refcnt and frees reqsk, and __reqsk_free() at the
drop_and_free label causes the refcount underflow for the listener
and double-free of the reqsk.

Let's remove reqsk_fastopen_remove() in tcp_conn_request().

Note that other callers make sure tp-&gt;fastopen_rsk is not NULL.

[0]:
refcount_t: underflow; use-after-free.
WARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)
Modules linked in:
CPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
RIP: 0010:refcount_warn_saturate (lib/refcount.c:28)
Code: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff &lt;0f&gt; 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6
RSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246
RAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900
RDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280
RBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280
R10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100
R13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8
FS:  00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0
Call Trace:
 &lt;IRQ&gt;
 tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)
 tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)
 tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)
 tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)
 ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)
 ip6_input (net/ipv6/ip6_input.c:500)
 ipv6_rcv (net/ipv6/ip6_input.c:311)
 __netif_receive_skb (net/core/dev.c:6104)
 process_backlog (net/core/dev.c:6456)
 __napi_poll (net/core/dev.c:7506)
 net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)
 handle_softirqs (kernel/softirq.c:579)
 do_softirq (kernel/softirq.c:480)
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40186/">CVE-2025-40186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40186">CVE-2025-40186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253438">SUSE bug 1253438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253439">SUSE bug 1253439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047551" comment="kernel-livepatch-6_12_0-160000_5-default-7-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047556" comment="kernel-livepatch-6_12_0-160000_5-rt-5-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044578" comment="kernel-livepatch-6_12_0-160000_6-default-4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047301" comment="kernel-livepatch-6_12_0-160000_6-rt-4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40187</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40187" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40187" ref_url="https://www.suse.com/security/cve/CVE-2025-40187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()

If new_asoc-&gt;peer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0
and sctp_ulpevent_make_authkey() returns 0, then the variable
ai_ev remains zero and the zero will be dereferenced
in the sctp_ulpevent_free() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40187/">CVE-2025-40187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40187">CVE-2025-40187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253647">SUSE bug 1253647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40188</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40188" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40188" ref_url="https://www.suse.com/security/cve/CVE-2025-40188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pwm: berlin: Fix wrong register in suspend/resume

The 'enable' register should be BERLIN_PWM_EN rather than
BERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there
will be cpu exception then kernel panic during suspend/resume.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40188/">CVE-2025-40188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40188">CVE-2025-40188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253449">SUSE bug 1253449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40190</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40190" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40190" ref_url="https://www.suse.com/security/cve/CVE-2025-40190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: guard against EA inode refcount underflow in xattr update

syzkaller found a path where ext4_xattr_inode_update_ref() reads an EA
inode refcount that is already &lt;= 0 and then applies ref_change (often
-1). That lets the refcount underflow and we proceed with a bogus value,
triggering errors like:

  EXT4-fs error: EA inode &lt;n&gt; ref underflow: ref_count=-1 ref_change=-1
  EXT4-fs warning: ea_inode dec ref err=-117

Make the invariant explicit: if the current refcount is non-positive,
treat this as on-disk corruption, emit ext4_error_inode(), and fail the
operation with -EFSCORRUPTED instead of updating the refcount. Delete the
WARN_ONCE() as negative refcounts are now impossible; keep error reporting
in ext4_error_inode().

This prevents the underflow and the follow-on orphan/cleanup churn.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40190/">CVE-2025-40190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40190">CVE-2025-40190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253623">SUSE bug 1253623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40192</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40192" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40192" ref_url="https://www.suse.com/security/cve/CVE-2025-40192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "ipmi: fix msg stack when IPMI is disconnected"

This reverts commit c608966f3f9c2dca596967501d00753282b395fc.

This patch has a subtle bug that can cause the IPMI driver to go into an
infinite loop if the BMC misbehaves in a certain way.  Apparently
certain BMCs do misbehave this way because several reports have come in
recently about this.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40192/">CVE-2025-40192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40192">CVE-2025-40192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253622">SUSE bug 1253622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40194</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40194" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40194" ref_url="https://www.suse.com/security/cve/CVE-2025-40194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()

The cpufreq_cpu_put() call in update_qos_request() takes place too early
because the latter subsequently calls freq_qos_update_request() that
indirectly accesses the policy object in question through the QoS request
object passed to it.

Fortunately, update_qos_request() is called under intel_pstate_driver_lock,
so this issue does not matter for changing the intel_pstate operation
mode, but it theoretically can cause a crash to occur on CPU device hot
removal (which currently can only happen in virt, but it is formally
supported nevertheless).

Address this issue by modifying update_qos_request() to drop the
reference to the policy later.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40194/">CVE-2025-40194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40194">CVE-2025-40194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253445">SUSE bug 1253445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40195</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40195" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40195" ref_url="https://www.suse.com/security/cve/CVE-2025-40195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mount: handle NULL values in mnt_ns_release()

When calling in listmount() mnt_ns_release() may be passed a NULL
pointer. Handle that case gracefully.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40195/">CVE-2025-40195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40195">CVE-2025-40195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253500">SUSE bug 1253500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40196</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40196" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40196" ref_url="https://www.suse.com/security/cve/CVE-2025-40196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: quota: create dedicated workqueue for quota_release_work

There is a kernel panic due to WARN_ONCE when panic_on_warn is set.

This issue occurs when writeback is triggered due to sync call for an
opened file(ie, writeback reason is WB_REASON_SYNC). When f2fs balance
is needed at sync path, flush for quota_release_work is triggered.
By default quota_release_work is queued to "events_unbound" queue which
does not have WQ_MEM_RECLAIM flag. During f2fs balance "writeback"
workqueue tries to flush quota_release_work causing kernel panic due to
MEM_RECLAIM flag mismatch errors.

This patch creates dedicated workqueue with WQ_MEM_RECLAIM flag
for work quota_release_work.

------------[ cut here ]------------
WARNING: CPU: 4 PID: 14867 at kernel/workqueue.c:3721 check_flush_dependency+0x13c/0x148
Call trace:
 check_flush_dependency+0x13c/0x148
 __flush_work+0xd0/0x398
 flush_delayed_work+0x44/0x5c
 dquot_writeback_dquots+0x54/0x318
 f2fs_do_quota_sync+0xb8/0x1a8
 f2fs_write_checkpoint+0x3cc/0x99c
 f2fs_gc+0x190/0x750
 f2fs_balance_fs+0x110/0x168
 f2fs_write_single_data_page+0x474/0x7dc
 f2fs_write_data_pages+0x7d0/0xd0c
 do_writepages+0xe0/0x2f4
 __writeback_single_inode+0x44/0x4ac
 writeback_sb_inodes+0x30c/0x538
 wb_writeback+0xf4/0x440
 wb_workfn+0x128/0x5d4
 process_scheduled_works+0x1c4/0x45c
 worker_thread+0x32c/0x3e8
 kthread+0x11c/0x1b0
 ret_from_fork+0x10/0x20
Kernel panic - not syncing: kernel: panic_on_warn set ...
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40196/">CVE-2025-40196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40196">CVE-2025-40196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253624">SUSE bug 1253624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40197</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40197" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40197" ref_url="https://www.suse.com/security/cve/CVE-2025-40197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mc: Clear minor number before put device

The device minor should not be cleared after the device is released.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40197/">CVE-2025-40197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40197">CVE-2025-40197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253450">SUSE bug 1253450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40198</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40198" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40198" ref_url="https://www.suse.com/security/cve/CVE-2025-40198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()

Unlike other strings in the ext4 superblock, we rely on tune2fs to
make sure s_mount_opts is NUL terminated.  Harden
parse_apply_sb_mount_options() by treating s_mount_opts as a potential
__nonstring.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40198/">CVE-2025-40198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40198">CVE-2025-40198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253453">SUSE bug 1253453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40200</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40200" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40200" ref_url="https://www.suse.com/security/cve/CVE-2025-40200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Squashfs: reject negative file sizes in squashfs_read_inode()

Syskaller reports a "WARNING in ovl_copy_up_file" in overlayfs.

This warning is ultimately caused because the underlying Squashfs file
system returns a file with a negative file size.

This commit checks for a negative file size and returns EINVAL.

[phillip@squashfs.org.uk: only need to check 64 bit quantity]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40200/">CVE-2025-40200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40200">CVE-2025-40200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253448">SUSE bug 1253448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40201</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40201" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40201" ref_url="https://www.suse.com/security/cve/CVE-2025-40201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kernel/sys.c: fix the racy usage of task_lock(tsk-&gt;group_leader) in sys_prlimit64() paths

The usage of task_lock(tsk-&gt;group_leader) in sys_prlimit64()-&gt;do_prlimit()
path is very broken.

sys_prlimit64() does get_task_struct(tsk) but this only protects task_struct
itself. If tsk != current and tsk is not a leader, this process can exit/exec
and task_lock(tsk-&gt;group_leader) may use the already freed task_struct.

Another problem is that sys_prlimit64() can race with mt-exec which changes
-&gt;group_leader. In this case do_prlimit() may take the wrong lock, or (worse)
-&gt;group_leader may change between task_lock() and task_unlock().

Change sys_prlimit64() to take tasklist_lock when necessary. This is not
nice, but I don't see a better fix for -stable.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40201/">CVE-2025-40201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40201">CVE-2025-40201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253455">SUSE bug 1253455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40202</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40202" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40202" ref_url="https://www.suse.com/security/cve/CVE-2025-40202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipmi: Rework user message limit handling

The limit on the number of user messages had a number of issues,
improper counting in some cases and a use after free.

Restructure how this is all done to handle more in the receive message
allocation routine, so all refcouting and user message limit counts
are done in that routine.  It's a lot cleaner and safer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40202/">CVE-2025-40202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40202">CVE-2025-40202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253451">SUSE bug 1253451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40203</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40203" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40203" ref_url="https://www.suse.com/security/cve/CVE-2025-40203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

listmount: don't call path_put() under namespace semaphore

Massage listmount() and make sure we don't call path_put() under the
namespace semaphore. If we put the last reference we're fscked.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40203/">CVE-2025-40203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40203">CVE-2025-40203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253457">SUSE bug 1253457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40204</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40204" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40204" ref_url="https://www.suse.com/security/cve/CVE-2025-40204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: Fix MAC comparison to be constant-time

To prevent timing attacks, MACs need to be compared in constant time.
Use the appropriate helper function for this.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40204/">CVE-2025-40204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40204">CVE-2025-40204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253436">SUSE bug 1253436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253437">SUSE bug 1253437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040506" comment="kernel-livepatch-6_12_0-160000_5-default-5-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040513" comment="kernel-livepatch-6_12_0-160000_5-rt-4-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041338" comment="kernel-livepatch-6_12_0-160000_6-default-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040051" comment="kernel-livepatch-6_12_0-160000_6-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40205</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40205" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40205" ref_url="https://www.suse.com/security/cve/CVE-2025-40205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: avoid potential out-of-bounds in btrfs_encode_fh()

The function btrfs_encode_fh() does not properly account for the three
cases it handles.

Before writing to the file handle (fh), the function only returns to the
user BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or
BTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).

However, when a parent exists and the root ID of the parent and the
inode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT
(10 dwords, 40 bytes).

If *max_len is not large enough, this write goes out of bounds because
BTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than
BTRFS_FID_SIZE_CONNECTABLE originally returned.

This results in an 8-byte out-of-bounds write at
fid-&gt;parent_root_objectid = parent_root_id.

A previous attempt to fix this issue was made but was lost.

https://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/

Although this issue does not seem to be easily triggerable, it is a
potential memory corruption bug that should be fixed. This patch
resolves the issue by ensuring the function returns the appropriate size
for all three cases and validates that *max_len is large enough before
writing any data.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40205/">CVE-2025-40205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40205">CVE-2025-40205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253456">SUSE bug 1253456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40206</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40206" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40206" ref_url="https://www.suse.com/security/cve/CVE-2025-40206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_objref: validate objref and objrefmap expressions

Referencing a synproxy stateful object from OUTPUT hook causes kernel
crash due to infinite recursive calls:

BUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)
[...]
Call Trace:
 __find_rr_leaf+0x99/0x230
 fib6_table_lookup+0x13b/0x2d0
 ip6_pol_route+0xa4/0x400
 fib6_rule_lookup+0x156/0x240
 ip6_route_output_flags+0xc6/0x150
 __nf_ip6_route+0x23/0x50
 synproxy_send_tcp_ipv6+0x106/0x200
 synproxy_send_client_synack_ipv6+0x1aa/0x1f0
 nft_synproxy_do_eval+0x263/0x310
 nft_do_chain+0x5a8/0x5f0 [nf_tables
 nft_do_chain_inet+0x98/0x110
 nf_hook_slow+0x43/0xc0
 __ip6_local_out+0xf0/0x170
 ip6_local_out+0x17/0x70
 synproxy_send_tcp_ipv6+0x1a2/0x200
 synproxy_send_client_synack_ipv6+0x1aa/0x1f0
[...]

Implement objref and objrefmap expression validate functions.

Currently, only NFT_OBJECT_SYNPROXY object type requires validation.
This will also handle a jump to a chain using a synproxy object from the
OUTPUT hook.

Now when trying to reference a synproxy object in the OUTPUT hook, nft
will produce the following error:

synproxy_crash.nft: Error: Could not process rule: Operation not supported
  synproxy name mysynproxy
  ^^^^^^^^^^^^^^^^^^^^^^^^
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40206/">CVE-2025-40206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40206">CVE-2025-40206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253393">SUSE bug 1253393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40207</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40207" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40207" ref_url="https://www.suse.com/security/cve/CVE-2025-40207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()

v4l2_subdev_call_state_try() macro allocates a subdev state with
__v4l2_subdev_state_alloc(), but does not check the returned value. If
__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would
cause v4l2_subdev_call_state_try() to crash.

Add proper error handling to v4l2_subdev_call_state_try().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40207/">CVE-2025-40207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40207">CVE-2025-40207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253395">SUSE bug 1253395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010036935" comment="kernel-default-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037015" comment="kernel-rt-livepatch-6.12.0-160000.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40209</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40209" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40209" ref_url="https://www.suse.com/security/cve/CVE-2025-40209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix memory leak of qgroup_list in btrfs_add_qgroup_relation

When btrfs_add_qgroup_relation() is called with invalid qgroup levels
(src &gt;= dst), the function returns -EINVAL directly without freeing the
preallocated qgroup_list structure passed by the caller. This causes a
memory leak because the caller unconditionally sets the pointer to NULL
after the call, preventing any cleanup.

The issue occurs because the level validation check happens before the
mutex is acquired and before any error handling path that would free
the prealloc pointer. On this early return, the cleanup code at the
'out' label (which includes kfree(prealloc)) is never reached.

In btrfs_ioctl_qgroup_assign(), the code pattern is:

    prealloc = kzalloc(sizeof(*prealloc), GFP_KERNEL);
    ret = btrfs_add_qgroup_relation(trans, sa-&gt;src, sa-&gt;dst, prealloc);
    prealloc = NULL;  // Always set to NULL regardless of return value
    ...
    kfree(prealloc);  // This becomes kfree(NULL), does nothing

When the level check fails, 'prealloc' is never freed by either the
callee or the caller, resulting in a 64-byte memory leak per failed
operation. This can be triggered repeatedly by an unprivileged user
with access to a writable btrfs mount, potentially exhausting kernel
memory.

Fix this by freeing prealloc before the early return, ensuring prealloc
is always freed on all error paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40209/">CVE-2025-40209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40209">CVE-2025-40209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254128">SUSE bug 1254128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40211</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40211" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40211" ref_url="https://www.suse.com/security/cve/CVE-2025-40211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: video: Fix use-after-free in acpi_video_switch_brightness()

The switch_brightness_work delayed work accesses device-&gt;brightness
and device-&gt;backlight, freed by acpi_video_dev_unregister_backlight()
during device removal.

If the work executes after acpi_video_bus_unregister_backlight()
frees these resources, it causes a use-after-free when
acpi_video_switch_brightness() dereferences device-&gt;brightness or
device-&gt;backlight.

Fix this by calling cancel_delayed_work_sync() for each device's
switch_brightness_work in acpi_video_bus_remove_notify_handler()
after removing the notify handler that queues the work. This ensures
the work completes before the memory is freed.

[ rjw: Changelog edit ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40211/">CVE-2025-40211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40211">CVE-2025-40211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254126">SUSE bug 1254126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40212</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40212" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40212" ref_url="https://www.suse.com/security/cve/CVE-2025-40212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix refcount leak in nfsd_set_fh_dentry()

nfsd exports a "pseudo root filesystem" which is used by NFSv4 to find
the various exported filesystems using LOOKUP requests from a known root
filehandle.  NFSv3 uses the MOUNT protocol to find those exported
filesystems and so is not given access to the pseudo root filesystem.

If a v3 (or v2) client uses a filehandle from that filesystem,
nfsd_set_fh_dentry() will report an error, but still stores the export
in "struct svc_fh" even though it also drops the reference (exp_put()).
This means that when fh_put() is called an extra reference will be dropped
which can lead to use-after-free and possible denial of service.

Normal NFS usage will not provide a pseudo-root filehandle to a v3
client.  This bug can only be triggered by the client synthesising an
incorrect filehandle.

To fix this we move the assignments to the svc_fh later, after all
possible error cases have been detected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40212/">CVE-2025-40212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40212">CVE-2025-40212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254195">SUSE bug 1254195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254196">SUSE bug 1254196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040506" comment="kernel-livepatch-6_12_0-160000_5-default-5-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040513" comment="kernel-livepatch-6_12_0-160000_5-rt-4-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041338" comment="kernel-livepatch-6_12_0-160000_6-default-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040051" comment="kernel-livepatch-6_12_0-160000_6-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039724" comment="kernel-livepatch-6_12_0-160000_7-default-2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040024" comment="kernel-livepatch-6_12_0-160000_7-rt-2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40213</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40213" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40213" ref_url="https://www.suse.com/security/cve/CVE-2025-40213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete

There is a BUG: KASAN: stack-out-of-bounds in set_mesh_sync due to
memcpy from badly declared on-stack flexible array.

Another crash is in set_mesh_complete() due to double list_del via
mgmt_pending_valid + mgmt_pending_remove.

Use DEFINE_FLEX to declare the flexible array right, and don't memcpy
outside bounds.

As mgmt_pending_valid removes the cmd from list, use mgmt_pending_free,
and also report status on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40213/">CVE-2025-40213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40213">CVE-2025-40213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253674">SUSE bug 1253674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40214</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40214" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40214" ref_url="https://www.suse.com/security/cve/CVE-2025-40214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Initialise scc_index in unix_add_edge().

Quang Le reported that the AF_UNIX GC could garbage-collect a
receive queue of an alive in-flight socket, with a nice repro.

The repro consists of three stages.

  1)
    1-a. Create a single cyclic reference with many sockets
    1-b. close() all sockets
    1-c. Trigger GC

  2)
    2-a. Pass sk-A to an embryo sk-B
    2-b. Pass sk-X to sk-X
    2-c. Trigger GC

  3)
    3-a. accept() the embryo sk-B
    3-b. Pass sk-B to sk-C
    3-c. close() the in-flight sk-A
    3-d. Trigger GC

As of 2-c, sk-A and sk-X are linked to unix_unvisited_vertices,
and unix_walk_scc() groups them into two different SCCs:

  unix_sk(sk-A)-&gt;vertex-&gt;scc_index = 2 (UNIX_VERTEX_INDEX_START)
  unix_sk(sk-X)-&gt;vertex-&gt;scc_index = 3

Once GC completes, unix_graph_grouped is set to true.
Also, unix_graph_maybe_cyclic is set to true due to sk-X's
cyclic self-reference, which makes close() trigger GC.

At 3-b, unix_add_edge() allocates unix_sk(sk-B)-&gt;vertex and
links it to unix_unvisited_vertices.

unix_update_graph() is called at 3-a. and 3-b., but neither
unix_graph_grouped nor unix_graph_maybe_cyclic is changed
because both sk-B's listener and sk-C are not in-flight.

3-c decrements sk-A's file refcnt to 1.

Since unix_graph_grouped is true at 3-d, unix_walk_scc_fast()
is finally called and iterates 3 sockets sk-A, sk-B, and sk-X:

  sk-A -&gt; sk-B (-&gt; sk-C)
  sk-X -&gt; sk-X

This is totally fine.  All of them are not yet close()d and
should be grouped into different SCCs.

However, unix_vertex_dead() misjudges that sk-A and sk-B are
in the same SCC and sk-A is dead.

  unix_sk(sk-A)-&gt;scc_index == unix_sk(sk-B)-&gt;scc_index &lt;-- Wrong!
  &amp;&amp;
  sk-A's file refcnt == unix_sk(sk-A)-&gt;vertex-&gt;out_degree
                                       ^-- 1 in-flight count for sk-B
  -&gt; sk-A is dead !?

The problem is that unix_add_edge() does not initialise scc_index.

Stage 1) is used for heap spraying, making a newly allocated
vertex have vertex-&gt;scc_index == 2 (UNIX_VERTEX_INDEX_START)
set by unix_walk_scc() at 1-c.

Let's track the max SCC index from the previous unix_walk_scc()
call and assign the max + 1 to a new vertex's scc_index.

This way, we can continue to avoid Tarjan's algorithm while
preventing misjudgments.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40214/">CVE-2025-40214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40214">CVE-2025-40214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254961">SUSE bug 1254961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255052">SUSE bug 1255052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052000" comment="kernel-livepatch-6_12_0-160000_5-default-8-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051986" comment="kernel-livepatch-6_12_0-160000_5-rt-6-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052001" comment="kernel-livepatch-6_12_0-160000_6-default-6-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051990" comment="kernel-livepatch-6_12_0-160000_6-rt-5-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052002" comment="kernel-livepatch-6_12_0-160000_7-default-4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051985" comment="kernel-livepatch-6_12_0-160000_7-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051998" comment="kernel-livepatch-6_12_0-160000_8-default-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051984" comment="kernel-livepatch-6_12_0-160000_8-rt-2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40215</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40215" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40215" ref_url="https://www.suse.com/security/cve/CVE-2025-40215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: delete x-&gt;tunnel as we delete x

The ipcomp fallback tunnels currently get deleted (from the various
lists and hashtables) as the last user state that needed that fallback
is destroyed (not deleted). If a reference to that user state still
exists, the fallback state will remain on the hashtables/lists,
triggering the WARN in xfrm_state_fini. Because of those remaining
references, the fix in commit f75a2804da39 ("xfrm: destroy xfrm_state
synchronously on net exit path") is not complete.

We recently fixed one such situation in TCP due to defered freeing of
skbs (commit 9b6412e6979f ("tcp: drop secpath at the same time as we
currently drop dst")). This can also happen due to IP reassembly: skbs
with a secpath remain on the reassembly queue until netns
destruction. If we can't guarantee that the queues are flushed by the
time xfrm_state_fini runs, there may still be references to a (user)
xfrm_state, preventing the timely deletion of the corresponding
fallback state.

Instead of chasing each instance of skbs holding a secpath one by one,
this patch fixes the issue directly within xfrm, by deleting the
fallback state as soon as the last user state depending on it has been
deleted. Destruction will still happen when the final reference is
dropped.

A separate lockdep class for the fallback state is required since
we're going to lock x-&gt;tunnel while x is locked.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40215/">CVE-2025-40215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40215">CVE-2025-40215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254959">SUSE bug 1254959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255054">SUSE bug 1255054</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40218</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40218" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40218" ref_url="https://www.suse.com/security/cve/CVE-2025-40218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/vaddr: do not repeat pte_offset_map_lock() until success

DAMON's virtual address space operation set implementation (vaddr) calls
pte_offset_map_lock() inside the page table walk callback function.  This
is for reading and writing page table accessed bits.  If
pte_offset_map_lock() fails, it retries by returning the page table walk
callback function with ACTION_AGAIN.

pte_offset_map_lock() can continuously fail if the target is a pmd
migration entry, though.  Hence it could cause an infinite page table walk
if the migration cannot be done until the page table walk is finished. 
This indeed caused a soft lockup when CPU hotplugging and DAMON were
running in parallel.

Avoid the infinite loop by simply not retrying the page table walk.  DAMON
is promising only a best-effort accuracy, so missing access to such pages
is no problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40218/">CVE-2025-40218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40218">CVE-2025-40218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254964">SUSE bug 1254964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40219</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40219" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40219" ref_url="https://www.suse.com/security/cve/CVE-2025-40219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI/IOV: Fix race between SR-IOV enable/disable and hotplug

Commit 05703271c3cd ("PCI/IOV: Add PCI rescan-remove locking when
enabling/disabling SR-IOV") tried to fix a race between the VF removal
inside sriov_del_vfs() and concurrent hot unplug by taking the PCI
rescan/remove lock in sriov_del_vfs(). Similarly the PCI rescan/remove lock
was also taken in sriov_add_vfs() to protect addition of VFs.

This approach however causes deadlock on trying to remove PFs with SR-IOV
enabled because PFs disable SR-IOV during removal and this removal happens
under the PCI rescan/remove lock. So the original fix had to be reverted.

Instead of taking the PCI rescan/remove lock in sriov_add_vfs() and
sriov_del_vfs(), fix the race that occurs with SR-IOV enable and disable vs
hotplug higher up in the callchain by taking the lock in
sriov_numvfs_store() before calling into the driver's sriov_configure()
callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40219/">CVE-2025-40219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40219">CVE-2025-40219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254518">SUSE bug 1254518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40220</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40220" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40220" ref_url="https://www.suse.com/security/cve/CVE-2025-40220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fuse: fix livelock in synchronous file put from fuseblk workers

I observed a hang when running generic/323 against a fuseblk server.
This test opens a file, initiates a lot of AIO writes to that file
descriptor, and closes the file descriptor before the writes complete.
Unsurprisingly, the AIO exerciser threads are mostly stuck waiting for
responses from the fuseblk server:

# cat /proc/372265/task/372313/stack
[&lt;0&gt;] request_wait_answer+0x1fe/0x2a0 [fuse]
[&lt;0&gt;] __fuse_simple_request+0xd3/0x2b0 [fuse]
[&lt;0&gt;] fuse_do_getattr+0xfc/0x1f0 [fuse]
[&lt;0&gt;] fuse_file_read_iter+0xbe/0x1c0 [fuse]
[&lt;0&gt;] aio_read+0x130/0x1e0
[&lt;0&gt;] io_submit_one+0x542/0x860
[&lt;0&gt;] __x64_sys_io_submit+0x98/0x1a0
[&lt;0&gt;] do_syscall_64+0x37/0xf0
[&lt;0&gt;] entry_SYSCALL_64_after_hwframe+0x4b/0x53

But the /weird/ part is that the fuseblk server threads are waiting for
responses from itself:

# cat /proc/372210/task/372232/stack
[&lt;0&gt;] request_wait_answer+0x1fe/0x2a0 [fuse]
[&lt;0&gt;] __fuse_simple_request+0xd3/0x2b0 [fuse]
[&lt;0&gt;] fuse_file_put+0x9a/0xd0 [fuse]
[&lt;0&gt;] fuse_release+0x36/0x50 [fuse]
[&lt;0&gt;] __fput+0xec/0x2b0
[&lt;0&gt;] task_work_run+0x55/0x90
[&lt;0&gt;] syscall_exit_to_user_mode+0xe9/0x100
[&lt;0&gt;] do_syscall_64+0x43/0xf0
[&lt;0&gt;] entry_SYSCALL_64_after_hwframe+0x4b/0x53

The fuseblk server is fuse2fs so there's nothing all that exciting in
the server itself.  So why is the fuse server calling fuse_file_put?
The commit message for the fstest sheds some light on that:

"By closing the file descriptor before calling io_destroy, you pretty
much guarantee that the last put on the ioctx will be done in interrupt
context (during I/O completion).

Aha.  AIO fgets a new struct file from the fd when it queues the ioctx.
The completion of the FUSE_WRITE command from userspace causes the fuse
server to call the AIO completion function.  The completion puts the
struct file, queuing a delayed fput to the fuse server task.  When the
fuse server task returns to userspace, it has to run the delayed fput,
which in the case of a fuseblk server, it does synchronously.

Sending the FUSE_RELEASE command sychronously from fuse server threads
is a bad idea because a client program can initiate enough simultaneous
AIOs such that all the fuse server threads end up in delayed_fput, and
now there aren't any threads left to handle the queued fuse commands.

Fix this by only using asynchronous fputs when closing files, and leave
a comment explaining why.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40220/">CVE-2025-40220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40220">CVE-2025-40220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254520">SUSE bug 1254520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40221</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40221" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40221" ref_url="https://www.suse.com/security/cve/CVE-2025-40221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: pci: mg4b: fix uninitialized iio scan data

Fix potential leak of uninitialized stack data to userspace by ensuring
that the `scan` structure is zeroed before use.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40221/">CVE-2025-40221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40221">CVE-2025-40221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254519">SUSE bug 1254519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40223</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40223" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40223" ref_url="https://www.suse.com/security/cve/CVE-2025-40223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

most: usb: Fix use-after-free in hdm_disconnect

hdm_disconnect() calls most_deregister_interface(), which eventually
unregisters the MOST interface device with device_unregister(iface-&gt;dev).
If that drops the last reference, the device core may call release_mdev()
immediately while hdm_disconnect() is still executing.

The old code also freed several mdev-owned allocations in
hdm_disconnect() and then performed additional put_device() calls.
Depending on refcount order, this could lead to use-after-free or
double-free when release_mdev() ran (or when unregister paths also
performed puts).

Fix by moving the frees of mdev-owned allocations into release_mdev(),
so they happen exactly once when the device is truly released, and by
dropping the extra put_device() calls in hdm_disconnect() that are
redundant after device_unregister() and most_deregister_interface().

This addresses the KASAN slab-use-after-free reported by syzbot in
hdm_disconnect(). See report and stack traces in the bug link below.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40223/">CVE-2025-40223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40223">CVE-2025-40223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254957">SUSE bug 1254957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40225</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40225" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40225" ref_url="https://www.suse.com/security/cve/CVE-2025-40225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panthor: Fix kernel panic on partial unmap of a GPU VA region

This commit address a kernel panic issue that can happen if Userspace
tries to partially unmap a GPU virtual region (aka drm_gpuva).
The VM_BIND interface allows partial unmapping of a BO.

Panthor driver pre-allocates memory for the new drm_gpuva structures
that would be needed for the map/unmap operation, done using drm_gpuvm
layer. It expected that only one new drm_gpuva would be needed on umap
but a partial unmap can require 2 new drm_gpuva and that's why it
ended up doing a NULL pointer dereference causing a kernel panic.

Following dump was seen when partial unmap was exercised.
 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000078
 Mem abort info:
   ESR = 0x0000000096000046
   EC = 0x25: DABT (current EL), IL = 32 bits
   SET = 0, FnV = 0
   EA = 0, S1PTW = 0
   FSC = 0x06: level 2 translation fault
 Data abort info:
   ISV = 0, ISS = 0x00000046, ISS2 = 0x00000000
   CM = 0, WnR = 1, TnD = 0, TagAccess = 0
   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
 user pgtable: 4k pages, 48-bit VAs, pgdp=000000088a863000
 [000000000000078] pgd=080000088a842003, p4d=080000088a842003, pud=0800000884bf5003, pmd=0000000000000000
 Internal error: Oops: 0000000096000046 [#1] PREEMPT SMP
 &lt;snip&gt;
 pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : panthor_gpuva_sm_step_remap+0xe4/0x330 [panthor]
 lr : panthor_gpuva_sm_step_remap+0x6c/0x330 [panthor]
 sp : ffff800085d43970
 x29: ffff800085d43970 x28: ffff00080363e440 x27: ffff0008090c6000
 x26: 0000000000000030 x25: ffff800085d439f8 x24: ffff00080d402000
 x23: ffff800085d43b60 x22: ffff800085d439e0 x21: ffff00080abdb180
 x20: 0000000000000000 x19: 0000000000000000 x18: 0000000000000010
 x17: 6e656c202c303030 x16: 3666666666646466 x15: 393d61766f69202c
 x14: 312d3d7361203a70 x13: 303030323d6e656c x12: ffff80008324bf58
 x11: 0000000000000003 x10: 0000000000000002 x9 : ffff8000801a6a9c
 x8 : ffff00080360b300 x7 : 0000000000000000 x6 : 000000088aa35fc7
 x5 : fff1000080000000 x4 : ffff8000842ddd30 x3 : 0000000000000001
 x2 : 0000000100000000 x1 : 0000000000000001 x0 : 0000000000000078
 Call trace:
  panthor_gpuva_sm_step_remap+0xe4/0x330 [panthor]
  op_remap_cb.isra.22+0x50/0x80
  __drm_gpuvm_sm_unmap+0x10c/0x1c8
  drm_gpuvm_sm_unmap+0x40/0x60
  panthor_vm_exec_op+0xb4/0x3d0 [panthor]
  panthor_vm_bind_exec_sync_op+0x154/0x278 [panthor]
  panthor_ioctl_vm_bind+0x160/0x4a0 [panthor]
  drm_ioctl_kernel+0xbc/0x138
  drm_ioctl+0x240/0x500
  __arm64_sys_ioctl+0xb0/0xf8
  invoke_syscall+0x4c/0x110
  el0_svc_common.constprop.1+0x98/0xf8
  do_el0_svc+0x24/0x38
  el0_svc+0x40/0xf8
  el0t_64_sync_handler+0xa0/0xc8
  el0t_64_sync+0x174/0x178
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40225/">CVE-2025-40225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40225">CVE-2025-40225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254827">SUSE bug 1254827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40226</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40226" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40226" ref_url="https://www.suse.com/security/cve/CVE-2025-40226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scmi: Account for failed debug initialization

When the SCMI debug subsystem fails to initialize, the related debug root
will be missing, and the underlying descriptor will be NULL.

Handle this fault condition in the SCMI debug helpers that maintain
metrics counters.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40226/">CVE-2025-40226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40226">CVE-2025-40226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254821">SUSE bug 1254821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40230</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40230" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40230" ref_url="https://www.suse.com/security/cve/CVE-2025-40230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: prevent poison consumption when splitting THP

When performing memory error injection on a THP (Transparent Huge Page)
mapped to userspace on an x86 server, the kernel panics with the following
trace.  The expected behavior is to terminate the affected process instead
of panicking the kernel, as the x86 Machine Check code can recover from an
in-userspace #MC.

  mce: [Hardware Error]: CPU 0: Machine Check Exception: f Bank 3: bd80000000070134
  mce: [Hardware Error]: RIP 10:&lt;ffffffff8372f8bc&gt; {memchr_inv+0x4c/0xf0}
  mce: [Hardware Error]: TSC afff7bbff88a ADDR 1d301b000 MISC 80 PPIN 1e741e77539027db
  mce: [Hardware Error]: PROCESSOR 0:d06d0 TIME 1758093249 SOCKET 0 APIC 0 microcode 80000320
  mce: [Hardware Error]: Run the above through 'mcelog --ascii'
  mce: [Hardware Error]: Machine check: Data load in unrecoverable area of kernel
  Kernel panic - not syncing: Fatal local machine check

The root cause of this panic is that handling a memory failure triggered
by an in-userspace #MC necessitates splitting the THP.  The splitting
process employs a mechanism, implemented in
try_to_map_unused_to_zeropage(), which reads the pages in the THP to
identify zero-filled pages.  However, reading the pages in the THP results
in a second in-kernel #MC, occurring before the initial memory_failure()
completes, ultimately leading to a kernel panic.  See the kernel panic
call trace on the two #MCs.

  First Machine Check occurs // [1]
    memory_failure()         // [2]
      try_to_split_thp_page()
        split_huge_page()
          split_huge_page_to_list_to_order()
            __folio_split()  // [3]
              remap_page()
                remove_migration_ptes()
                  remove_migration_pte()
                    try_to_map_unused_to_zeropage()  // [4]
                      memchr_inv()                   // [5]
                        Second Machine Check occurs  // [6]
                          Kernel panic

[1] Triggered by accessing a hardware-poisoned THP in userspace, which is
    typically recoverable by terminating the affected process.

[2] Call folio_set_has_hwpoisoned() before try_to_split_thp_page().

[3] Pass the RMP_USE_SHARED_ZEROPAGE remap flag to remap_page().

[4] Try to map the unused THP to zeropage.

[5] Re-access pages in the hw-poisoned THP in the kernel.

[6] Triggered in-kernel, leading to a panic kernel.

In Step[2], memory_failure() sets the poisoned flag on the page in the THP
by TestSetPageHWPoison() before calling try_to_split_thp_page().

As suggested by David Hildenbrand, fix this panic by not accessing to the
poisoned page in the THP during zeropage identification, while continuing
to scan unaffected pages in the THP for possible zeropage mapping.  This
prevents a second in-kernel #MC that would cause kernel panic in Step[4].

Thanks to Andrew Zaborowski for his initial work on fixing this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40230/">CVE-2025-40230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40230">CVE-2025-40230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254817">SUSE bug 1254817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40231</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40231" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40231" ref_url="https://www.suse.com/security/cve/CVE-2025-40231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: fix lock inversion in vsock_assign_transport()

Syzbot reported a potential lock inversion deadlock between
vsock_register_mutex and sk_lock-AF_VSOCK when vsock_linger() is called.

The issue was introduced by commit 687aa0c5581b ("vsock: Fix
transport_* TOCTOU") which added vsock_register_mutex locking in
vsock_assign_transport() around the transport-&gt;release() call, that can
call vsock_linger(). vsock_assign_transport() can be called with sk_lock
held. vsock_linger() calls sk_wait_event() that temporarily releases and
re-acquires sk_lock. During this window, if another thread hold
vsock_register_mutex while trying to acquire sk_lock, a circular
dependency is created.

Fix this by releasing vsock_register_mutex before calling
transport-&gt;release() and vsock_deassign_transport(). This is safe
because we don't need to hold vsock_register_mutex while releasing the
old transport, and we ensure the new transport won't disappear by
obtaining a module reference first via try_module_get().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40231/">CVE-2025-40231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40231">CVE-2025-40231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254815">SUSE bug 1254815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40233</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40233" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40233" ref_url="https://www.suse.com/security/cve/CVE-2025-40233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: clear extent cache after moving/defragmenting extents

The extent map cache can become stale when extents are moved or
defragmented, causing subsequent operations to see outdated extent flags. 
This triggers a BUG_ON in ocfs2_refcount_cal_cow_clusters().

The problem occurs when:
1. copy_file_range() creates a reflinked extent with OCFS2_EXT_REFCOUNTED
2. ioctl(FITRIM) triggers ocfs2_move_extents()
3. __ocfs2_move_extents_range() reads and caches the extent (flags=0x2)
4. ocfs2_move_extent()/ocfs2_defrag_extent() calls __ocfs2_move_extent()
   which clears OCFS2_EXT_REFCOUNTED flag on disk (flags=0x0)
5. The extent map cache is not invalidated after the move
6. Later write() operations read stale cached flags (0x2) but disk has
   updated flags (0x0), causing a mismatch
7. BUG_ON(!(rec-&gt;e_flags &amp; OCFS2_EXT_REFCOUNTED)) triggers

Fix by clearing the extent map cache after each extent move/defrag
operation in __ocfs2_move_extents_range().  This ensures subsequent
operations read fresh extent data from disk.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40233/">CVE-2025-40233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40233">CVE-2025-40233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254813">SUSE bug 1254813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40235</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40235" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40235" ref_url="https://www.suse.com/security/cve/CVE-2025-40235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: directly free partially initialized fs_info in btrfs_check_leaked_roots()

If fs_info-&gt;super_copy or fs_info-&gt;super_for_commit allocated failed in
btrfs_get_tree_subvol(), then no need to call btrfs_free_fs_info().
Otherwise btrfs_check_leaked_roots() would access NULL pointer because
fs_info-&gt;allocated_roots had not been initialised.

syzkaller reported the following information:
  ------------[ cut here ]------------
  BUG: unable to handle page fault for address: fffffffffffffbb0
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 64c9067 P4D 64c9067 PUD 64cb067 PMD 0
  Oops: Oops: 0000 [#1] SMP KASAN PTI
  CPU: 0 UID: 0 PID: 1402 Comm: syz.1.35 Not tainted 6.15.8 #4 PREEMPT(lazy)
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), (...)
  RIP: 0010:arch_atomic_read arch/x86/include/asm/atomic.h:23 [inline]
  RIP: 0010:raw_atomic_read include/linux/atomic/atomic-arch-fallback.h:457 [inline]
  RIP: 0010:atomic_read include/linux/atomic/atomic-instrumented.h:33 [inline]
  RIP: 0010:refcount_read include/linux/refcount.h:170 [inline]
  RIP: 0010:btrfs_check_leaked_roots+0x18f/0x2c0 fs/btrfs/disk-io.c:1230
  [...]
  Call Trace:
   &lt;TASK&gt;
   btrfs_free_fs_info+0x310/0x410 fs/btrfs/disk-io.c:1280
   btrfs_get_tree_subvol+0x592/0x6b0 fs/btrfs/super.c:2029
   btrfs_get_tree+0x63/0x80 fs/btrfs/super.c:2097
   vfs_get_tree+0x98/0x320 fs/super.c:1759
   do_new_mount+0x357/0x660 fs/namespace.c:3899
   path_mount+0x716/0x19c0 fs/namespace.c:4226
   do_mount fs/namespace.c:4239 [inline]
   __do_sys_mount fs/namespace.c:4450 [inline]
   __se_sys_mount fs/namespace.c:4427 [inline]
   __x64_sys_mount+0x28c/0x310 fs/namespace.c:4427
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0x92/0x180 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
  RIP: 0033:0x7f032eaffa8d
  [...]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40235/">CVE-2025-40235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40235">CVE-2025-40235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254808">SUSE bug 1254808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40237</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40237" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40237" ref_url="https://www.suse.com/security/cve/CVE-2025-40237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/notify: call exportfs_encode_fid with s_umount

Calling intotify_show_fdinfo() on fd watching an overlayfs inode, while
the overlayfs is being unmounted, can lead to dereferencing NULL ptr.

This issue was found by syzkaller.

Race Condition Diagram:

Thread 1                           Thread 2
--------                           --------

generic_shutdown_super()
 shrink_dcache_for_umount
  sb-&gt;s_root = NULL

                    |
                    |             vfs_read()
                    |              inotify_fdinfo()
                    |               * inode get from mark *
                    |               show_mark_fhandle(m, inode)
                    |                exportfs_encode_fid(inode, ..)
                    |                 ovl_encode_fh(inode, ..)
                    |                  ovl_check_encode_origin(inode)
                    |                   * deref i_sb-&gt;s_root *
                    |
                    |
                    v
 fsnotify_sb_delete(sb)

Which then leads to:

[   32.133461] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI
[   32.134438] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
[   32.135032] CPU: 1 UID: 0 PID: 4468 Comm: systemd-coredum Not tainted 6.17.0-rc6 #22 PREEMPT(none)

&lt;snip registers, unreliable trace&gt;

[   32.143353] Call Trace:
[   32.143732]  ovl_encode_fh+0xd5/0x170
[   32.144031]  exportfs_encode_inode_fh+0x12f/0x300
[   32.144425]  show_mark_fhandle+0xbe/0x1f0
[   32.145805]  inotify_fdinfo+0x226/0x2d0
[   32.146442]  inotify_show_fdinfo+0x1c5/0x350
[   32.147168]  seq_show+0x530/0x6f0
[   32.147449]  seq_read_iter+0x503/0x12a0
[   32.148419]  seq_read+0x31f/0x410
[   32.150714]  vfs_read+0x1f0/0x9e0
[   32.152297]  ksys_read+0x125/0x240

IOW ovl_check_encode_origin derefs inode-&gt;i_sb-&gt;s_root, after it was set
to NULL in the unmount path.

Fix it by protecting calling exportfs_encode_fid() from
show_mark_fhandle() with s_umount lock.

This form of fix was suggested by Amir in [1].

[1]: https://lore.kernel.org/all/CAOQ4uxhbDwhb+2Brs1UdkoF0a3NSdBAOQPNfEHjahrgoKJpLEw@mail.gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40237/">CVE-2025-40237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40237">CVE-2025-40237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254809">SUSE bug 1254809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40238</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40238" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40238" ref_url="https://www.suse.com/security/cve/CVE-2025-40238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix IPsec cleanup over MPV device

When we do mlx5e_detach_netdev() we eventually disable blocking events
notifier, among those events are IPsec MPV events from IB to core.

So before disabling those blocking events, make sure to also unregister
the devcom device and mark all this device operations as complete,
in order to prevent the other device from using invalid netdev
during future devcom events which could cause the trace below.

BUG: kernel NULL pointer dereference, address: 0000000000000010
PGD 146427067 P4D 146427067 PUD 146488067 PMD 0
Oops: Oops: 0000 [#1] SMP
CPU: 1 UID: 0 PID: 7735 Comm: devlink Tainted: GW 6.12.0-rc6_for_upstream_min_debug_2024_11_08_00_46 #1
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:mlx5_devcom_comp_set_ready+0x5/0x40 [mlx5_core]
Code: 00 01 48 83 05 23 32 1e 00 01 41 b8 ed ff ff ff e9 60 ff ff ff 48 83 05 00 32 1e 00 01 eb e3 66 0f 1f 44 00 00 0f 1f 44 00 00 &lt;48&gt; 8b 47 10 48 83 05 5f 32 1e 00 01 48 8b 50 40 48 85 d2 74 05 40
RSP: 0018:ffff88811a5c35f8 EFLAGS: 00010206
RAX: ffff888106e8ab80 RBX: ffff888107d7e200 RCX: ffff88810d6f0a00
RDX: ffff88810d6f0a00 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffff88811a17e620 R08: 0000000000000040 R09: 0000000000000000
R10: ffff88811a5c3618 R11: 0000000de85d51bd R12: ffff88811a17e600
R13: ffff88810d6f0a00 R14: 0000000000000000 R15: ffff8881034bda80
FS:  00007f27bdf89180(0000) GS:ffff88852c880000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000010 CR3: 000000010f159005 CR4: 0000000000372eb0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? __die+0x20/0x60
 ? page_fault_oops+0x150/0x3e0
 ? exc_page_fault+0x74/0x130
 ? asm_exc_page_fault+0x22/0x30
 ? mlx5_devcom_comp_set_ready+0x5/0x40 [mlx5_core]
 mlx5e_devcom_event_mpv+0x42/0x60 [mlx5_core]
 mlx5_devcom_send_event+0x8c/0x170 [mlx5_core]
 blocking_event+0x17b/0x230 [mlx5_core]
 notifier_call_chain+0x35/0xa0
 blocking_notifier_call_chain+0x3d/0x60
 mlx5_blocking_notifier_call_chain+0x22/0x30 [mlx5_core]
 mlx5_core_mp_event_replay+0x12/0x20 [mlx5_core]
 mlx5_ib_bind_slave_port+0x228/0x2c0 [mlx5_ib]
 mlx5_ib_stage_init_init+0x664/0x9d0 [mlx5_ib]
 ? idr_alloc_cyclic+0x50/0xb0
 ? __kmalloc_cache_noprof+0x167/0x340
 ? __kmalloc_noprof+0x1a7/0x430
 __mlx5_ib_add+0x34/0xd0 [mlx5_ib]
 mlx5r_probe+0xe9/0x310 [mlx5_ib]
 ? kernfs_add_one+0x107/0x150
 ? __mlx5_ib_add+0xd0/0xd0 [mlx5_ib]
 auxiliary_bus_probe+0x3e/0x90
 really_probe+0xc5/0x3a0
 ? driver_probe_device+0x90/0x90
 __driver_probe_device+0x80/0x160
 driver_probe_device+0x1e/0x90
 __device_attach_driver+0x7d/0x100
 bus_for_each_drv+0x80/0xd0
 __device_attach+0xbc/0x1f0
 bus_probe_device+0x86/0xa0
 device_add+0x62d/0x830
 __auxiliary_device_add+0x3b/0xa0
 ? auxiliary_device_init+0x41/0x90
 add_adev+0xd1/0x150 [mlx5_core]
 mlx5_rescan_drivers_locked+0x21c/0x300 [mlx5_core]
 esw_mode_change+0x6c/0xc0 [mlx5_core]
 mlx5_devlink_eswitch_mode_set+0x21e/0x640 [mlx5_core]
 devlink_nl_eswitch_set_doit+0x60/0xe0
 genl_family_rcv_msg_doit+0xd0/0x120
 genl_rcv_msg+0x180/0x2b0
 ? devlink_get_from_attrs_lock+0x170/0x170
 ? devlink_nl_eswitch_get_doit+0x290/0x290
 ? devlink_nl_pre_doit_port_optional+0x50/0x50
 ? genl_family_rcv_msg_dumpit+0xf0/0xf0
 netlink_rcv_skb+0x54/0x100
 genl_rcv+0x24/0x40
 netlink_unicast+0x1fc/0x2d0
 netlink_sendmsg+0x1e4/0x410
 __sock_sendmsg+0x38/0x60
 ? sockfd_lookup_light+0x12/0x60
 __sys_sendto+0x105/0x160
 ? __sys_recvmsg+0x4e/0x90
 __x64_sys_sendto+0x20/0x30
 do_syscall_64+0x4c/0x100
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
RIP: 0033:0x7f27bc91b13a
Code: bb 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 8b 05 fa 96 2c 00 45 89 c9 4c 63 d1 48 63 ff 85 c0 75 15 b8 2c 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40238/">CVE-2025-40238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40238">CVE-2025-40238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254871">SUSE bug 1254871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40239</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40239" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40239" ref_url="https://www.suse.com/security/cve/CVE-2025-40239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: micrel: always set shared-&gt;phydev for LAN8814

Currently, during the LAN8814 PTP probe shared-&gt;phydev is only set if PTP
clock gets actually set, otherwise the function will return before setting
it.

This is an issue as shared-&gt;phydev is unconditionally being used when IRQ
is being handled, especially in lan8814_gpio_process_cap and since it was
not set it will cause a NULL pointer exception and crash the kernel.

So, simply always set shared-&gt;phydev to avoid the NULL pointer exception.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40239/">CVE-2025-40239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40239">CVE-2025-40239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254868">SUSE bug 1254868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40240</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40240" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40240" ref_url="https://www.suse.com/security/cve/CVE-2025-40240" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0445" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: avoid NULL dereference when chunk data buffer is missing

chunk-&gt;skb pointer is dereferenced in the if-block where it's supposed
to be NULL only.

chunk-&gt;skb can only be NULL if chunk-&gt;head_skb is not. Check for frag_list
instead and do it just before replacing chunk-&gt;skb. We're sure that
otherwise chunk-&gt;skb is non-NULL because of outer if() condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40240/">CVE-2025-40240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40240">CVE-2025-40240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254869">SUSE bug 1254869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40242</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40242" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40242" ref_url="https://www.suse.com/security/cve/CVE-2025-40242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Fix unlikely race in gdlm_put_lock

In gdlm_put_lock(), there is a small window of time in which the
DFL_UNMOUNT flag has been set but the lockspace hasn't been released,
yet.  In that window, dlm may still call gdlm_ast() and gdlm_bast().
To prevent it from dereferencing freed glock objects, only free the
glock if the lockspace has actually been released.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40242/">CVE-2025-40242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40242">CVE-2025-40242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255075">SUSE bug 1255075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255076">SUSE bug 1255076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40243</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40243" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40243" ref_url="https://www.suse.com/security/cve/CVE-2025-40243" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits()

The syzbot reported issue in hfs_find_set_zero_bits():

=====================================================
BUG: KMSAN: uninit-value in hfs_find_set_zero_bits+0x74d/0xb60 fs/hfs/bitmap.c:45
 hfs_find_set_zero_bits+0x74d/0xb60 fs/hfs/bitmap.c:45
 hfs_vbm_search_free+0x13c/0x5b0 fs/hfs/bitmap.c:151
 hfs_extend_file+0x6a5/0x1b00 fs/hfs/extent.c:408
 hfs_get_block+0x435/0x1150 fs/hfs/extent.c:353
 __block_write_begin_int+0xa76/0x3030 fs/buffer.c:2151
 block_write_begin fs/buffer.c:2262 [inline]
 cont_write_begin+0x10e1/0x1bc0 fs/buffer.c:2601
 hfs_write_begin+0x85/0x130 fs/hfs/inode.c:52
 cont_expand_zero fs/buffer.c:2528 [inline]
 cont_write_begin+0x35a/0x1bc0 fs/buffer.c:2591
 hfs_write_begin+0x85/0x130 fs/hfs/inode.c:52
 hfs_file_truncate+0x1d6/0xe60 fs/hfs/extent.c:494
 hfs_inode_setattr+0x964/0xaa0 fs/hfs/inode.c:654
 notify_change+0x1993/0x1aa0 fs/attr.c:552
 do_truncate+0x28f/0x310 fs/open.c:68
 do_ftruncate+0x698/0x730 fs/open.c:195
 do_sys_ftruncate fs/open.c:210 [inline]
 __do_sys_ftruncate fs/open.c:215 [inline]
 __se_sys_ftruncate fs/open.c:213 [inline]
 __x64_sys_ftruncate+0x11b/0x250 fs/open.c:213
 x64_sys_call+0xfe3/0x3db0 arch/x86/include/generated/asm/syscalls_64.h:78
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
 slab_post_alloc_hook mm/slub.c:4154 [inline]
 slab_alloc_node mm/slub.c:4197 [inline]
 __kmalloc_cache_noprof+0x7f7/0xed0 mm/slub.c:4354
 kmalloc_noprof include/linux/slab.h:905 [inline]
 hfs_mdb_get+0x1cc8/0x2a90 fs/hfs/mdb.c:175
 hfs_fill_super+0x3d0/0xb80 fs/hfs/super.c:337
 get_tree_bdev_flags+0x6e3/0x920 fs/super.c:1681
 get_tree_bdev+0x38/0x50 fs/super.c:1704
 hfs_get_tree+0x35/0x40 fs/hfs/super.c:388
 vfs_get_tree+0xb0/0x5c0 fs/super.c:1804
 do_new_mount+0x738/0x1610 fs/namespace.c:3902
 path_mount+0x6db/0x1e90 fs/namespace.c:4226
 do_mount fs/namespace.c:4239 [inline]
 __do_sys_mount fs/namespace.c:4450 [inline]
 __se_sys_mount+0x6eb/0x7d0 fs/namespace.c:4427
 __x64_sys_mount+0xe4/0x150 fs/namespace.c:4427
 x64_sys_call+0xfa7/0x3db0 arch/x86/include/generated/asm/syscalls_64.h:166
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

CPU: 1 UID: 0 PID: 12609 Comm: syz.1.2692 Not tainted 6.16.0-syzkaller #0 PREEMPT(none)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
=====================================================

The HFS_SB(sb)-&gt;bitmap buffer is allocated in hfs_mdb_get():

HFS_SB(sb)-&gt;bitmap = kmalloc(8192, GFP_KERNEL);

Finally, it can trigger the reported issue because kmalloc()
doesn't clear the allocated memory. If allocated memory contains
only zeros, then everything will work pretty fine.
But if the allocated memory contains the "garbage", then
it can affect the bitmap operations and it triggers
the reported issue.

This patch simply exchanges the kmalloc() on kzalloc()
with the goal to guarantee the correctness of bitmap operations.
Because, newly created allocation bitmap should have all
available blocks free. Potentially, initialization bitmap's read
operation could not fill the whole allocated memory and
"garbage" in the not initialized memory will be the reason of
volume coruptions and file system driver bugs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40243/">CVE-2025-40243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40243">CVE-2025-40243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254981">SUSE bug 1254981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40244</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40244" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40244" ref_url="https://www.suse.com/security/cve/CVE-2025-40244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()

The syzbot reported issue in __hfsplus_ext_cache_extent():

[   70.194323][ T9350] BUG: KMSAN: uninit-value in __hfsplus_ext_cache_extent+0x7d0/0x990
[   70.195022][ T9350]  __hfsplus_ext_cache_extent+0x7d0/0x990
[   70.195530][ T9350]  hfsplus_file_extend+0x74f/0x1cf0
[   70.195998][ T9350]  hfsplus_get_block+0xe16/0x17b0
[   70.196458][ T9350]  __block_write_begin_int+0x962/0x2ce0
[   70.196959][ T9350]  cont_write_begin+0x1000/0x1950
[   70.197416][ T9350]  hfsplus_write_begin+0x85/0x130
[   70.197873][ T9350]  generic_perform_write+0x3e8/0x1060
[   70.198374][ T9350]  __generic_file_write_iter+0x215/0x460
[   70.198892][ T9350]  generic_file_write_iter+0x109/0x5e0
[   70.199393][ T9350]  vfs_write+0xb0f/0x14e0
[   70.199771][ T9350]  ksys_write+0x23e/0x490
[   70.200149][ T9350]  __x64_sys_write+0x97/0xf0
[   70.200570][ T9350]  x64_sys_call+0x3015/0x3cf0
[   70.201065][ T9350]  do_syscall_64+0xd9/0x1d0
[   70.201506][ T9350]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   70.202054][ T9350]
[   70.202279][ T9350] Uninit was created at:
[   70.202693][ T9350]  __kmalloc_noprof+0x621/0xf80
[   70.203149][ T9350]  hfsplus_find_init+0x8d/0x1d0
[   70.203602][ T9350]  hfsplus_file_extend+0x6ca/0x1cf0
[   70.204087][ T9350]  hfsplus_get_block+0xe16/0x17b0
[   70.204561][ T9350]  __block_write_begin_int+0x962/0x2ce0
[   70.205074][ T9350]  cont_write_begin+0x1000/0x1950
[   70.205547][ T9350]  hfsplus_write_begin+0x85/0x130
[   70.206017][ T9350]  generic_perform_write+0x3e8/0x1060
[   70.206519][ T9350]  __generic_file_write_iter+0x215/0x460
[   70.207042][ T9350]  generic_file_write_iter+0x109/0x5e0
[   70.207552][ T9350]  vfs_write+0xb0f/0x14e0
[   70.207961][ T9350]  ksys_write+0x23e/0x490
[   70.208375][ T9350]  __x64_sys_write+0x97/0xf0
[   70.208810][ T9350]  x64_sys_call+0x3015/0x3cf0
[   70.209255][ T9350]  do_syscall_64+0xd9/0x1d0
[   70.209680][ T9350]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   70.210230][ T9350]
[   70.210454][ T9350] CPU: 2 UID: 0 PID: 9350 Comm: repro Not tainted 6.12.0-rc5 #5
[   70.211174][ T9350] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   70.212115][ T9350] =====================================================
[   70.212734][ T9350] Disabling lock debugging due to kernel taint
[   70.213284][ T9350] Kernel panic - not syncing: kmsan.panic set ...
[   70.213858][ T9350] CPU: 2 UID: 0 PID: 9350 Comm: repro Tainted: G    B              6.12.0-rc5 #5
[   70.214679][ T9350] Tainted: [B]=BAD_PAGE
[   70.215057][ T9350] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   70.215999][ T9350] Call Trace:
[   70.216309][ T9350]  &lt;TASK&gt;
[   70.216585][ T9350]  dump_stack_lvl+0x1fd/0x2b0
[   70.217025][ T9350]  dump_stack+0x1e/0x30
[   70.217421][ T9350]  panic+0x502/0xca0
[   70.217803][ T9350]  ? kmsan_get_metadata+0x13e/0x1c0

[   70.218294][ Message fromT sy9350]  kmsan_report+0x296/slogd@syzkaller 0x2aat Aug 18 22:11:058 ...
 kernel
:[   70.213284][ T9350] Kernel panic - not syncing: kmsan.panic [   70.220179][ T9350]  ? kmsan_get_metadata+0x13e/0x1c0
set ...
[   70.221254][ T9350]  ? __msan_warning+0x96/0x120
[   70.222066][ T9350]  ? __hfsplus_ext_cache_extent+0x7d0/0x990
[   70.223023][ T9350]  ? hfsplus_file_extend+0x74f/0x1cf0
[   70.224120][ T9350]  ? hfsplus_get_block+0xe16/0x17b0
[   70.224946][ T9350]  ? __block_write_begin_int+0x962/0x2ce0
[   70.225756][ T9350]  ? cont_write_begin+0x1000/0x1950
[   70.226337][ T9350]  ? hfsplus_write_begin+0x85/0x130
[   70.226852][ T9350]  ? generic_perform_write+0x3e8/0x1060
[   70.227405][ T9350]  ? __generic_file_write_iter+0x215/0x460
[   70.227979][ T9350]  ? generic_file_write_iter+0x109/0x5e0
[   70.228540][ T9350]  ? vfs_write+0xb0f/0x14e0
[   70.228997][ T9350]  ? ksys_write+0x23e/0x490
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40244/">CVE-2025-40244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40244">CVE-2025-40244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255033">SUSE bug 1255033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40245</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40245" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40245" ref_url="https://www.suse.com/security/cve/CVE-2025-40245" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nios2: ensure that memblock.current_limit is set when setting pfn limits

On nios2, with CONFIG_FLATMEM set, the kernel relies on
memblock_get_current_limit() to determine the limits of mem_map, in
particular for max_low_pfn.
Unfortunately, memblock.current_limit is only default initialized to
MEMBLOCK_ALLOC_ANYWHERE at this point of the bootup, potentially leading
to situations where max_low_pfn can erroneously exceed the value of
max_pfn and, thus, the valid range of available DRAM.

This can in turn cause kernel-level paging failures, e.g.:

[   76.900000] Unable to handle kernel paging request at virtual address 20303000
[   76.900000] ea = c0080890, ra = c000462c, cause = 14
[   76.900000] Kernel panic - not syncing: Oops
[   76.900000] ---[ end Kernel panic - not syncing: Oops ]---

This patch fixes this by pre-calculating memblock.current_limit
based on the upper limits of the available memory ranges via
adjust_lowmem_bounds, a simplified version of the equivalent
implementation within the arm architecture.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-23"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40245/">CVE-2025-40245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40245">CVE-2025-40245 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255080">SUSE bug 1255080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40246</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40246" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40246" ref_url="https://www.suse.com/security/cve/CVE-2025-40246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: fix out of bounds memory read error in symlink repair

xfs/286 produced this report on my test fleet:

 ==================================================================
 BUG: KFENCE: out-of-bounds read in memcpy_orig+0x54/0x110

 Out-of-bounds read at 0xffff88843fe9e038 (184B right of kfence-#184):
  memcpy_orig+0x54/0x110
  xrep_symlink_salvage_inline+0xb3/0xf0 [xfs]
  xrep_symlink_salvage+0x100/0x110 [xfs]
  xrep_symlink+0x2e/0x80 [xfs]
  xrep_attempt+0x61/0x1f0 [xfs]
  xfs_scrub_metadata+0x34f/0x5c0 [xfs]
  xfs_ioc_scrubv_metadata+0x387/0x560 [xfs]
  xfs_file_ioctl+0xe23/0x10e0 [xfs]
  __x64_sys_ioctl+0x76/0xc0
  do_syscall_64+0x4e/0x1e0
  entry_SYSCALL_64_after_hwframe+0x4b/0x53

 kfence-#184: 0xffff88843fe9df80-0xffff88843fe9dfea, size=107, cache=kmalloc-128

 allocated by task 3470 on cpu 1 at 263329.131592s (192823.508886s ago):
  xfs_init_local_fork+0x79/0xe0 [xfs]
  xfs_iformat_local+0xa4/0x170 [xfs]
  xfs_iformat_data_fork+0x148/0x180 [xfs]
  xfs_inode_from_disk+0x2cd/0x480 [xfs]
  xfs_iget+0x450/0xd60 [xfs]
  xfs_bulkstat_one_int+0x6b/0x510 [xfs]
  xfs_bulkstat_iwalk+0x1e/0x30 [xfs]
  xfs_iwalk_ag_recs+0xdf/0x150 [xfs]
  xfs_iwalk_run_callbacks+0xb9/0x190 [xfs]
  xfs_iwalk_ag+0x1dc/0x2f0 [xfs]
  xfs_iwalk_args.constprop.0+0x6a/0x120 [xfs]
  xfs_iwalk+0xa4/0xd0 [xfs]
  xfs_bulkstat+0xfa/0x170 [xfs]
  xfs_ioc_fsbulkstat.isra.0+0x13a/0x230 [xfs]
  xfs_file_ioctl+0xbf2/0x10e0 [xfs]
  __x64_sys_ioctl+0x76/0xc0
  do_syscall_64+0x4e/0x1e0
  entry_SYSCALL_64_after_hwframe+0x4b/0x53

 CPU: 1 UID: 0 PID: 1300113 Comm: xfs_scrub Not tainted 6.18.0-rc4-djwx #rc4 PREEMPT(lazy)  3d744dd94e92690f00a04398d2bd8631dcef1954
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-4.module+el8.8.0+21164+ed375313 04/01/2014
 ==================================================================

On further analysis, I realized that the second parameter to min() is
not correct.  xfs_ifork::if_bytes is the size of the xfs_ifork::if_data
buffer.  if_bytes can be smaller than the data fork size because:

(a) the forkoff code tries to keep the data area as large as possible
(b) for symbolic links, if_bytes is the ondisk file size + 1
(c) forkoff is always a multiple of 8.

Case in point: for a single-byte symlink target, forkoff will be
8 but the buffer will only be 2 bytes long.

In other words, the logic here is wrong and we walk off the end of the
incore buffer.  Fix that.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40246/">CVE-2025-40246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40246">CVE-2025-40246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254861">SUSE bug 1254861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40248</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40248" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40248" ref_url="https://www.suse.com/security/cve/CVE-2025-40248" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1142" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002437.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1581" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002478.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1703" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: Ignore signal/timeout on connect() if already established

During connect(), acting on a signal/timeout by disconnecting an already
established socket leads to several issues:

1. connect() invoking vsock_transport_cancel_pkt() -&gt;
   virtio_transport_purge_skbs() may race with sendmsg() invoking
   virtio_transport_get_credit(). This results in a permanently elevated
   `vvs-&gt;bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling.

2. connect() resetting a connected socket's state may race with socket
   being placed in a sockmap. A disconnected socket remaining in a sockmap
   breaks sockmap's assumptions. And gives rise to WARNs.

3. connect() transitioning SS_CONNECTED -&gt; SS_UNCONNECTED allows for a
   transport change/drop after TCP_ESTABLISHED. Which poses a problem for
   any simultaneous sendmsg() or connect() and may result in a
   use-after-free/null-ptr-deref.

Do not disconnect socket on signal/timeout. Keep the logic for unconnected
sockets: they don't linger, can't be placed in a sockmap, are rejected by
sendmsg().

[1]: https://lore.kernel.org/netdev/e07fd95c-9a38-4eea-9638-133e38c2ec9b@rbox.co/
[2]: https://lore.kernel.org/netdev/20250317-vsock-trans-signal-race-v4-0-fc8837f3f1d4@rbox.co/
[3]: https://lore.kernel.org/netdev/60f1b7db-3099-4f6a-875e-af9f6ef194f6@rbox.co/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40248/">CVE-2025-40248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40248">CVE-2025-40248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254864">SUSE bug 1254864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40250</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40250" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40250" ref_url="https://www.suse.com/security/cve/CVE-2025-40250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Clean up only new IRQ glue on request_irq() failure

The mlx5_irq_alloc() function can inadvertently free the entire rmap
and end up in a crash[1] when the other threads tries to access this,
when request_irq() fails due to exhausted IRQ vectors. This commit
modifies the cleanup to remove only the specific IRQ mapping that was
just added.

This prevents removal of other valid mappings and ensures precise
cleanup of the failed IRQ allocation's associated glue object.

Note: This error is observed when both fwctl and rds configs are enabled.

[1]
mlx5_core 0000:05:00.0: Successfully registered panic handler for port 1
mlx5_core 0000:05:00.0: mlx5_irq_alloc:293:(pid 66740): Failed to
request irq. err = -28
infiniband mlx5_0: mlx5_ib_test_wc:290:(pid 66740): Error -28 while
trying to test write-combining support
mlx5_core 0000:05:00.0: Successfully unregistered panic handler for port 1
mlx5_core 0000:06:00.0: Successfully registered panic handler for port 1
mlx5_core 0000:06:00.0: mlx5_irq_alloc:293:(pid 66740): Failed to
request irq. err = -28
infiniband mlx5_0: mlx5_ib_test_wc:290:(pid 66740): Error -28 while
trying to test write-combining support
mlx5_core 0000:06:00.0: Successfully unregistered panic handler for port 1
mlx5_core 0000:03:00.0: mlx5_irq_alloc:293:(pid 28895): Failed to
request irq. err = -28
mlx5_core 0000:05:00.0: mlx5_irq_alloc:293:(pid 28895): Failed to
request irq. err = -28
general protection fault, probably for non-canonical address
0xe277a58fde16f291: 0000 [#1] SMP NOPTI

RIP: 0010:free_irq_cpu_rmap+0x23/0x7d
Call Trace:
   &lt;TASK&gt;
   ? show_trace_log_lvl+0x1d6/0x2f9
   ? show_trace_log_lvl+0x1d6/0x2f9
   ? mlx5_irq_alloc.cold+0x5d/0xf3 [mlx5_core]
   ? __die_body.cold+0x8/0xa
   ? die_addr+0x39/0x53
   ? exc_general_protection+0x1c4/0x3e9
   ? dev_vprintk_emit+0x5f/0x90
   ? asm_exc_general_protection+0x22/0x27
   ? free_irq_cpu_rmap+0x23/0x7d
   mlx5_irq_alloc.cold+0x5d/0xf3 [mlx5_core]
   irq_pool_request_vector+0x7d/0x90 [mlx5_core]
   mlx5_irq_request+0x2e/0xe0 [mlx5_core]
   mlx5_irq_request_vector+0xad/0xf7 [mlx5_core]
   comp_irq_request_pci+0x64/0xf0 [mlx5_core]
   create_comp_eq+0x71/0x385 [mlx5_core]
   ? mlx5e_open_xdpsq+0x11c/0x230 [mlx5_core]
   mlx5_comp_eqn_get+0x72/0x90 [mlx5_core]
   ? xas_load+0x8/0x91
   mlx5_comp_irqn_get+0x40/0x90 [mlx5_core]
   mlx5e_open_channel+0x7d/0x3c7 [mlx5_core]
   mlx5e_open_channels+0xad/0x250 [mlx5_core]
   mlx5e_open_locked+0x3e/0x110 [mlx5_core]
   mlx5e_open+0x23/0x70 [mlx5_core]
   __dev_open+0xf1/0x1a5
   __dev_change_flags+0x1e1/0x249
   dev_change_flags+0x21/0x5c
   do_setlink+0x28b/0xcc4
   ? __nla_parse+0x22/0x3d
   ? inet6_validate_link_af+0x6b/0x108
   ? cpumask_next+0x1f/0x35
   ? __snmp6_fill_stats64.constprop.0+0x66/0x107
   ? __nla_validate_parse+0x48/0x1e6
   __rtnl_newlink+0x5ff/0xa57
   ? kmem_cache_alloc_trace+0x164/0x2ce
   rtnl_newlink+0x44/0x6e
   rtnetlink_rcv_msg+0x2bb/0x362
   ? __netlink_sendskb+0x4c/0x6c
   ? netlink_unicast+0x28f/0x2ce
   ? rtnl_calcit.isra.0+0x150/0x146
   netlink_rcv_skb+0x5f/0x112
   netlink_unicast+0x213/0x2ce
   netlink_sendmsg+0x24f/0x4d9
   __sock_sendmsg+0x65/0x6a
   ____sys_sendmsg+0x28f/0x2c9
   ? import_iovec+0x17/0x2b
   ___sys_sendmsg+0x97/0xe0
   __sys_sendmsg+0x81/0xd8
   do_syscall_64+0x35/0x87
   entry_SYSCALL_64_after_hwframe+0x6e/0x0
RIP: 0033:0x7fc328603727
Code: c3 66 90 41 54 41 89 d4 55 48 89 f5 53 89 fb 48 83 ec 10 e8 0b ed
ff ff 44 89 e2 48 89 ee 89 df 41 89 c0 b8 2e 00 00 00 0f 05 &lt;48&gt; 3d 00
f0 ff ff 77 35 44 89 c7 48 89 44 24 08 e8 44 ed ff ff 48
RSP: 002b:00007ffe8eb3f1a0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 000000000000000d RCX: 00007fc328603727
RDX: 0000000000000000 RSI: 00007ffe8eb3f1f0 RDI: 000000000000000d
RBP: 00007ffe8eb3f1f0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
R13: 00000000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40250/">CVE-2025-40250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40250">CVE-2025-40250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254854">SUSE bug 1254854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40251</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40251" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40251" ref_url="https://www.suse.com/security/cve/CVE-2025-40251" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

devlink: rate: Unset parent pointer in devl_rate_nodes_destroy

The function devl_rate_nodes_destroy is documented to "Unset parent for
all rate objects". However, it was only calling the driver-specific
`rate_leaf_parent_set` or `rate_node_parent_set` ops and decrementing
the parent's refcount, without actually setting the
`devlink_rate-&gt;parent` pointer to NULL.

This leaves a dangling pointer in the `devlink_rate` struct, which cause
refcount error in netdevsim[1] and mlx5[2]. In addition, this is
inconsistent with the behavior of `devlink_nl_rate_parent_node_set`,
where the parent pointer is correctly cleared.

This patch fixes the issue by explicitly setting `devlink_rate-&gt;parent`
to NULL after notifying the driver, thus fulfilling the function's
documented behavior for all rate objects.

[1]
repro steps:
echo 1 &gt; /sys/bus/netdevsim/new_device
devlink dev eswitch set netdevsim/netdevsim1 mode switchdev
echo 1 &gt; /sys/bus/netdevsim/devices/netdevsim1/sriov_numvfs
devlink port function rate add netdevsim/netdevsim1/test_node
devlink port function rate set netdevsim/netdevsim1/128 parent test_node
echo 1 &gt; /sys/bus/netdevsim/del_device

dmesg:
refcount_t: decrement hit 0; leaking memory.
WARNING: CPU: 8 PID: 1530 at lib/refcount.c:31 refcount_warn_saturate+0x42/0xe0
CPU: 8 UID: 0 PID: 1530 Comm: bash Not tainted 6.18.0-rc4+ #1 NONE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
RIP: 0010:refcount_warn_saturate+0x42/0xe0
Call Trace:
 &lt;TASK&gt;
 devl_rate_leaf_destroy+0x8d/0x90
 __nsim_dev_port_del+0x6c/0x70 [netdevsim]
 nsim_dev_reload_destroy+0x11c/0x140 [netdevsim]
 nsim_drv_remove+0x2b/0xb0 [netdevsim]
 device_release_driver_internal+0x194/0x1f0
 bus_remove_device+0xc6/0x130
 device_del+0x159/0x3c0
 device_unregister+0x1a/0x60
 del_device_store+0x111/0x170 [netdevsim]
 kernfs_fop_write_iter+0x12e/0x1e0
 vfs_write+0x215/0x3d0
 ksys_write+0x5f/0xd0
 do_syscall_64+0x55/0x10f0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53

[2]
devlink dev eswitch set pci/0000:08:00.0 mode switchdev
devlink port add pci/0000:08:00.0 flavour pcisf pfnum 0 sfnum 1000
devlink port function rate add pci/0000:08:00.0/group1
devlink port function rate set pci/0000:08:00.0/32768 parent group1
modprobe -r mlx5_ib mlx5_fwctl mlx5_core

dmesg:
refcount_t: decrement hit 0; leaking memory.
WARNING: CPU: 7 PID: 16151 at lib/refcount.c:31 refcount_warn_saturate+0x42/0xe0
CPU: 7 UID: 0 PID: 16151 Comm: bash Not tainted 6.17.0-rc7_for_upstream_min_debug_2025_10_02_12_44 #1 NONE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
RIP: 0010:refcount_warn_saturate+0x42/0xe0
Call Trace:
 &lt;TASK&gt;
 devl_rate_leaf_destroy+0x8d/0x90
 mlx5_esw_offloads_devlink_port_unregister+0x33/0x60 [mlx5_core]
 mlx5_esw_offloads_unload_rep+0x3f/0x50 [mlx5_core]
 mlx5_eswitch_unload_sf_vport+0x40/0x90 [mlx5_core]
 mlx5_sf_esw_event+0xc4/0x120 [mlx5_core]
 notifier_call_chain+0x33/0xa0
 blocking_notifier_call_chain+0x3b/0x50
 mlx5_eswitch_disable_locked+0x50/0x110 [mlx5_core]
 mlx5_eswitch_disable+0x63/0x90 [mlx5_core]
 mlx5_unload+0x1d/0x170 [mlx5_core]
 mlx5_uninit_one+0xa2/0x130 [mlx5_core]
 remove_one+0x78/0xd0 [mlx5_core]
 pci_device_remove+0x39/0xa0
 device_release_driver_internal+0x194/0x1f0
 unbind_store+0x99/0xa0
 kernfs_fop_write_iter+0x12e/0x1e0
 vfs_write+0x215/0x3d0
 ksys_write+0x5f/0xd0
 do_syscall_64+0x53/0x1f0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40251/">CVE-2025-40251 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40251">CVE-2025-40251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254856">SUSE bug 1254856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40252</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40252" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40252" ref_url="https://www.suse.com/security/cve/CVE-2025-40252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end()

The loops in 'qede_tpa_cont()' and 'qede_tpa_end()', iterate
over 'cqe-&gt;len_list[]' using only a zero-length terminator as
the stopping condition. If the terminator was missing or
malformed, the loop could run past the end of the fixed-size array.

Add an explicit bound check using ARRAY_SIZE() in both loops to prevent
a potential out-of-bounds access.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40252/">CVE-2025-40252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40252">CVE-2025-40252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254849">SUSE bug 1254849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40254</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40254" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40254" ref_url="https://www.suse.com/security/cve/CVE-2025-40254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: remove never-working support for setting nsh fields

The validation of the set(nsh(...)) action is completely wrong.
It runs through the nsh_key_put_from_nlattr() function that is the
same function that validates NSH keys for the flow match and the
push_nsh() action.  However, the set(nsh(...)) has a very different
memory layout.  Nested attributes in there are doubled in size in
case of the masked set().  That makes proper validation impossible.

There is also confusion in the code between the 'masked' flag, that
says that the nested attributes are doubled in size containing both
the value and the mask, and the 'is_mask' that says that the value
we're parsing is the mask.  This is causing kernel crash on trying to
write into mask part of the match with SW_FLOW_KEY_PUT() during
validation, while validate_nsh() doesn't allocate any memory for it:

  BUG: kernel NULL pointer dereference, address: 0000000000000018
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 1c2383067 P4D 1c2383067 PUD 20b703067 PMD 0
  Oops: Oops: 0000 [#1] SMP NOPTI
  CPU: 8 UID: 0 Kdump: loaded Not tainted 6.17.0-rc4+ #107 PREEMPT(voluntary)
  RIP: 0010:nsh_key_put_from_nlattr+0x19d/0x610 [openvswitch]
  Call Trace:
   &lt;TASK&gt;
   validate_nsh+0x60/0x90 [openvswitch]
   validate_set.constprop.0+0x270/0x3c0 [openvswitch]
   __ovs_nla_copy_actions+0x477/0x860 [openvswitch]
   ovs_nla_copy_actions+0x8d/0x100 [openvswitch]
   ovs_packet_cmd_execute+0x1cc/0x310 [openvswitch]
   genl_family_rcv_msg_doit+0xdb/0x130
   genl_family_rcv_msg+0x14b/0x220
   genl_rcv_msg+0x47/0xa0
   netlink_rcv_skb+0x53/0x100
   genl_rcv+0x24/0x40
   netlink_unicast+0x280/0x3b0
   netlink_sendmsg+0x1f7/0x430
   ____sys_sendmsg+0x36b/0x3a0
   ___sys_sendmsg+0x87/0xd0
   __sys_sendmsg+0x6d/0xd0
   do_syscall_64+0x7b/0x2c0
   entry_SYSCALL_64_after_hwframe+0x76/0x7e

The third issue with this process is that while trying to convert
the non-masked set into masked one, validate_set() copies and doubles
the size of the OVS_KEY_ATTR_NSH as if it didn't have any nested
attributes.  It should be copying each nested attribute and doubling
them in size independently.  And the process must be properly reversed
during the conversion back from masked to a non-masked variant during
the flow dump.

In the end, the only two outcomes of trying to use this action are
either validation failure or a kernel crash.  And if somehow someone
manages to install a flow with such an action, it will most definitely
not do what it is supposed to, since all the keys and the masks are
mixed up.

Fixing all the issues is a complex task as it requires re-writing
most of the validation code.

Given that and the fact that this functionality never worked since
introduction, let's just remove it altogether.  It's better to
re-introduce it later with a proper implementation instead of trying
to fix it in stable releases.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40254/">CVE-2025-40254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40254">CVE-2025-40254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254852">SUSE bug 1254852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40255</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40255" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40255" ref_url="https://www.suse.com/security/cve/CVE-2025-40255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: core: prevent NULL deref in generic_hwtstamp_ioctl_lower()

The ethtool tsconfig Netlink path can trigger a null pointer
dereference. A call chain such as:

  tsconfig_prepare_data() -&gt;
  dev_get_hwtstamp_phylib() -&gt;
  vlan_hwtstamp_get() -&gt;
  generic_hwtstamp_get_lower() -&gt;
  generic_hwtstamp_ioctl_lower()

results in generic_hwtstamp_ioctl_lower() being called with
kernel_cfg-&gt;ifr as NULL.

The generic_hwtstamp_ioctl_lower() function does not expect
a NULL ifr and dereferences it, leading to a system crash.

Fix this by adding a NULL check for kernel_cfg-&gt;ifr in
generic_hwtstamp_ioctl_lower(). If ifr is NULL, return -EINVAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40255/">CVE-2025-40255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40255">CVE-2025-40255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255156">SUSE bug 1255156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40256</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40256" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40256" ref_url="https://www.suse.com/security/cve/CVE-2025-40256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added

In commit b441cf3f8c4b ("xfrm: delete x-&gt;tunnel as we delete x"), I
missed the case where state creation fails between full
initialization (-&gt;init_state has been called) and being inserted on
the lists.

In this situation, -&gt;init_state has been called, so for IPcomp
tunnels, the fallback tunnel has been created and added onto the
lists, but the user state never gets added, because we fail before
that. The user state doesn't go through __xfrm_state_delete, so we
don't call xfrm_state_delete_tunnel for those states, and we end up
leaking the FB tunnel.

There are several codepaths affected by this: the add/update paths, in
both net/key and xfrm, and the migrate code (xfrm_migrate,
xfrm_state_migrate). A "proper" rollback of the init_state work would
probably be doable in the add/update code, but for migrate it gets
more complicated as multiple states may be involved.

At some point, the new (not-inserted) state will be destroyed, so call
xfrm_state_delete_tunnel during xfrm_state_gc_destroy. Most states
will have their fallback tunnel cleaned up during __xfrm_state_delete,
which solves the issue that b441cf3f8c4b (and other patches before it)
aimed at. All states (including FB tunnels) will be removed from the
lists once xfrm_state_fini has called flush_work(&amp;xfrm_state_gc_work).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40256/">CVE-2025-40256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40256">CVE-2025-40256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254851">SUSE bug 1254851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40257</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40257" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40257" ref_url="https://www.suse.com/security/cve/CVE-2025-40257" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix a race in mptcp_pm_del_add_timer()

mptcp_pm_del_add_timer() can call sk_stop_timer_sync(sk, &amp;entry-&gt;add_timer)
while another might have free entry already, as reported by syzbot.

Add RCU protection to fix this issue.

Also change confusing add_timer variable with stop_timer boolean.

syzbot report:

BUG: KASAN: slab-use-after-free in __timer_delete_sync+0x372/0x3f0 kernel/time/timer.c:1616
Read of size 4 at addr ffff8880311e4150 by task kworker/1:1/44

CPU: 1 UID: 0 PID: 44 Comm: kworker/1:1 Not tainted syzkaller #0 PREEMPT_{RT,(full)}
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
Workqueue: events mptcp_worker
Call Trace:
 &lt;TASK&gt;
  dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
  print_address_description mm/kasan/report.c:378 [inline]
  print_report+0xca/0x240 mm/kasan/report.c:482
  kasan_report+0x118/0x150 mm/kasan/report.c:595
  __timer_delete_sync+0x372/0x3f0 kernel/time/timer.c:1616
  sk_stop_timer_sync+0x1b/0x90 net/core/sock.c:3631
  mptcp_pm_del_add_timer+0x283/0x310 net/mptcp/pm.c:362
  mptcp_incoming_options+0x1357/0x1f60 net/mptcp/options.c:1174
  tcp_data_queue+0xca/0x6450 net/ipv4/tcp_input.c:5361
  tcp_rcv_established+0x1335/0x2670 net/ipv4/tcp_input.c:6441
  tcp_v4_do_rcv+0x98b/0xbf0 net/ipv4/tcp_ipv4.c:1931
  tcp_v4_rcv+0x252a/0x2dc0 net/ipv4/tcp_ipv4.c:2374
  ip_protocol_deliver_rcu+0x221/0x440 net/ipv4/ip_input.c:205
  ip_local_deliver_finish+0x3bb/0x6f0 net/ipv4/ip_input.c:239
  NF_HOOK+0x30c/0x3a0 include/linux/netfilter.h:318
  NF_HOOK+0x30c/0x3a0 include/linux/netfilter.h:318
  __netif_receive_skb_one_core net/core/dev.c:6079 [inline]
  __netif_receive_skb+0x143/0x380 net/core/dev.c:6192
  process_backlog+0x31e/0x900 net/core/dev.c:6544
  __napi_poll+0xb6/0x540 net/core/dev.c:7594
  napi_poll net/core/dev.c:7657 [inline]
  net_rx_action+0x5f7/0xda0 net/core/dev.c:7784
  handle_softirqs+0x22f/0x710 kernel/softirq.c:622
  __do_softirq kernel/softirq.c:656 [inline]
  __local_bh_enable_ip+0x1a0/0x2e0 kernel/softirq.c:302
  mptcp_pm_send_ack net/mptcp/pm.c:210 [inline]
 mptcp_pm_addr_send_ack+0x41f/0x500 net/mptcp/pm.c:-1
  mptcp_pm_worker+0x174/0x320 net/mptcp/pm.c:1002
  mptcp_worker+0xd5/0x1170 net/mptcp/protocol.c:2762
  process_one_work kernel/workqueue.c:3263 [inline]
  process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
  kthread+0x711/0x8a0 kernel/kthread.c:463
  ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

Allocated by task 44:
  kasan_save_stack mm/kasan/common.c:56 [inline]
  kasan_save_track+0x3e/0x80 mm/kasan/common.c:77
  poison_kmalloc_redzone mm/kasan/common.c:400 [inline]
  __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:417
  kasan_kmalloc include/linux/kasan.h:262 [inline]
  __kmalloc_cache_noprof+0x1ef/0x6c0 mm/slub.c:5748
  kmalloc_noprof include/linux/slab.h:957 [inline]
  mptcp_pm_alloc_anno_list+0x104/0x460 net/mptcp/pm.c:385
  mptcp_pm_create_subflow_or_signal_addr+0xf9d/0x1360 net/mptcp/pm_kernel.c:355
  mptcp_pm_nl_fully_established net/mptcp/pm_kernel.c:409 [inline]
  __mptcp_pm_kernel_worker+0x417/0x1ef0 net/mptcp/pm_kernel.c:1529
  mptcp_pm_worker+0x1ee/0x320 net/mptcp/pm.c:1008
  mptcp_worker+0xd5/0x1170 net/mptcp/protocol.c:2762
  process_one_work kernel/workqueue.c:3263 [inline]
  process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
  kthread+0x711/0x8a0 kernel/kthread.c:463
  ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245

Freed by task 6630:
  kasan_save_stack mm/kasan/common.c:56 [inline]
  kasan_save_track+0x3e/0x80 mm/kasan/common.c:77
  __kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:587
  kasan_save_free_info mm/kasan/kasan.h:406 [inline]
  poison_slab_object m
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-40257/">CVE-2025-40257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40257">CVE-2025-40257 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254842">SUSE bug 1254842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257242">SUSE bug 1257242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40258</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40258" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40258" ref_url="https://www.suse.com/security/cve/CVE-2025-40258" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20887-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20888-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20889-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20891-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20893-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20895-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20896-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix race condition in mptcp_schedule_work()

syzbot reported use-after-free in mptcp_schedule_work() [1]

Issue here is that mptcp_schedule_work() schedules a work,
then gets a refcount on sk-&gt;sk_refcnt if the work was scheduled.
This refcount will be released by mptcp_worker().

[A] if (schedule_work(...)) {
[B]     sock_hold(sk);
        return true;
    }

Problem is that mptcp_worker() can run immediately and complete before [B]

We need instead :

    sock_hold(sk);
    if (schedule_work(...))
        return true;
    sock_put(sk);

[1]
refcount_t: addition on 0; use-after-free.
 WARNING: CPU: 1 PID: 29 at lib/refcount.c:25 refcount_warn_saturate+0xfa/0x1d0 lib/refcount.c:25
Call Trace:
 &lt;TASK&gt;
 __refcount_add include/linux/refcount.h:-1 [inline]
  __refcount_inc include/linux/refcount.h:366 [inline]
  refcount_inc include/linux/refcount.h:383 [inline]
  sock_hold include/net/sock.h:816 [inline]
  mptcp_schedule_work+0x164/0x1a0 net/mptcp/protocol.c:943
  mptcp_tout_timer+0x21/0xa0 net/mptcp/protocol.c:2316
  call_timer_fn+0x17e/0x5f0 kernel/time/timer.c:1747
  expire_timers kernel/time/timer.c:1798 [inline]
  __run_timers kernel/time/timer.c:2372 [inline]
  __run_timer_base+0x648/0x970 kernel/time/timer.c:2384
  run_timer_base kernel/time/timer.c:2393 [inline]
  run_timer_softirq+0xb7/0x180 kernel/time/timer.c:2403
  handle_softirqs+0x22f/0x710 kernel/softirq.c:622
  __do_softirq kernel/softirq.c:656 [inline]
  run_ktimerd+0xcf/0x190 kernel/softirq.c:1138
  smpboot_thread_fn+0x542/0xa60 kernel/smpboot.c:160
  kthread+0x711/0x8a0 kernel/kthread.c:463
  ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40258/">CVE-2025-40258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40258">CVE-2025-40258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254843">SUSE bug 1254843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255053">SUSE bug 1255053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052000" comment="kernel-livepatch-6_12_0-160000_5-default-8-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051986" comment="kernel-livepatch-6_12_0-160000_5-rt-6-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052001" comment="kernel-livepatch-6_12_0-160000_6-default-6-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051990" comment="kernel-livepatch-6_12_0-160000_6-rt-5-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052002" comment="kernel-livepatch-6_12_0-160000_7-default-4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051985" comment="kernel-livepatch-6_12_0-160000_7-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051998" comment="kernel-livepatch-6_12_0-160000_8-default-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051984" comment="kernel-livepatch-6_12_0-160000_8-rt-2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40259</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40259" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40259" ref_url="https://www.suse.com/security/cve/CVE-2025-40259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: sg: Do not sleep in atomic context

sg_finish_rem_req() calls blk_rq_unmap_user(). The latter function may
sleep. Hence, call sg_finish_rem_req() with interrupts enabled instead
of disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40259/">CVE-2025-40259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40259">CVE-2025-40259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254845">SUSE bug 1254845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40261</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40261" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40261" ref_url="https://www.suse.com/security/cve/CVE-2025-40261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme: nvme-fc: Ensure -&gt;ioerr_work is cancelled in nvme_fc_delete_ctrl()

nvme_fc_delete_assocation() waits for pending I/O to complete before
returning, and an error can cause -&gt;ioerr_work to be queued after
cancel_work_sync() had been called.  Move the call to cancel_work_sync() to
be after nvme_fc_delete_association() to ensure -&gt;ioerr_work is not running
when the nvme_fc_ctrl object is freed.  Otherwise the following can occur:

[ 1135.911754] list_del corruption, ff2d24c8093f31f8-&gt;next is NULL
[ 1135.917705] ------------[ cut here ]------------
[ 1135.922336] kernel BUG at lib/list_debug.c:52!
[ 1135.926784] Oops: invalid opcode: 0000 [#1] SMP NOPTI
[ 1135.931851] CPU: 48 UID: 0 PID: 726 Comm: kworker/u449:23 Kdump: loaded Not tainted 6.12.0 #1 PREEMPT(voluntary)
[ 1135.943490] Hardware name: Dell Inc. PowerEdge R660/0HGTK9, BIOS 2.5.4 01/16/2025
[ 1135.950969] Workqueue:  0x0 (nvme-wq)
[ 1135.954673] RIP: 0010:__list_del_entry_valid_or_report.cold+0xf/0x6f
[ 1135.961041] Code: c7 c7 98 68 72 94 e8 26 45 fe ff 0f 0b 48 c7 c7 70 68 72 94 e8 18 45 fe ff 0f 0b 48 89 fe 48 c7 c7 80 69 72 94 e8 07 45 fe ff &lt;0f&gt; 0b 48 89 d1 48 c7 c7 a0 6a 72 94 48 89 c2 e8 f3 44 fe ff 0f 0b
[ 1135.979788] RSP: 0018:ff579b19482d3e50 EFLAGS: 00010046
[ 1135.985015] RAX: 0000000000000033 RBX: ff2d24c8093f31f0 RCX: 0000000000000000
[ 1135.992148] RDX: 0000000000000000 RSI: ff2d24d6bfa1d0c0 RDI: ff2d24d6bfa1d0c0
[ 1135.999278] RBP: ff2d24c8093f31f8 R08: 0000000000000000 R09: ffffffff951e2b08
[ 1136.006413] R10: ffffffff95122ac8 R11: 0000000000000003 R12: ff2d24c78697c100
[ 1136.013546] R13: fffffffffffffff8 R14: 0000000000000000 R15: ff2d24c78697c0c0
[ 1136.020677] FS:  0000000000000000(0000) GS:ff2d24d6bfa00000(0000) knlGS:0000000000000000
[ 1136.028765] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1136.034510] CR2: 00007fd207f90b80 CR3: 000000163ea22003 CR4: 0000000000f73ef0
[ 1136.041641] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 1136.048776] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[ 1136.055910] PKRU: 55555554
[ 1136.058623] Call Trace:
[ 1136.061074]  &lt;TASK&gt;
[ 1136.063179]  ? show_trace_log_lvl+0x1b0/0x2f0
[ 1136.067540]  ? show_trace_log_lvl+0x1b0/0x2f0
[ 1136.071898]  ? move_linked_works+0x4a/0xa0
[ 1136.075998]  ? __list_del_entry_valid_or_report.cold+0xf/0x6f
[ 1136.081744]  ? __die_body.cold+0x8/0x12
[ 1136.085584]  ? die+0x2e/0x50
[ 1136.088469]  ? do_trap+0xca/0x110
[ 1136.091789]  ? do_error_trap+0x65/0x80
[ 1136.095543]  ? __list_del_entry_valid_or_report.cold+0xf/0x6f
[ 1136.101289]  ? exc_invalid_op+0x50/0x70
[ 1136.105127]  ? __list_del_entry_valid_or_report.cold+0xf/0x6f
[ 1136.110874]  ? asm_exc_invalid_op+0x1a/0x20
[ 1136.115059]  ? __list_del_entry_valid_or_report.cold+0xf/0x6f
[ 1136.120806]  move_linked_works+0x4a/0xa0
[ 1136.124733]  worker_thread+0x216/0x3a0
[ 1136.128485]  ? __pfx_worker_thread+0x10/0x10
[ 1136.132758]  kthread+0xfa/0x240
[ 1136.135904]  ? __pfx_kthread+0x10/0x10
[ 1136.139657]  ret_from_fork+0x31/0x50
[ 1136.143236]  ? __pfx_kthread+0x10/0x10
[ 1136.146988]  ret_from_fork_asm+0x1a/0x30
[ 1136.150915]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40261/">CVE-2025-40261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40261">CVE-2025-40261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254839">SUSE bug 1254839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40262</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40262" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40262" ref_url="https://www.suse.com/security/cve/CVE-2025-40262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: imx_sc_key - fix memory corruption on unload

This is supposed to be "priv" but we accidentally pass "&amp;priv" which is
an address in the stack and so it will lead to memory corruption when
the imx_sc_key_action() function is called.  Remove the &amp;.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40262/">CVE-2025-40262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40262">CVE-2025-40262 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254840">SUSE bug 1254840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40263</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40263" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40263" ref_url="https://www.suse.com/security/cve/CVE-2025-40263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: cros_ec_keyb - fix an invalid memory access

If cros_ec_keyb_register_matrix() isn't called (due to
`buttons_switches_only`) in cros_ec_keyb_probe(), `ckdev-&gt;idev` remains
NULL.  An invalid memory access is observed in cros_ec_keyb_process()
when receiving an EC_MKBP_EVENT_KEY_MATRIX event in cros_ec_keyb_work()
in such case.

  Unable to handle kernel read from unreadable memory at virtual address 0000000000000028
  ...
  x3 : 0000000000000000 x2 : 0000000000000000
  x1 : 0000000000000000 x0 : 0000000000000000
  Call trace:
  input_event
  cros_ec_keyb_work
  blocking_notifier_call_chain
  ec_irq_thread

It's still unknown about why the kernel receives such malformed event,
in any cases, the kernel shouldn't access `ckdev-&gt;idev` and friends if
the driver doesn't intend to initialize them.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40263/">CVE-2025-40263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40263">CVE-2025-40263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255077">SUSE bug 1255077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40264</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40264" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40264" ref_url="https://www.suse.com/security/cve/CVE-2025-40264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

be2net: pass wrb_params in case of OS2BMC

be_insert_vlan_in_pkt() is called with the wrb_params argument being NULL
at be_send_pkt_to_bmc() call site.   This may lead to dereferencing a NULL
pointer when processing a workaround for specific packet, as commit
bc0c3405abbb ("be2net: fix a Tx stall bug caused by a specific ipv6
packet") states.

The correct way would be to pass the wrb_params from be_xmit().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40264/">CVE-2025-40264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40264">CVE-2025-40264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254835">SUSE bug 1254835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40266</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40266" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40266" ref_url="https://www.suse.com/security/cve/CVE-2025-40266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Check the untrusted offset in FF-A memory share

Verify the offset to prevent OOB access in the hypervisor
FF-A buffer in case an untrusted large enough value
[U32_MAX - sizeof(struct ffa_composite_mem_region) + 1, U32_MAX]
is set from the host kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40266/">CVE-2025-40266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40266">CVE-2025-40266 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255040">SUSE bug 1255040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40268</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40268" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40268" ref_url="https://www.suse.com/security/cve/CVE-2025-40268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: client: fix memory leak in smb3_fs_context_parse_param

The user calls fsconfig twice, but when the program exits, free() only
frees ctx-&gt;source for the second fsconfig, not the first.
Regarding fc-&gt;source, there is no code in the fs context related to its
memory reclamation.

To fix this memory leak, release the source memory corresponding to ctx
or fc before each parsing.

syzbot reported:
BUG: memory leak
unreferenced object 0xffff888128afa360 (size 96):
  backtrace (crc 79c9c7ba):
    kstrdup+0x3c/0x80 mm/util.c:84
    smb3_fs_context_parse_param+0x229b/0x36c0 fs/smb/client/fs_context.c:1444

BUG: memory leak
unreferenced object 0xffff888112c7d900 (size 96):
  backtrace (crc 79c9c7ba):
    smb3_fs_context_fullpath+0x70/0x1b0 fs/smb/client/fs_context.c:629
    smb3_fs_context_parse_param+0x2266/0x36c0 fs/smb/client/fs_context.c:1438
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40268/">CVE-2025-40268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40268">CVE-2025-40268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255082">SUSE bug 1255082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40269</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40269" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40269" ref_url="https://www.suse.com/security/cve/CVE-2025-40269" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix potential overflow of PCM transfer buffer

The PCM stream data in USB-audio driver is transferred over USB URB
packet buffers, and each packet size is determined dynamically.  The
packet sizes are limited by some factors such as wMaxPacketSize USB
descriptor.  OTOH, in the current code, the actually used packet sizes
are determined only by the rate and the PPS, which may be bigger than
the size limit above.  This results in a buffer overflow, as reported
by syzbot.

Basically when the limit is smaller than the calculated packet size,
it implies that something is wrong, most likely a weird USB
descriptor.  So the best option would be just to return an error at
the parameter setup time before doing any further operations.

This patch introduces such a sanity check, and returns -EINVAL when
the packet size is greater than maxpacksize.  The comparison with
ep-&gt;packsize[1] alone should suffice since it's always equal or
greater than ep-&gt;packsize[0].
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40269/">CVE-2025-40269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40269">CVE-2025-40269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255035">SUSE bug 1255035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40271</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40271" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40271" ref_url="https://www.suse.com/security/cve/CVE-2025-40271" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/proc: fix uaf in proc_readdir_de()

Pde is erased from subdir rbtree through rb_erase(), but not set the node
to EMPTY, which may result in uaf access.  We should use RB_CLEAR_NODE()
set the erased node to EMPTY, then pde_subdir_next() will return NULL to
avoid uaf access.

We found an uaf issue while using stress-ng testing, need to run testcase
getdent and tun in the same time.  The steps of the issue is as follows:

1) use getdent to traverse dir /proc/pid/net/dev_snmp6/, and current
   pde is tun3;

2) in the [time windows] unregister netdevice tun3 and tun2, and erase
   them from rbtree.  erase tun3 first, and then erase tun2.  the
   pde(tun2) will be released to slab;

3) continue to getdent process, then pde_subdir_next() will return
   pde(tun2) which is released, it will case uaf access.

CPU 0                                      |    CPU 1
-------------------------------------------------------------------------
traverse dir /proc/pid/net/dev_snmp6/      |   unregister_netdevice(tun-&gt;dev)   //tun3 tun2
sys_getdents64()                           |
  iterate_dir()                            |
    proc_readdir()                         |
      proc_readdir_de()                    |     snmp6_unregister_dev()
        pde_get(de);                       |       proc_remove()
        read_unlock(&amp;proc_subdir_lock);    |         remove_proc_subtree()
                                           |           write_lock(&amp;proc_subdir_lock);
        [time window]                      |           rb_erase(&amp;root-&gt;subdir_node, &amp;parent-&gt;subdir);
                                           |           write_unlock(&amp;proc_subdir_lock);
        read_lock(&amp;proc_subdir_lock);      |
        next = pde_subdir_next(de);        |
        pde_put(de);                       |
        de = next;    //UAF                |

rbtree of dev_snmp6
                        |
                    pde(tun3)
                     /    \
                  NULL  pde(tun2)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-40271/">CVE-2025-40271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40271">CVE-2025-40271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255297">SUSE bug 1255297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40272</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40272" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40272" ref_url="https://www.suse.com/security/cve/CVE-2025-40272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/secretmem: fix use-after-free race in fault handler

When a page fault occurs in a secret memory file created with
`memfd_secret(2)`, the kernel will allocate a new folio for it, mark the
underlying page as not-present in the direct map, and add it to the file
mapping.

If two tasks cause a fault in the same page concurrently, both could end
up allocating a folio and removing the page from the direct map, but only
one would succeed in adding the folio to the file mapping.  The task that
failed undoes the effects of its attempt by (a) freeing the folio again
and (b) putting the page back into the direct map.  However, by doing
these two operations in this order, the page becomes available to the
allocator again before it is placed back in the direct mapping.

If another task attempts to allocate the page between (a) and (b), and the
kernel tries to access it via the direct map, it would result in a
supervisor not-present page fault.

Fix the ordering to restore the direct map before the folio is freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40272/">CVE-2025-40272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40272">CVE-2025-40272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254832">SUSE bug 1254832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40273</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40273" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40273" ref_url="https://www.suse.com/security/cve/CVE-2025-40273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: free copynotify stateid in nfs4_free_ol_stateid()

Typically copynotify stateid is freed either when parent's stateid
is being close/freed or in nfsd4_laundromat if the stateid hasn't
been used in a lease period.

However, in case when the server got an OPEN (which created
a parent stateid), followed by a COPY_NOTIFY using that stateid,
followed by a client reboot. New client instance while doing
CREATE_SESSION would force expire previous state of this client.
It leads to the open state being freed thru release_openowner-&gt;
nfs4_free_ol_stateid() and it finds that it still has copynotify
stateid associated with it. We currently print a warning and is
triggerred

WARNING: CPU: 1 PID: 8858 at fs/nfsd/nfs4state.c:1550 nfs4_free_ol_stateid+0xb0/0x100 [nfsd]

This patch, instead, frees the associated copynotify stateid here.

If the parent stateid is freed (without freeing the copynotify
stateids associated with it), it leads to the list corruption
when laundromat ends up freeing the copynotify state later.

[ 1626.839430] Internal error: Oops - BUG: 00000000f2000800 [#1]  SMP
[ 1626.842828] Modules linked in: nfnetlink_queue nfnetlink_log bluetooth cfg80211 rpcrdma rdma_cm iw_cm ib_cm ib_core nfsd nfs_acl lockd grace nfs_localio ext4 crc16 mbcache jbd2 overlay uinput snd_seq_dummy snd_hrtimer qrtr rfkill vfat fat uvcvideo snd_hda_codec_generic videobuf2_vmalloc videobuf2_memops snd_hda_intel uvc snd_intel_dspcfg videobuf2_v4l2 videobuf2_common snd_hda_codec snd_hda_core videodev snd_hwdep snd_seq mc snd_seq_device snd_pcm snd_timer snd soundcore sg loop auth_rpcgss vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vmw_vmci vsock xfs 8021q garp stp llc mrp nvme ghash_ce e1000e nvme_core sr_mod nvme_keyring nvme_auth cdrom vmwgfx drm_ttm_helper ttm sunrpc dm_mirror dm_region_hash dm_log iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi fuse dm_multipath dm_mod nfnetlink
[ 1626.855594] CPU: 2 UID: 0 PID: 199 Comm: kworker/u24:33 Kdump: loaded Tainted: G    B   W           6.17.0-rc7+ #22 PREEMPT(voluntary)
[ 1626.857075] Tainted: [B]=BAD_PAGE, [W]=WARN
[ 1626.857573] Hardware name: VMware, Inc. VMware20,1/VBSA, BIOS VMW201.00V.24006586.BA64.2406042154 06/04/2024
[ 1626.858724] Workqueue: nfsd4 laundromat_main [nfsd]
[ 1626.859304] pstate: 61400005 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[ 1626.860010] pc : __list_del_entry_valid_or_report+0x148/0x200
[ 1626.860601] lr : __list_del_entry_valid_or_report+0x148/0x200
[ 1626.861182] sp : ffff8000881d7a40
[ 1626.861521] x29: ffff8000881d7a40 x28: 0000000000000018 x27: ffff0000c2a98200
[ 1626.862260] x26: 0000000000000600 x25: 0000000000000000 x24: ffff8000881d7b20
[ 1626.862986] x23: ffff0000c2a981e8 x22: 1fffe00012410e7d x21: ffff0000920873e8
[ 1626.863701] x20: ffff0000920873e8 x19: ffff000086f22998 x18: 0000000000000000
[ 1626.864421] x17: 20747562202c3839 x16: 3932326636383030 x15: 3030666666662065
[ 1626.865092] x14: 6220646c756f6873 x13: 0000000000000001 x12: ffff60004fd9e4a3
[ 1626.865713] x11: 1fffe0004fd9e4a2 x10: ffff60004fd9e4a2 x9 : dfff800000000000
[ 1626.866320] x8 : 00009fffb0261b5e x7 : ffff00027ecf2513 x6 : 0000000000000001
[ 1626.866938] x5 : ffff00027ecf2510 x4 : ffff60004fd9e4a3 x3 : 0000000000000000
[ 1626.867553] x2 : 0000000000000000 x1 : ffff000096069640 x0 : 000000000000006d
[ 1626.868167] Call trace:
[ 1626.868382]  __list_del_entry_valid_or_report+0x148/0x200 (P)
[ 1626.868876]  _free_cpntf_state_locked+0xd0/0x268 [nfsd]
[ 1626.869368]  nfs4_laundromat+0x6f8/0x1058 [nfsd]
[ 1626.869813]  laundromat_main+0x24/0x60 [nfsd]
[ 1626.870231]  process_one_work+0x584/0x1050
[ 1626.870595]  worker_thread+0x4c4/0xc60
[ 1626.870893]  kthread+0x2f8/0x398
[ 1626.871146]  ret_from_fork+0x10/0x20
[ 1626.871422] Code: aa1303e1 aa1403e3 910e8000 97bc55d7 (d4210000)
[ 1626.871892] SMP: stopping secondary CPUs
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40273/">CVE-2025-40273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40273">CVE-2025-40273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254828">SUSE bug 1254828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40274</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40274" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40274" ref_url="https://www.suse.com/security/cve/CVE-2025-40274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: guest_memfd: Remove bindings on memslot deletion when gmem is dying

When unbinding a memslot from a guest_memfd instance, remove the bindings
even if the guest_memfd file is dying, i.e. even if its file refcount has
gone to zero.  If the memslot is freed before the file is fully released,
nullifying the memslot side of the binding in kvm_gmem_release() will
write to freed memory, as detected by syzbot+KASAN:

  ==================================================================
  BUG: KASAN: slab-use-after-free in kvm_gmem_release+0x176/0x440 virt/kvm/guest_memfd.c:353
  Write of size 8 at addr ffff88807befa508 by task syz.0.17/6022

  CPU: 0 UID: 0 PID: 6022 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full)
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
   print_address_description mm/kasan/report.c:378 [inline]
   print_report+0xca/0x240 mm/kasan/report.c:482
   kasan_report+0x118/0x150 mm/kasan/report.c:595
   kvm_gmem_release+0x176/0x440 virt/kvm/guest_memfd.c:353
   __fput+0x44c/0xa70 fs/file_table.c:468
   task_work_run+0x1d4/0x260 kernel/task_work.c:227
   resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
   exit_to_user_mode_loop+0xe9/0x130 kernel/entry/common.c:43
   exit_to_user_mode_prepare include/linux/irq-entry-common.h:225 [inline]
   syscall_exit_to_user_mode_work include/linux/entry-common.h:175 [inline]
   syscall_exit_to_user_mode include/linux/entry-common.h:210 [inline]
   do_syscall_64+0x2bd/0xfa0 arch/x86/entry/syscall_64.c:100
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
  RIP: 0033:0x7fbeeff8efc9
   &lt;/TASK&gt;

  Allocated by task 6023:
   kasan_save_stack mm/kasan/common.c:56 [inline]
   kasan_save_track+0x3e/0x80 mm/kasan/common.c:77
   poison_kmalloc_redzone mm/kasan/common.c:397 [inline]
   __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:414
   kasan_kmalloc include/linux/kasan.h:262 [inline]
   __kmalloc_cache_noprof+0x3e2/0x700 mm/slub.c:5758
   kmalloc_noprof include/linux/slab.h:957 [inline]
   kzalloc_noprof include/linux/slab.h:1094 [inline]
   kvm_set_memory_region+0x747/0xb90 virt/kvm/kvm_main.c:2104
   kvm_vm_ioctl_set_memory_region+0x6f/0xd0 virt/kvm/kvm_main.c:2154
   kvm_vm_ioctl+0x957/0xc60 virt/kvm/kvm_main.c:5201
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:597 [inline]
   __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:583
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

  Freed by task 6023:
   kasan_save_stack mm/kasan/common.c:56 [inline]
   kasan_save_track+0x3e/0x80 mm/kasan/common.c:77
   kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:584
   poison_slab_object mm/kasan/common.c:252 [inline]
   __kasan_slab_free+0x5c/0x80 mm/kasan/common.c:284
   kasan_slab_free include/linux/kasan.h:234 [inline]
   slab_free_hook mm/slub.c:2533 [inline]
   slab_free mm/slub.c:6622 [inline]
   kfree+0x19a/0x6d0 mm/slub.c:6829
   kvm_set_memory_region+0x9c4/0xb90 virt/kvm/kvm_main.c:2130
   kvm_vm_ioctl_set_memory_region+0x6f/0xd0 virt/kvm/kvm_main.c:2154
   kvm_vm_ioctl+0x957/0xc60 virt/kvm/kvm_main.c:5201
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:597 [inline]
   __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:583
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

Deliberately don't acquire filemap invalid lock when the file is dying as
the lifecycle of f_mapping is outside the purview of KVM.  Dereferencing
the mapping is *probably* fine, but there's no need to invalidate anything
as memslot deletion is responsible for zapping SPTEs, and the only code
that can access the dying file is kvm_gmem_release(), whose core code is
mutual
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40274/">CVE-2025-40274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40274">CVE-2025-40274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254830">SUSE bug 1254830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40275</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40275" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40275" ref_url="https://www.suse.com/security/cve/CVE-2025-40275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd

In snd_usb_create_streams(), for UAC version 3 devices, the Interface
Association Descriptor (IAD) is retrieved via usb_ifnum_to_if(). If this
call fails, a fallback routine attempts to obtain the IAD from the next
interface and sets a BADD profile. However, snd_usb_mixer_controls_badd()
assumes that the IAD retrieved from usb_ifnum_to_if() is always valid,
without performing a NULL check. This can lead to a NULL pointer
dereference when usb_ifnum_to_if() fails to find the interface descriptor.

This patch adds a NULL pointer check after calling usb_ifnum_to_if() in
snd_usb_mixer_controls_badd() to prevent the dereference.

This issue was discovered by syzkaller, which triggered the bug by sending
a crafted USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40275/">CVE-2025-40275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40275">CVE-2025-40275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254829">SUSE bug 1254829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40276</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40276" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40276" ref_url="https://www.suse.com/security/cve/CVE-2025-40276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panthor: Flush shmem writes before mapping buffers CPU-uncached

The shmem layer zeroes out the new pages using cached mappings, and if
we don't CPU-flush we might leave dirty cachelines behind, leading to
potential data leaks and/or asynchronous buffer corruption when dirty
cachelines are evicted.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40276/">CVE-2025-40276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40276">CVE-2025-40276 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254824">SUSE bug 1254824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40277</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40277" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40277" ref_url="https://www.suse.com/security/cve/CVE-2025-40277" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003234.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1142" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE

This data originates from userspace and is used in buffer offset
calculations which could potentially overflow causing an out-of-bounds
access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40277/">CVE-2025-40277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40277">CVE-2025-40277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254894">SUSE bug 1254894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40278</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40278" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40278" ref_url="https://www.suse.com/security/cve/CVE-2025-40278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak

Fix a KMSAN kernel-infoleak detected  by the syzbot .

[net?] KMSAN: kernel-infoleak in __skb_datagram_iter

In tcf_ife_dump(), the variable 'opt' was partially initialized using a
designatied initializer. While the padding bytes are reamined
uninitialized. nla_put() copies the entire structure into a
netlink message, these uninitialized bytes leaked to userspace.

Initialize the structure with memset before assigning its fields
to ensure all members and padding are cleared prior to beign copied.

This change silences the KMSAN report and prevents potential information
leaks from the kernel memory.

This fix has been tested and validated by syzbot. This patch closes the
bug reported at the following syzkaller link and ensures no infoleak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40278/">CVE-2025-40278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40278">CVE-2025-40278 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254825">SUSE bug 1254825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40279</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40279" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40279" ref_url="https://www.suse.com/security/cve/CVE-2025-40279" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: act_connmark: initialize struct tc_ife to fix kernel leak

In tcf_connmark_dump(), the variable 'opt' was partially initialized using a
designatied initializer. While the padding bytes are reamined
uninitialized. nla_put() copies the entire structure into a
netlink message, these uninitialized bytes leaked to userspace.

Initialize the structure with memset before assigning its fields
to ensure all members and padding are cleared prior to beign copied.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40279/">CVE-2025-40279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40279">CVE-2025-40279 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254846">SUSE bug 1254846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40280</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40280" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40280" ref_url="https://www.suse.com/security/cve/CVE-2025-40280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: Fix use-after-free in tipc_mon_reinit_self().

syzbot reported use-after-free of tipc_net(net)-&gt;monitors[]
in tipc_mon_reinit_self(). [0]

The array is protected by RTNL, but tipc_mon_reinit_self()
iterates over it without RTNL.

tipc_mon_reinit_self() is called from tipc_net_finalize(),
which is always under RTNL except for tipc_net_finalize_work().

Let's hold RTNL in tipc_net_finalize_work().

[0]:
BUG: KASAN: slab-use-after-free in __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
BUG: KASAN: slab-use-after-free in _raw_spin_lock_irqsave+0xa7/0xf0 kernel/locking/spinlock.c:162
Read of size 1 at addr ffff88805eae1030 by task kworker/0:7/5989

CPU: 0 UID: 0 PID: 5989 Comm: kworker/0:7 Not tainted syzkaller #0 PREEMPT_{RT,(full)}
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
Workqueue: events tipc_net_finalize_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xca/0x240 mm/kasan/report.c:482
 kasan_report+0x118/0x150 mm/kasan/report.c:595
 __kasan_check_byte+0x2a/0x40 mm/kasan/common.c:568
 kasan_check_byte include/linux/kasan.h:399 [inline]
 lock_acquire+0x8d/0x360 kernel/locking/lockdep.c:5842
 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
 _raw_spin_lock_irqsave+0xa7/0xf0 kernel/locking/spinlock.c:162
 rtlock_slowlock kernel/locking/rtmutex.c:1894 [inline]
 rwbase_rtmutex_lock_state kernel/locking/spinlock_rt.c:160 [inline]
 rwbase_write_lock+0xd3/0x7e0 kernel/locking/rwbase_rt.c:244
 rt_write_lock+0x76/0x110 kernel/locking/spinlock_rt.c:243
 write_lock_bh include/linux/rwlock_rt.h:99 [inline]
 tipc_mon_reinit_self+0x79/0x430 net/tipc/monitor.c:718
 tipc_net_finalize+0x115/0x190 net/tipc/net.c:140
 process_one_work kernel/workqueue.c:3236 [inline]
 process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3319
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400
 kthread+0x70e/0x8a0 kernel/kthread.c:463
 ret_from_fork+0x439/0x7d0 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

Allocated by task 6089:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:388 [inline]
 __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:405
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __kmalloc_cache_noprof+0x1a8/0x320 mm/slub.c:4407
 kmalloc_noprof include/linux/slab.h:905 [inline]
 kzalloc_noprof include/linux/slab.h:1039 [inline]
 tipc_mon_create+0xc3/0x4d0 net/tipc/monitor.c:657
 tipc_enable_bearer net/tipc/bearer.c:357 [inline]
 __tipc_nl_bearer_enable+0xe16/0x13f0 net/tipc/bearer.c:1047
 __tipc_nl_compat_doit net/tipc/netlink_compat.c:371 [inline]
 tipc_nl_compat_doit+0x3bc/0x5f0 net/tipc/netlink_compat.c:393
 tipc_nl_compat_handle net/tipc/netlink_compat.c:-1 [inline]
 tipc_nl_compat_recv+0x83c/0xbe0 net/tipc/netlink_compat.c:1321
 genl_family_rcv_msg_doit+0x215/0x300 net/netlink/genetlink.c:1115
 genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]
 genl_rcv_msg+0x60e/0x790 net/netlink/genetlink.c:1210
 netlink_rcv_skb+0x208/0x470 net/netlink/af_netlink.c:2552
 genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219
 netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]
 netlink_unicast+0x846/0xa10 net/netlink/af_netlink.c:1346
 netlink_sendmsg+0x805/0xb30 net/netlink/af_netlink.c:1896
 sock_sendmsg_nosec net/socket.c:714 [inline]
 __sock_sendmsg+0x21c/0x270 net/socket.c:729
 ____sys_sendmsg+0x508/0x820 net/socket.c:2614
 ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2668
 __sys_sendmsg net/socket.c:2700 [inline]
 __do_sys_sendmsg net/socket.c:2705 [inline]
 __se_sys_sendmsg net/socket.c:2703 [inline]
 __x64_sys_sendmsg+0x1a1/0x260 net/socket.c:2703
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40280/">CVE-2025-40280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40280">CVE-2025-40280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254847">SUSE bug 1254847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254951">SUSE bug 1254951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40282</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40282" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40282" ref_url="https://www.suse.com/security/cve/CVE-2025-40282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: 6lowpan: reset link-local header on ipv6 recv path

Bluetooth 6lowpan.c netdev has header_ops, so it must set link-local
header for RX skb, otherwise things crash, eg. with AF_PACKET SOCK_RAW

Add missing skb_reset_mac_header() for uncompressed ipv6 RX path.

For the compressed one, it is done in lowpan_header_decompress().

Log: (BlueZ 6lowpan-tester Client Recv Raw - Success)
------
kernel BUG at net/core/skbuff.c:212!
Call Trace:
&lt;IRQ&gt;
...
packet_rcv (net/packet/af_packet.c:2152)
...
&lt;TASK&gt;
__local_bh_enable_ip (kernel/softirq.c:407)
netif_rx (net/core/dev.c:5648)
chan_recv_cb (net/bluetooth/6lowpan.c:294 net/bluetooth/6lowpan.c:359)
------
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40282/">CVE-2025-40282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40282">CVE-2025-40282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254850">SUSE bug 1254850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40283</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40283" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40283" ref_url="https://www.suse.com/security/cve/CVE-2025-40283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF

There is a KASAN: slab-use-after-free read in btusb_disconnect().
Calling "usb_driver_release_interface(&amp;btusb_driver, data-&gt;intf)" will
free the btusb data associated with the interface. The same data is
then used later in the function, hence the UAF.

Fix by moving the accesses to btusb data to before the data is free'd.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40283/">CVE-2025-40283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40283">CVE-2025-40283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254858">SUSE bug 1254858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254859">SUSE bug 1254859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40284</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40284" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40284" ref_url="https://www.suse.com/security/cve/CVE-2025-40284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20887-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20888-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20889-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20891-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20893-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20895-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20896-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: cancel mesh send timer when hdev removed

mesh_send_done timer is not canceled when hdev is removed, which causes
crash if the timer triggers after hdev is gone.

Cancel the timer when MGMT removes the hdev, like other MGMT timers.

Should fix the BUG: sporadically seen by BlueZ test bot
(in "Mesh - Send cancel - 1" test).

Log:
------
BUG: KASAN: slab-use-after-free in run_timer_softirq+0x76b/0x7d0
...
Freed by task 36:
 kasan_save_stack+0x24/0x50
 kasan_save_track+0x14/0x30
 __kasan_save_free_info+0x3a/0x60
 __kasan_slab_free+0x43/0x70
 kfree+0x103/0x500
 device_release+0x9a/0x210
 kobject_put+0x100/0x1e0
 vhci_release+0x18b/0x240
------
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40284/">CVE-2025-40284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40284">CVE-2025-40284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254860">SUSE bug 1254860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257669">SUSE bug 1257669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052000" comment="kernel-livepatch-6_12_0-160000_5-default-8-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051986" comment="kernel-livepatch-6_12_0-160000_5-rt-6-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052001" comment="kernel-livepatch-6_12_0-160000_6-default-6-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051990" comment="kernel-livepatch-6_12_0-160000_6-rt-5-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052002" comment="kernel-livepatch-6_12_0-160000_7-default-4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051985" comment="kernel-livepatch-6_12_0-160000_7-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40285</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40285" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40285" ref_url="https://www.suse.com/security/cve/CVE-2025-40285" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb/server: fix possible refcount leak in smb2_sess_setup()

Reference count of ksmbd_session will leak when session need reconnect.
Fix this by adding the missing ksmbd_user_session_put().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40285/">CVE-2025-40285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40285">CVE-2025-40285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255056">SUSE bug 1255056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40287</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40287" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40287" ref_url="https://www.suse.com/security/cve/CVE-2025-40287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: fix improper check of dentry.stream.valid_size

We found an infinite loop bug in the exFAT file system that can lead to a
Denial-of-Service (DoS) condition. When a dentry in an exFAT filesystem is
malformed, the following system calls - SYS_openat, SYS_ftruncate, and
SYS_pwrite64 - can cause the kernel to hang.

Root cause analysis shows that the size validation code in exfat_find()
does not check whether dentry.stream.valid_size is negative. As a result,
the system calls mentioned above can succeed and eventually trigger the DoS
issue.

This patch adds a check for negative dentry.stream.valid_size to prevent
this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40287/">CVE-2025-40287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40287">CVE-2025-40287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255030">SUSE bug 1255030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40288</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40288" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40288" ref_url="https://www.suse.com/security/cve/CVE-2025-40288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices

Previously, APU platforms (and other scenarios with uninitialized VRAM managers)
triggered a NULL pointer dereference in `ttm_resource_manager_usage()`. The root
cause is not that the `struct ttm_resource_manager *man` pointer itself is NULL,
but that `man-&gt;bdev` (the backing device pointer within the manager) remains
uninitialized (NULL) on APUs-since APUs lack dedicated VRAM and do not fully
set up VRAM manager structures. When `ttm_resource_manager_usage()` attempts to
acquire `man-&gt;bdev-&gt;lru_lock`, it dereferences the NULL `man-&gt;bdev`, leading to
a kernel OOPS.

1. **amdgpu_cs.c**: Extend the existing bandwidth control check in
   `amdgpu_cs_get_threshold_for_moves()` to include a check for
   `ttm_resource_manager_used()`. If the manager is not used (uninitialized
   `bdev`), return 0 for migration thresholds immediately-skipping VRAM-specific
   logic that would trigger the NULL dereference.

2. **amdgpu_kms.c**: Update the `AMDGPU_INFO_VRAM_USAGE` ioctl and memory info
   reporting to use a conditional: if the manager is used, return the real VRAM
   usage; otherwise, return 0. This avoids accessing `man-&gt;bdev` when it is
   NULL.

3. **amdgpu_virt.c**: Modify the vf2pf (virtual function to physical function)
   data write path. Use `ttm_resource_manager_used()` to check validity: if the
   manager is usable, calculate `fb_usage` from VRAM usage; otherwise, set
   `fb_usage` to 0 (APUs have no discrete framebuffer to report).

This approach is more robust than APU-specific checks because it:
- Works for all scenarios where the VRAM manager is uninitialized (not just APUs),
- Aligns with TTM's design by using its native helper function,
- Preserves correct behavior for discrete GPUs (which have fully initialized
  `man-&gt;bdev` and pass the `ttm_resource_manager_used()` check).

v4: use ttm_resource_manager_used(&amp;adev-&gt;mman.vram_mgr.manager) instead of checking the adev-&gt;gmc.is_app_apu flag (Christian)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40288/">CVE-2025-40288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40288">CVE-2025-40288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255057">SUSE bug 1255057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40289</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40289" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40289" ref_url="https://www.suse.com/security/cve/CVE-2025-40289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM

Otherwise accessing them can cause a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40289/">CVE-2025-40289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40289">CVE-2025-40289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255042">SUSE bug 1255042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40292</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40292" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40292" ref_url="https://www.suse.com/security/cve/CVE-2025-40292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-net: fix received length check in big packets

Since commit 4959aebba8c0 ("virtio-net: use mtu size as buffer length
for big packets"), when guest gso is off, the allocated size for big
packets is not MAX_SKB_FRAGS * PAGE_SIZE anymore but depends on
negotiated MTU. The number of allocated frags for big packets is stored
in vi-&gt;big_packets_num_skbfrags.

Because the host announced buffer length can be malicious (e.g. the host
vhost_net driver's get_rx_bufs is modified to announce incorrect
length), we need a check in virtio_net receive path. Currently, the
check is not adapted to the new change which can lead to NULL page
pointer dereference in the below while loop when receiving length that
is larger than the allocated one.

This commit fixes the received length check corresponding to the new
change.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40292/">CVE-2025-40292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40292">CVE-2025-40292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255175">SUSE bug 1255175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40293</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40293" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40293" ref_url="https://www.suse.com/security/cve/CVE-2025-40293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Don't overflow during division for dirty tracking

If pgshift is 63 then BITS_PER_TYPE(*bitmap-&gt;bitmap) * pgsize will overflow
to 0 and this triggers divide by 0.

In this case the index should just be 0, so reorganize things to divide
by shift and avoid hitting any overflows.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40293/">CVE-2025-40293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40293">CVE-2025-40293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255179">SUSE bug 1255179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40294</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40294" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40294" ref_url="https://www.suse.com/security/cve/CVE-2025-40294" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern()

In the parse_adv_monitor_pattern() function, the value of
the 'length' variable is currently limited to HCI_MAX_EXT_AD_LENGTH(251).
The size of the 'value' array in the mgmt_adv_pattern structure is 31.
If the value of 'pattern[i].length' is set in the user space
and exceeds 31, the 'patterns[i].value' array can be accessed
out of bound when copied.

Increasing the size of the 'value' array in
the 'mgmt_adv_pattern' structure will break the userspace.
Considering this, and to avoid OOB access revert the limits for 'offset'
and 'length' back to the value of HCI_MAX_AD_LENGTH.

Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40294/">CVE-2025-40294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40294">CVE-2025-40294 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255181">SUSE bug 1255181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40297</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40297" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40297" ref_url="https://www.suse.com/security/cve/CVE-2025-40297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20887-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20888-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20889-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20891-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20893-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20895-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20896-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: fix use-after-free due to MST port state bypass

syzbot reported[1] a use-after-free when deleting an expired fdb. It is
due to a race condition between learning still happening and a port being
deleted, after all its fdbs have been flushed. The port's state has been
toggled to disabled so no learning should happen at that time, but if we
have MST enabled, it will bypass the port's state, that together with VLAN
filtering disabled can lead to fdb learning at a time when it shouldn't
happen while the port is being deleted. VLAN filtering must be disabled
because we flush the port VLANs when it's being deleted which will stop
learning. This fix adds a check for the port's vlan group which is
initialized to NULL when the port is getting deleted, that avoids the port
state bypass. When MST is enabled there would be a minimal new overhead
in the fast-path because the port's vlan group pointer is cache-hot.

[1] https://syzkaller.appspot.com/bug?extid=dd280197f0f7ab3917be
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40297/">CVE-2025-40297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40297">CVE-2025-40297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255187">SUSE bug 1255187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255895">SUSE bug 1255895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052000" comment="kernel-livepatch-6_12_0-160000_5-default-8-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051986" comment="kernel-livepatch-6_12_0-160000_5-rt-6-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052001" comment="kernel-livepatch-6_12_0-160000_6-default-6-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051990" comment="kernel-livepatch-6_12_0-160000_6-rt-5-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052002" comment="kernel-livepatch-6_12_0-160000_7-default-4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051985" comment="kernel-livepatch-6_12_0-160000_7-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051998" comment="kernel-livepatch-6_12_0-160000_8-default-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051984" comment="kernel-livepatch-6_12_0-160000_8-rt-2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40300</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40300" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40300" ref_url="https://www.suse.com/security/cve/CVE-2025-40300" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002218.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19931" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/vmscape: Add conditional IBPB mitigation

VMSCAPE is a vulnerability that exploits insufficient branch predictor
isolation between a guest and a userspace hypervisor (like QEMU). Existing
mitigations already protect kernel/KVM from a malicious guest. Userspace
can additionally be protected by flushing the branch predictors after a
VMexit.

Since it is the userspace that consumes the poisoned branch predictors,
conditionally issue an IBPB after a VMexit and before returning to
userspace. Workloads that frequently switch between hypervisor and
userspace will incur the most overhead from the new IBPB.

This new IBPB is not integrated with the existing IBPB sites. For
instance, a task can use the existing speculation control prctl() to
get an IBPB at context switch time. With this implementation, the
IBPB is doubled up: one at context switch and another before running
userspace.

The intent is to integrate and optimize these cases post-embargo.

[ dhansen: elaborate on suboptimal IBPB solution ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-14"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40300/">CVE-2025-40300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40300">CVE-2025-40300 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249561">SUSE bug 1249561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025850" comment="kernel-default-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025851" comment="kernel-rt-livepatch-6.12.0-160000.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40301</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40301" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40301" ref_url="https://www.suse.com/security/cve/CVE-2025-40301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_event: validate skb length for unknown CC opcode

In hci_cmd_complete_evt(), if the command complete event has an unknown
opcode, we assume the first byte of the remaining skb-&gt;data contains the
return status. However, parameter data has previously been pulled in
hci_event_func(), which may leave the skb empty. If so, using skb-&gt;data[0]
for the return status uses un-init memory.

The fix is to check skb-&gt;len before using skb-&gt;data.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40301/">CVE-2025-40301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40301">CVE-2025-40301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255193">SUSE bug 1255193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40302</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40302" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40302" ref_url="https://www.suse.com/security/cve/CVE-2025-40302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: videobuf2: forbid remove_bufs when legacy fileio is active

vb2_ioctl_remove_bufs() call manipulates queue internal buffer list,
potentially overwriting some pointers used by the legacy fileio access
mode. Forbid that ioctl when fileio is active to protect internal queue
state between subsequent read/write calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40302/">CVE-2025-40302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40302">CVE-2025-40302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255196">SUSE bug 1255196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40303</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40303" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40303" ref_url="https://www.suse.com/security/cve/CVE-2025-40303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: ensure no dirty metadata is written back for an fs with errors

[BUG]
During development of a minor feature (make sure all btrfs_bio::end_io()
is called in task context), I noticed a crash in generic/388, where
metadata writes triggered new works after btrfs_stop_all_workers().

It turns out that it can even happen without any code modification, just
using RAID5 for metadata and the same workload from generic/388 is going
to trigger the use-after-free.

[CAUSE]
If btrfs hits an error, the fs is marked as error, no new
transaction is allowed thus metadata is in a frozen state.

But there are some metadata modifications before that error, and they are
still in the btree inode page cache.

Since there will be no real transaction commit, all those dirty folios
are just kept as is in the page cache, and they can not be invalidated
by invalidate_inode_pages2() call inside close_ctree(), because they are
dirty.

And finally after btrfs_stop_all_workers(), we call iput() on btree
inode, which triggers writeback of those dirty metadata.

And if the fs is using RAID56 metadata, this will trigger RMW and queue
new works into rmw_workers, which is already stopped, causing warning
from queue_work() and use-after-free.

[FIX]
Add a special handling for write_one_eb(), that if the fs is already in
an error state, immediately mark the bbio as failure, instead of really
submitting them.

Then during close_ctree(), iput() will just discard all those dirty
tree blocks without really writing them back, thus no more new jobs for
already stopped-and-freed workqueues.

The extra discard in write_one_eb() also acts as an extra safenet.
E.g. the transaction abort is triggered by some extent/free space
tree corruptions, and since extent/free space tree is already corrupted
some tree blocks may be allocated where they shouldn't be (overwriting
existing tree blocks). In that case writing them back will further
corrupting the fs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40303/">CVE-2025-40303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40303">CVE-2025-40303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255058">SUSE bug 1255058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40304</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40304" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40304" ref_url="https://www.suse.com/security/cve/CVE-2025-40304" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2720" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002516.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds

Add bounds checking to prevent writes past framebuffer boundaries when
rendering text near screen edges. Return early if the Y position is off-screen
and clip image height to screen boundary. Break from the rendering loop if the
X position is off-screen. When clipping image width to fit the screen, update
the character count to match the clipped width to prevent buffer size
mismatches.

Without the character count update, bit_putcs_aligned and bit_putcs_unaligned
receive mismatched parameters where the buffer is allocated for the clipped
width but cnt reflects the original larger count, causing out-of-bounds writes.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40304/">CVE-2025-40304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40304">CVE-2025-40304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255034">SUSE bug 1255034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40305</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40305" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40305" ref_url="https://www.suse.com/security/cve/CVE-2025-40305" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN

p9_read_work() doesn't set Rworksched and doesn't do schedule_work(m-&gt;rq)
if list_empty(&amp;m-&gt;req_list).

However, if the pipe is full, we need to read more data and this used to
work prior to commit aaec5a95d59615 ("pipe_read: don't wake up the writer
if the pipe is still full").

p9_read_work() does p9_fd_read() -&gt; ... -&gt; anon_pipe_read() which (before
the commit above) triggered the unnecessary wakeup. This wakeup calls
p9_pollwake() which kicks p9_poll_workfn() -&gt; p9_poll_mux(), p9_poll_mux()
will notice EPOLLIN and schedule_work(&amp;m-&gt;rq).

This no longer happens after the optimization above, change p9_fd_request()
to use p9_poll_mux() instead of only checking for EPOLLOUT.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40305/">CVE-2025-40305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40305">CVE-2025-40305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255038">SUSE bug 1255038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40306</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40306" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40306" ref_url="https://www.suse.com/security/cve/CVE-2025-40306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

orangefs: fix xattr related buffer overflow...

Willy Tarreau &lt;w@1wt.eu&gt; forwarded me a message from
Disclosure &lt;disclosure@aisle.com&gt; with the following
warning:

&gt; The helper `xattr_key()` uses the pointer variable in the loop condition
&gt; rather than dereferencing it. As `key` is incremented, it remains non-NULL
&gt; (until it runs into unmapped memory), so the loop does not terminate on
&gt; valid C strings and will walk memory indefinitely, consuming CPU or hanging
&gt; the thread.

I easily reproduced this with setfattr and getfattr, causing a kernel
oops, hung user processes and corrupted orangefs files. Disclosure
sent along a diff (not a patch) with a suggested fix, which I based
this patch on.

After xattr_key started working right, xfstest generic/069 exposed an
xattr related memory leak that lead to OOM. xattr_key returns
a hashed key.  When adding xattrs to the orangefs xattr cache, orangefs
used hash_add, a kernel hashing macro. hash_add also hashes the key using
hash_log which resulted in additions to the xattr cache going to the wrong
hash bucket. generic/069 tortures a single file and orangefs does a
getattr for the xattr "security.capability" every time. Orangefs
negative caches on xattrs which includes a kmalloc. Since adds to the
xattr cache were going to the wrong bucket, every getattr for
"security.capability" resulted in another kmalloc, none of which were
ever freed.

I changed the two uses of hash_add to hlist_add_head instead
and the memory leak ceased and generic/069 quit throwing furniture.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40306/">CVE-2025-40306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40306">CVE-2025-40306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255062">SUSE bug 1255062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40307</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40307" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40307" ref_url="https://www.suse.com/security/cve/CVE-2025-40307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: validate cluster allocation bits of the allocation bitmap

syzbot created an exfat image with cluster bits not set for the allocation
bitmap. exfat-fs reads and uses the allocation bitmap without checking
this. The problem is that if the start cluster of the allocation bitmap
is 6, cluster 6 can be allocated when creating a directory with mkdir.
exfat zeros out this cluster in exfat_mkdir, which can delete existing
entries. This can reallocate the allocated entries. In addition,
the allocation bitmap is also zeroed out, so cluster 6 can be reallocated.
This patch adds exfat_test_bitmap_range to validate that clusters used for
the allocation bitmap are correctly marked as in-use.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40307/">CVE-2025-40307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40307">CVE-2025-40307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255039">SUSE bug 1255039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40308</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40308" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40308" ref_url="https://www.suse.com/security/cve/CVE-2025-40308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: bcsp: receive data only if registered

Currently, bcsp_recv() can be called even when the BCSP protocol has not
been registered. This leads to a NULL pointer dereference, as shown in
the following stack trace:

    KASAN: null-ptr-deref in range [0x0000000000000108-0x000000000000010f]
    RIP: 0010:bcsp_recv+0x13d/0x1740 drivers/bluetooth/hci_bcsp.c:590
    Call Trace:
     &lt;TASK&gt;
     hci_uart_tty_receive+0x194/0x220 drivers/bluetooth/hci_ldisc.c:627
     tiocsti+0x23c/0x2c0 drivers/tty/tty_io.c:2290
     tty_ioctl+0x626/0xde0 drivers/tty/tty_io.c:2706
     vfs_ioctl fs/ioctl.c:51 [inline]
     __do_sys_ioctl fs/ioctl.c:907 [inline]
     __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893
     do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
     do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
     entry_SYSCALL_64_after_hwframe+0x77/0x7f

To prevent this, ensure that the HCI_UART_REGISTERED flag is set before
processing received data. If the protocol is not registered, return
-EUNATCH.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40308/">CVE-2025-40308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40308">CVE-2025-40308 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255064">SUSE bug 1255064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40309</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40309" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40309" ref_url="https://www.suse.com/security/cve/CVE-2025-40309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: SCO: Fix UAF on sco_conn_free

BUG: KASAN: slab-use-after-free in sco_conn_free net/bluetooth/sco.c:87 [inline]
BUG: KASAN: slab-use-after-free in kref_put include/linux/kref.h:65 [inline]
BUG: KASAN: slab-use-after-free in sco_conn_put+0xdd/0x410
net/bluetooth/sco.c:107
Write of size 8 at addr ffff88811cb96b50 by task kworker/u17:4/352

CPU: 1 UID: 0 PID: 352 Comm: kworker/u17:4 Not tainted
6.17.0-rc5-g717368f83676 #4 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Workqueue: hci13 hci_cmd_sync_work
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x10b/0x170 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0x191/0x550 mm/kasan/report.c:482
 kasan_report+0xc4/0x100 mm/kasan/report.c:595
 sco_conn_free net/bluetooth/sco.c:87 [inline]
 kref_put include/linux/kref.h:65 [inline]
 sco_conn_put+0xdd/0x410 net/bluetooth/sco.c:107
 sco_connect_cfm+0xb4/0xae0 net/bluetooth/sco.c:1441
 hci_connect_cfm include/net/bluetooth/hci_core.h:2082 [inline]
 hci_conn_failed+0x20a/0x2e0 net/bluetooth/hci_conn.c:1313
 hci_conn_unlink+0x55f/0x810 net/bluetooth/hci_conn.c:1121
 hci_conn_del+0xb6/0x1110 net/bluetooth/hci_conn.c:1147
 hci_abort_conn_sync+0x8c5/0xbb0 net/bluetooth/hci_sync.c:5689
 hci_cmd_sync_work+0x281/0x380 net/bluetooth/hci_sync.c:332
 process_one_work kernel/workqueue.c:3236 [inline]
 process_scheduled_works+0x77e/0x1040 kernel/workqueue.c:3319
 worker_thread+0xbee/0x1200 kernel/workqueue.c:3400
 kthread+0x3c7/0x870 kernel/kthread.c:463
 ret_from_fork+0x13a/0x1e0 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

Allocated by task 31370:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x30/0x70 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:388 [inline]
 __kasan_kmalloc+0x82/0x90 mm/kasan/common.c:405
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __do_kmalloc_node mm/slub.c:4382 [inline]
 __kmalloc_noprof+0x22f/0x390 mm/slub.c:4394
 kmalloc_noprof include/linux/slab.h:909 [inline]
 sk_prot_alloc+0xae/0x220 net/core/sock.c:2239
 sk_alloc+0x34/0x5a0 net/core/sock.c:2295
 bt_sock_alloc+0x3c/0x330 net/bluetooth/af_bluetooth.c:151
 sco_sock_alloc net/bluetooth/sco.c:562 [inline]
 sco_sock_create+0xc0/0x350 net/bluetooth/sco.c:593
 bt_sock_create+0x161/0x3b0 net/bluetooth/af_bluetooth.c:135
 __sock_create+0x3ad/0x780 net/socket.c:1589
 sock_create net/socket.c:1647 [inline]
 __sys_socket_create net/socket.c:1684 [inline]
 __sys_socket+0xd5/0x330 net/socket.c:1731
 __do_sys_socket net/socket.c:1745 [inline]
 __se_sys_socket net/socket.c:1743 [inline]
 __x64_sys_socket+0x7a/0x90 net/socket.c:1743
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xc7/0x240 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 31374:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x30/0x70 mm/kasan/common.c:68
 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:576
 poison_slab_object mm/kasan/common.c:243 [inline]
 __kasan_slab_free+0x3d/0x50 mm/kasan/common.c:275
 kasan_slab_free include/linux/kasan.h:233 [inline]
 slab_free_hook mm/slub.c:2428 [inline]
 slab_free mm/slub.c:4701 [inline]
 kfree+0x199/0x3b0 mm/slub.c:4900
 sk_prot_free net/core/sock.c:2278 [inline]
 __sk_destruct+0x4aa/0x630 net/core/sock.c:2373
 sco_sock_release+0x2ad/0x300 net/bluetooth/sco.c:1333
 __sock_release net/socket.c:649 [inline]
 sock_close+0xb8/0x230 net/socket.c:1439
 __fput+0x3d1/0x9e0 fs/file_table.c:468
 task_work_run+0x206/0x2a0 kernel/task_work.c:227
 get_signal+0x1201/0x1410 kernel/signal.c:2807
 arch_do_signal_or_restart+0x34/0x740 arch/x86/kernel/signal.c:337
 exit_to_user_mode_loop+0x68/0xc0 kernel/entry/common.c:40
 exit_to_user_mode_prepare include/linux/irq-entry-common.h:225 [inline]
 s
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40309/">CVE-2025-40309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40309">CVE-2025-40309 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255065">SUSE bug 1255065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255066">SUSE bug 1255066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40310</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40310" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40310" ref_url="https://www.suse.com/security/cve/CVE-2025-40310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw

There is race in amdgpu_amdkfd_device_fini_sw and interrupt.
if amdgpu_amdkfd_device_fini_sw run in b/w kfd_cleanup_nodes and
  kfree(kfd), and KGD interrupt generated.

kernel panic log:

BUG: kernel NULL pointer dereference, address: 0000000000000098
amdgpu 0000:c8:00.0: amdgpu: Requesting 4 partitions through PSP

PGD d78c68067 P4D d78c68067

kfd kfd: amdgpu: Allocated 3969056 bytes on gart

PUD 1465b8067 PMD @

Oops: @002 [#1] SMP NOPTI

kfd kfd: amdgpu: Total number of KFD nodes to be created: 4
CPU: 115 PID: @ Comm: swapper/115 Kdump: loaded Tainted: G S W OE K

RIP: 0010:_raw_spin_lock_irqsave+0x12/0x40

Code: 89 e@ 41 5c c3 cc cc cc cc 66 66 2e Of 1f 84 00 00 00 00 00 OF 1f 40 00 Of 1f 44% 00 00 41 54 9c 41 5c fa 31 cO ba 01 00 00 00 &lt;fO&gt; OF b1 17 75 Ba 4c 89 e@ 41 Sc

89 c6 e8 07 38 5d

RSP: 0018: ffffc90@1a6b0e28 EFLAGS: 00010046

RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000018
0000000000000001 RSI: ffff8883bb623e00 RDI: 0000000000000098
ffff8883bb000000 RO8: ffff888100055020 ROO: ffff888100055020
0000000000000000 R11: 0000000000000000 R12: 0900000000000002
ffff888F2b97da0@ R14: @000000000000098 R15: ffff8883babdfo00

CS: 010 DS: 0000 ES: 0000 CRO: 0000000080050033

CR2: 0000000000000098 CR3: 0000000e7cae2006 CR4: 0000000002770ce0
0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
0000000000000000 DR6: 00000000fffeO7FO DR7: 0000000000000400

PKRU: 55555554

Call Trace:

&lt;IRQ&gt;

kgd2kfd_interrupt+@x6b/0x1f@ [amdgpu]

? amdgpu_fence_process+0xa4/0x150 [amdgpu]

kfd kfd: amdgpu: Node: 0, interrupt_bitmap: 3 YcpxFl Rant tErace

amdgpu_irq_dispatch+0x165/0x210 [amdgpu]

amdgpu_ih_process+0x80/0x100 [amdgpu]

amdgpu: Virtual CRAT table created for GPU

amdgpu_irq_handler+0x1f/@x60 [amdgpu]

__handle_irq_event_percpu+0x3d/0x170

amdgpu: Topology: Add dGPU node [0x74a2:0x1002]

handle_irq_event+0x5a/@xcO

handle_edge_irq+0x93/0x240

kfd kfd: amdgpu: KFD node 1 partition @ size 49148M

asm_call_irq_on_stack+0xf/@x20

&lt;/IRQ&gt;

common_interrupt+0xb3/0x130

asm_common_interrupt+0x1le/0x40

5.10.134-010.a1i5000.a18.x86_64 #1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40310/">CVE-2025-40310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40310">CVE-2025-40310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255041">SUSE bug 1255041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40311</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40311" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40311" ref_url="https://www.suse.com/security/cve/CVE-2025-40311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

accel/habanalabs: support mapping cb with vmalloc-backed coherent memory

When IOMMU is enabled, dma_alloc_coherent() with GFP_USER may return
addresses from the vmalloc range. If such an address is mapped without
VM_MIXEDMAP, vm_insert_page() will trigger a BUG_ON due to the
VM_PFNMAP restriction.

Fix this by checking for vmalloc addresses and setting VM_MIXEDMAP
in the VMA before mapping. This ensures safe mapping and avoids kernel
crashes. The memory is still driver-allocated and cannot be accessed
directly by userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40311/">CVE-2025-40311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40311">CVE-2025-40311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255068">SUSE bug 1255068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40312</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40312" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40312" ref_url="https://www.suse.com/security/cve/CVE-2025-40312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: Verify inode mode when loading from disk

The inode mode loaded from corrupted disk can be invalid. Do like what
commit 0a9e74051313 ("isofs: Verify inode mode when loading from disk")
does.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40312/">CVE-2025-40312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40312">CVE-2025-40312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255046">SUSE bug 1255046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40314</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40314" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40314" ref_url="https://www.suse.com/security/cve/CVE-2025-40314" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget

In the __cdnsp_gadget_init() and cdnsp_gadget_exit() functions, the gadget
structure (pdev-&gt;gadget) was freed before its endpoints.
The endpoints are linked via the ep_list in the gadget structure.
Freeing the gadget first leaves dangling pointers in the endpoint list.
When the endpoints are subsequently freed, this results in a use-after-free.

Fix:
By separating the usb_del_gadget_udc() operation into distinct "del" and
"put" steps, cdnsp_gadget_free_endpoints() can be executed prior to the
final release of the gadget structure with usb_put_gadget().

A patch similar to bb9c74a5bd14("usb: dwc3: gadget: Free gadget structure
 only after freeing endpoints").
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40314/">CVE-2025-40314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40314">CVE-2025-40314 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255072">SUSE bug 1255072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40315</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40315" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40315" ref_url="https://www.suse.com/security/cve/CVE-2025-40315" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_fs: Fix epfile null pointer access after ep enable.

A race condition occurs when ffs_func_eps_enable() runs concurrently
with ffs_data_reset(). The ffs_data_clear() called in ffs_data_reset()
sets ffs-&gt;epfiles to NULL before resetting ffs-&gt;eps_count to 0, leading
to a NULL pointer dereference when accessing epfile-&gt;ep in
ffs_func_eps_enable() after successful usb_ep_enable().

The ffs-&gt;epfiles pointer is set to NULL in both ffs_data_clear() and
ffs_data_close() functions, and its modification is protected by the
spinlock ffs-&gt;eps_lock. And the whole ffs_func_eps_enable() function
is also protected by ffs-&gt;eps_lock.

Thus, add NULL pointer handling for ffs-&gt;epfiles in the
ffs_func_eps_enable() function to fix issues
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40315/">CVE-2025-40315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40315">CVE-2025-40315 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255083">SUSE bug 1255083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40316</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40316" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40316" ref_url="https://www.suse.com/security/cve/CVE-2025-40316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: Fix device use-after-free on unbind

A recent change fixed device reference leaks when looking up drm
platform device driver data during bind() but failed to remove a partial
fix which had been added by commit 80805b62ea5b ("drm/mediatek: Fix
kobject put for component sub-drivers").

This results in a reference imbalance on component bind() failures and
on unbind() which could lead to a user-after-free.

Make sure to only drop the references after retrieving the driver data
by effectively reverting the previous partial fix.

Note that holding a reference to a device does not prevent its driver
data from going away so there is no point in keeping the reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40316/">CVE-2025-40316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40316">CVE-2025-40316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254797">SUSE bug 1254797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40317</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40317" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40317" ref_url="https://www.suse.com/security/cve/CVE-2025-40317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regmap: slimbus: fix bus_context pointer in regmap init calls

Commit 4e65bda8273c ("ASoC: wcd934x: fix error handling in
wcd934x_codec_parse_data()") revealed the problem in the slimbus regmap.
That commit breaks audio playback, for instance, on sdm845 Thundercomm
Dragonboard 845c board:

 Unable to handle kernel paging request at virtual address ffff8000847cbad4
 ...
 CPU: 5 UID: 0 PID: 776 Comm: aplay Not tainted 6.18.0-rc1-00028-g7ea30958b305 #11 PREEMPT
 Hardware name: Thundercomm Dragonboard 845c (DT)
 ...
 Call trace:
  slim_xfer_msg+0x24/0x1ac [slimbus] (P)
  slim_read+0x48/0x74 [slimbus]
  regmap_slimbus_read+0x18/0x24 [regmap_slimbus]
  _regmap_raw_read+0xe8/0x174
  _regmap_bus_read+0x44/0x80
  _regmap_read+0x60/0xd8
  _regmap_update_bits+0xf4/0x140
  _regmap_select_page+0xa8/0x124
  _regmap_raw_write_impl+0x3b8/0x65c
  _regmap_bus_raw_write+0x60/0x80
  _regmap_write+0x58/0xc0
  regmap_write+0x4c/0x80
  wcd934x_hw_params+0x494/0x8b8 [snd_soc_wcd934x]
  snd_soc_dai_hw_params+0x3c/0x7c [snd_soc_core]
  __soc_pcm_hw_params+0x22c/0x634 [snd_soc_core]
  dpcm_be_dai_hw_params+0x1d4/0x38c [snd_soc_core]
  dpcm_fe_dai_hw_params+0x9c/0x17c [snd_soc_core]
  snd_pcm_hw_params+0x124/0x464 [snd_pcm]
  snd_pcm_common_ioctl+0x110c/0x1820 [snd_pcm]
  snd_pcm_ioctl+0x34/0x4c [snd_pcm]
  __arm64_sys_ioctl+0xac/0x104
  invoke_syscall+0x48/0x104
  el0_svc_common.constprop.0+0x40/0xe0
  do_el0_svc+0x1c/0x28
  el0_svc+0x34/0xec
  el0t_64_sync_handler+0xa0/0xf0
  el0t_64_sync+0x198/0x19c

The __devm_regmap_init_slimbus() started to be used instead of
__regmap_init_slimbus() after the commit mentioned above and turns out
the incorrect bus_context pointer (3rd argument) was used in
__devm_regmap_init_slimbus(). It should be just "slimbus" (which is equal
to &amp;slimbus-&gt;dev). Correct it. The wcd934x codec seems to be the only or
the first user of devm_regmap_init_slimbus() but we should fix it till
the point where __devm_regmap_init_slimbus() was introduced therefore
two "Fixes" tags.

While at this, also correct the same argument in __regmap_init_slimbus().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40317/">CVE-2025-40317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40317">CVE-2025-40317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254796">SUSE bug 1254796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40318</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40318" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40318" ref_url="https://www.suse.com/security/cve/CVE-2025-40318" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once

hci_cmd_sync_dequeue_once() does lookup and then cancel
the entry under two separate lock sections. Meanwhile,
hci_cmd_sync_work() can also delete the same entry,
leading to double list_del() and "UAF".

Fix this by holding cmd_sync_work_lock across both
lookup and cancel, so that the entry cannot be removed
concurrently.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40318/">CVE-2025-40318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40318">CVE-2025-40318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254798">SUSE bug 1254798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40319</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40319" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40319" ref_url="https://www.suse.com/security/cve/CVE-2025-40319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Sync pending IRQ work before freeing ring buffer

Fix a race where irq_work can be queued in bpf_ringbuf_commit()
but the ring buffer is freed before the work executes.
In the syzbot reproducer, a BPF program attached to sched_switch
triggers bpf_ringbuf_commit(), queuing an irq_work. If the ring buffer
is freed before this work executes, the irq_work thread may accesses
freed memory.
Calling `irq_work_sync(&amp;rb-&gt;work)` ensures that all pending irq_work
complete before freeing the buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40319/">CVE-2025-40319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40319">CVE-2025-40319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254794">SUSE bug 1254794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40320</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40320" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40320" ref_url="https://www.suse.com/security/cve/CVE-2025-40320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential cfid UAF in smb2_query_info_compound

When smb2_query_info_compound() retries, a previously allocated cfid may
have been freed in the first attempt.
Because cfid wasn't reset on replay, later cleanup could act on a stale
pointer, leading to a potential use-after-free.

Reinitialize cfid to NULL under the replay label.

Example trace (trimmed):

refcount_t: underflow; use-after-free.
WARNING: CPU: 1 PID: 11224 at ../lib/refcount.c:28 refcount_warn_saturate+0x9c/0x110
[...]
RIP: 0010:refcount_warn_saturate+0x9c/0x110
[...]
Call Trace:
 &lt;TASK&gt;
 smb2_query_info_compound+0x29c/0x5c0 [cifs f90b72658819bd21c94769b6a652029a07a7172f]
 ? step_into+0x10d/0x690
 ? __legitimize_path+0x28/0x60
 smb2_queryfs+0x6a/0xf0 [cifs f90b72658819bd21c94769b6a652029a07a7172f]
 smb311_queryfs+0x12d/0x140 [cifs f90b72658819bd21c94769b6a652029a07a7172f]
 ? kmem_cache_alloc+0x18a/0x340
 ? getname_flags+0x46/0x1e0
 cifs_statfs+0x9f/0x2b0 [cifs f90b72658819bd21c94769b6a652029a07a7172f]
 statfs_by_dentry+0x67/0x90
 vfs_statfs+0x16/0xd0
 user_statfs+0x54/0xa0
 __do_sys_statfs+0x20/0x50
 do_syscall_64+0x58/0x80
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40320/">CVE-2025-40320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40320">CVE-2025-40320 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254793">SUSE bug 1254793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40321</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40321" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40321" ref_url="https://www.suse.com/security/cve/CVE-2025-40321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode

Currently, whenever there is a need to transmit an Action frame,
the brcmfmac driver always uses the P2P vif to send the "actframe" IOVAR to
firmware. The P2P interfaces were available when wpa_supplicant is managing
the wlan interface.

However, the P2P interfaces are not created/initialized when only hostapd
is managing the wlan interface. And if hostapd receives an ANQP Query REQ
Action frame even from an un-associated STA, the brcmfmac driver tries
to use an uninitialized P2P vif pointer for sending the IOVAR to firmware.
This NULL pointer dereferencing triggers a driver crash.

 [ 1417.074538] Unable to handle kernel NULL pointer dereference at virtual
 address 0000000000000000
 [...]
 [ 1417.075188] Hardware name: Raspberry Pi 4 Model B Rev 1.5 (DT)
 [...]
 [ 1417.075653] Call trace:
 [ 1417.075662]  brcmf_p2p_send_action_frame+0x23c/0xc58 [brcmfmac]
 [ 1417.075738]  brcmf_cfg80211_mgmt_tx+0x304/0x5c0 [brcmfmac]
 [ 1417.075810]  cfg80211_mlme_mgmt_tx+0x1b0/0x428 [cfg80211]
 [ 1417.076067]  nl80211_tx_mgmt+0x238/0x388 [cfg80211]
 [ 1417.076281]  genl_family_rcv_msg_doit+0xe0/0x158
 [ 1417.076302]  genl_rcv_msg+0x220/0x2a0
 [ 1417.076317]  netlink_rcv_skb+0x68/0x140
 [ 1417.076330]  genl_rcv+0x40/0x60
 [ 1417.076343]  netlink_unicast+0x330/0x3b8
 [ 1417.076357]  netlink_sendmsg+0x19c/0x3f8
 [ 1417.076370]  __sock_sendmsg+0x64/0xc0
 [ 1417.076391]  ____sys_sendmsg+0x268/0x2a0
 [ 1417.076408]  ___sys_sendmsg+0xb8/0x118
 [ 1417.076427]  __sys_sendmsg+0x90/0xf8
 [ 1417.076445]  __arm64_sys_sendmsg+0x2c/0x40
 [ 1417.076465]  invoke_syscall+0x50/0x120
 [ 1417.076486]  el0_svc_common.constprop.0+0x48/0xf0
 [ 1417.076506]  do_el0_svc+0x24/0x38
 [ 1417.076525]  el0_svc+0x30/0x100
 [ 1417.076548]  el0t_64_sync_handler+0x100/0x130
 [ 1417.076569]  el0t_64_sync+0x190/0x198
 [ 1417.076589] Code: f9401e80 aa1603e2 f9403be1 5280e483 (f9400000)

Fix this, by always using the vif corresponding to the wdev on which the
Action frame Transmission request was initiated by the userspace. This way,
even if P2P vif is not available, the IOVAR is sent to firmware on AP vif
and the ANQP Query RESP Action frame is transmitted without crashing the
driver.

Move init_completion() for "send_af_done" from brcmf_p2p_create_p2pdev()
to brcmf_p2p_attach(). Because the former function would not get executed
when only hostapd is managing wlan interface, and it is not safe to do
reinit_completion() later in brcmf_p2p_tx_action_frame(), without any prior
init_completion().

And in the brcmf_p2p_tx_action_frame() function, the condition check for
P2P Presence response frame is not needed, since the wpa_supplicant is
properly sending the P2P Presense Response frame on the P2P-GO vif instead
of the P2P-Device vif.

[Cc stable]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40321/">CVE-2025-40321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40321">CVE-2025-40321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254795">SUSE bug 1254795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40322</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40322" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40322" ref_url="https://www.suse.com/security/cve/CVE-2025-40322" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002541.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: bitblit: bound-check glyph index in bit_putcs*

bit_putcs_aligned()/unaligned() derived the glyph pointer from the
character value masked by 0xff/0x1ff, which may exceed the actual font's
glyph count and read past the end of the built-in font array.
Clamp the index to the actual glyph count before computing the address.

This fixes a global out-of-bounds read reported by syzbot.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40322/">CVE-2025-40322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40322">CVE-2025-40322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255092">SUSE bug 1255092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40323</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40323" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40323" ref_url="https://www.suse.com/security/cve/CVE-2025-40323" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbcon: Set fb_display[i]-&gt;mode to NULL when the mode is released

Recently, we discovered the following issue through syzkaller:

BUG: KASAN: slab-use-after-free in fb_mode_is_equal+0x285/0x2f0
Read of size 4 at addr ff11000001b3c69c by task syz.xxx
...
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xab/0xe0
 print_address_description.constprop.0+0x2c/0x390
 print_report+0xb9/0x280
 kasan_report+0xb8/0xf0
 fb_mode_is_equal+0x285/0x2f0
 fbcon_mode_deleted+0x129/0x180
 fb_set_var+0xe7f/0x11d0
 do_fb_ioctl+0x6a0/0x750
 fb_ioctl+0xe0/0x140
 __x64_sys_ioctl+0x193/0x210
 do_syscall_64+0x5f/0x9c0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Based on experimentation and analysis, during framebuffer unregistration,
only the memory of fb_info-&gt;modelist is freed, without setting the
corresponding fb_display[i]-&gt;mode to NULL for the freed modes. This leads
to UAF issues during subsequent accesses. Here's an example of reproduction
steps:
1. With /dev/fb0 already registered in the system, load a kernel module
   to register a new device /dev/fb1;
2. Set fb1's mode to the global fb_display[] array (via FBIOPUT_CON2FBMAP);
3. Switch console from fb to VGA (to allow normal rmmod of the ko);
4. Unload the kernel module, at this point fb1's modelist is freed, leaving
   a wild pointer in fb_display[];
5. Trigger the bug via system calls through fb0 attempting to delete a mode
   from fb0.

Add a check in do_unregister_framebuffer(): if the mode to be freed exists
in fb_display[], set the corresponding mode pointer to NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40323/">CVE-2025-40323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40323">CVE-2025-40323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255094">SUSE bug 1255094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40324</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40324" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40324" ref_url="https://www.suse.com/security/cve/CVE-2025-40324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix crash in nfsd4_read_release()

When tracing is enabled, the trace_nfsd_read_done trace point
crashes during the pynfs read.testNoFh test.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40324/">CVE-2025-40324 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40324">CVE-2025-40324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254791">SUSE bug 1254791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40328</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40328" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40328" ref_url="https://www.suse.com/security/cve/CVE-2025-40328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in smb2_close_cached_fid()

find_or_create_cached_dir() could grab a new reference after kref_put()
had seen the refcount drop to zero but before cfid_list_lock is acquired
in smb2_close_cached_fid(), leading to use-after-free.

Switch to kref_put_lock() so cfid_release() is called with
cfid_list_lock held, closing that gap.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40328/">CVE-2025-40328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40328">CVE-2025-40328 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254624">SUSE bug 1254624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40329</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40329" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40329" ref_url="https://www.suse.com/security/cve/CVE-2025-40329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb

The Mesa issue referenced below pointed out a possible deadlock:

[ 1231.611031]  Possible interrupt unsafe locking scenario:

[ 1231.611033]        CPU0                    CPU1
[ 1231.611034]        ----                    ----
[ 1231.611035]   lock(&amp;xa-&gt;xa_lock#17);
[ 1231.611038]                                local_irq_disable();
[ 1231.611039]                                lock(&amp;fence-&gt;lock);
[ 1231.611041]                                lock(&amp;xa-&gt;xa_lock#17);
[ 1231.611044]   &lt;Interrupt&gt;
[ 1231.611045]     lock(&amp;fence-&gt;lock);
[ 1231.611047]
                *** DEADLOCK ***

In this example, CPU0 would be any function accessing job-&gt;dependencies
through the xa_* functions that don't disable interrupts (eg:
drm_sched_job_add_dependency(), drm_sched_entity_kill_jobs_cb()).

CPU1 is executing drm_sched_entity_kill_jobs_cb() as a fence signalling
callback so in an interrupt context. It will deadlock when trying to
grab the xa_lock which is already held by CPU0.

Replacing all xa_* usage by their xa_*_irq counterparts would fix
this issue, but Christian pointed out another issue: dma_fence_signal
takes fence.lock and so does dma_fence_add_callback.

  dma_fence_signal() // locks f1.lock
  -&gt; drm_sched_entity_kill_jobs_cb()
  -&gt; foreach dependencies
     -&gt; dma_fence_add_callback() // locks f2.lock

This will deadlock if f1 and f2 share the same spinlock.

To fix both issues, the code iterating on dependencies and re-arming them
is moved out to drm_sched_entity_kill_jobs_work().

[phasta: commit message nits]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40329/">CVE-2025-40329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40329">CVE-2025-40329 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254621">SUSE bug 1254621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40330</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40330" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40330" ref_url="https://www.suse.com/security/cve/CVE-2025-40330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Shutdown FW DMA in bnxt_shutdown()

The netif_close() call in bnxt_shutdown() only stops packet DMA.  There
may be FW DMA for trace logging (recently added) that will continue.  If
we kexec to a new kernel, the DMA will corrupt memory in the new kernel.

Add bnxt_hwrm_func_drv_unrgtr() to unregister the driver from the FW.
This will stop the FW DMA.  In case the call fails, call pcie_flr() to
reset the function and stop the DMA.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40330/">CVE-2025-40330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40330">CVE-2025-40330 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254616">SUSE bug 1254616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40331</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40331" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40331" ref_url="https://www.suse.com/security/cve/CVE-2025-40331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: Prevent TOCTOU out-of-bounds write

For the following path not holding the sock lock,

  sctp_diag_dump() -&gt; sctp_for_each_endpoint() -&gt; sctp_ep_dump()

make sure not to exceed bounds in case the address list has grown
between buffer allocation (time-of-check) and write (time-of-use).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40331/">CVE-2025-40331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40331">CVE-2025-40331 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254615">SUSE bug 1254615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40332</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40332" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40332" ref_url="https://www.suse.com/security/cve/CVE-2025-40332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix mmap write lock not release

If mmap write lock is taken while draining retry fault, mmap write lock
is not released because svm_range_restore_pages calls mmap_read_unlock
then returns. This causes deadlock and system hangs later because mmap
read or write lock cannot be taken.

Downgrade mmap write lock to read lock if draining retry fault fix this
bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40332/">CVE-2025-40332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40332">CVE-2025-40332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255116">SUSE bug 1255116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40333</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40333" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40333" ref_url="https://www.suse.com/security/cve/CVE-2025-40333" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix infinite loop in __insert_extent_tree()

When we get wrong extent info data, and look up extent_node in rb tree,
it will cause infinite loop (CONFIG_F2FS_CHECK_FS=n). Avoiding this by
return NULL and print some kernel messages in that case.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40333/">CVE-2025-40333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40333">CVE-2025-40333 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255044">SUSE bug 1255044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40335</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40335" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40335" ref_url="https://www.suse.com/security/cve/CVE-2025-40335" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: validate userq input args

This will help on validating the userq input args, and
rejecting for the invalid userq request at the IOCTLs
first place.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40335/">CVE-2025-40335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40335">CVE-2025-40335 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255238">SUSE bug 1255238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40336</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40336" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40336" ref_url="https://www.suse.com/security/cve/CVE-2025-40336" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/gpusvm: fix hmm_pfn_to_map_order() usage

Handle the case where the hmm range partially covers a huge page (like
2M), otherwise we can potentially end up doing something nasty like
mapping memory which is outside the range, and maybe not even mapped by
the mm. Fix is based on the xe userptr code, which in a future patch
will directly use gpusvm, so needs alignment here.

v2:
  - Add kernel-doc (Matt B)
  - s/fls/ilog2/ (Thomas)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40336/">CVE-2025-40336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40336">CVE-2025-40336 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255239">SUSE bug 1255239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40337</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40337" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40337" ref_url="https://www.suse.com/security/cve/CVE-2025-40337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: Correctly handle Rx checksum offload errors

The stmmac_rx function would previously set skb-&gt;ip_summed to
CHECKSUM_UNNECESSARY if hardware checksum offload (CoE) was enabled
and the packet was of a known IP ethertype.

However, this logic failed to check if the hardware had actually
reported a checksum error. The hardware status, indicating a header or
payload checksum failure, was being ignored at this stage. This could
cause corrupt packets to be passed up the network stack as valid.

This patch corrects the logic by checking the `csum_none` status flag,
which is set when the hardware reports a checksum error. If this flag
is set, skb-&gt;ip_summed is now correctly set to CHECKSUM_NONE,
ensuring the kernel's network stack will perform its own validation and
properly handle the corrupt packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40337/">CVE-2025-40337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40337">CVE-2025-40337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255081">SUSE bug 1255081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40338</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40338" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40338" ref_url="https://www.suse.com/security/cve/CVE-2025-40338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: avs: Do not share the name pointer between components

By sharing 'name' directly, tearing down components may lead to
use-after-free errors. Duplicate the name to avoid that.

At the same time, update the order of operations - since commit
cee28113db17 ("ASoC: dmaengine_pcm: Allow passing component name via
config") the framework does not override component-&gt;name if set before
invoking the initializer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40338/">CVE-2025-40338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40338">CVE-2025-40338 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255273">SUSE bug 1255273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40339</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40339" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40339" ref_url="https://www.suse.com/security/cve/CVE-2025-40339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix nullptr err of vm_handle_moved

If a amdgpu_bo_va is fpriv-&gt;prt_va, the bo of this one is always NULL.
So, such kind of amdgpu_bo_va should be updated separately before
amdgpu_vm_handle_moved.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40339/">CVE-2025-40339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40339">CVE-2025-40339 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255428">SUSE bug 1255428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40340</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40340" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40340" ref_url="https://www.suse.com/security/cve/CVE-2025-40340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test.

I saw an oops in xe_gem_fault when running the xe-fast-feedback
testlist against the realtime kernel without debug options enabled.

The panic happens after core_hotunplug unbind-rebind finishes.
Presumably what happens is that a process mmaps, unlocks because
of the FAULT_FLAG_RETRY_NOWAIT logic, has no process memory left,
causing ttm_bo_vm_dummy_page() to return VM_FAULT_NOPAGE, since
there was nothing left to populate, and then oopses in
"mem_type_is_vram(tbo-&gt;resource-&gt;mem_type)" because tbo-&gt;resource
is NULL.

It's convoluted, but fits the data and explains the oops after
the test exits.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-40340/">CVE-2025-40340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40340">CVE-2025-40340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254996">SUSE bug 1254996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40342</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40342" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40342" ref_url="https://www.suse.com/security/cve/CVE-2025-40342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-fc: use lock accessing port_state and rport state

nvme_fc_unregister_remote removes the remote port on a lport object at
any point in time when there is no active association. This races with
with the reconnect logic, because nvme_fc_create_association is not
taking a lock to check the port_state and atomically increase the
active count on the rport.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40342/">CVE-2025-40342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40342">CVE-2025-40342 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255274">SUSE bug 1255274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255275">SUSE bug 1255275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40343</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40343" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40343" ref_url="https://www.suse.com/security/cve/CVE-2025-40343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-fc: avoid scheduling association deletion twice

When forcefully shutting down a port via the configfs interface,
nvmet_port_subsys_drop_link() first calls nvmet_port_del_ctrls() and
then nvmet_disable_port(). Both functions will eventually schedule all
remaining associations for deletion.

The current implementation checks whether an association is about to be
removed, but only after the work item has already been scheduled. As a
result, it is possible for the first scheduled work item to free all
resources, and then for the same work item to be scheduled again for
deletion.

Because the association list is an RCU list, it is not possible to take
a lock and remove the list entry directly, so it cannot be looked up
again. Instead, a flag (terminating) must be used to determine whether
the association is already in the process of being deleted.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40343/">CVE-2025-40343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40343">CVE-2025-40343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255276">SUSE bug 1255276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255278">SUSE bug 1255278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40344</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40344" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40344" ref_url="https://www.suse.com/security/cve/CVE-2025-40344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: avs: Disable periods-elapsed work when closing PCM

avs_dai_fe_shutdown() handles the shutdown procedure for HOST HDAudio
stream while period-elapsed work services its IRQs. As the former
frees the DAI's private context, these two operations shall be
synchronized to avoid slab-use-after-free or worse errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40344/">CVE-2025-40344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40344">CVE-2025-40344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254618">SUSE bug 1254618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40345</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40345" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40345" ref_url="https://www.suse.com/security/cve/CVE-2025-40345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: storage: sddr55: Reject out-of-bound new_pba

Discovered by Atuin - Automated Vulnerability Discovery Engine.

new_pba comes from the status packet returned after each write.
A bogus device could report values beyond the block count derived
from info-&gt;capacity, letting the driver walk off the end of
pba_to_lba[] and corrupt heap memory.

Reject PBAs that exceed the computed block count and fail the
transfer so we avoid touching out-of-range mapping entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40345/">CVE-2025-40345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40345">CVE-2025-40345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255279">SUSE bug 1255279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40346</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40346" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40346" ref_url="https://www.suse.com/security/cve/CVE-2025-40346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arch_topology: Fix incorrect error check in topology_parse_cpu_capacity()

Fix incorrect use of PTR_ERR_OR_ZERO() in topology_parse_cpu_capacity()
which causes the code to proceed with NULL clock pointers. The current
logic uses !PTR_ERR_OR_ZERO(cpu_clk) which evaluates to true for both
valid pointers and NULL, leading to potential NULL pointer dereference
in clk_get_rate().

Per include/linux/err.h documentation, PTR_ERR_OR_ZERO(ptr) returns:
"The error code within @ptr if it is an error pointer; 0 otherwise."

This means PTR_ERR_OR_ZERO() returns 0 for both valid pointers AND NULL
pointers. Therefore !PTR_ERR_OR_ZERO(cpu_clk) evaluates to true (proceed)
when cpu_clk is either valid or NULL, causing clk_get_rate(NULL) to be
called when of_clk_get() returns NULL.

Replace with !IS_ERR_OR_NULL(cpu_clk) which only proceeds for valid
pointers, preventing potential NULL pointer dereference in clk_get_rate().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40346/">CVE-2025-40346 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40346">CVE-2025-40346 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255318">SUSE bug 1255318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40347</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40347" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40347" ref_url="https://www.suse.com/security/cve/CVE-2025-40347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: enetc: fix the deadlock of enetc_mdio_lock

After applying the workaround for err050089, the LS1028A platform
experiences RCU stalls on RT kernel. This issue is caused by the
recursive acquisition of the read lock enetc_mdio_lock. Here list some
of the call stacks identified under the enetc_poll path that may lead to
a deadlock:

enetc_poll
  -&gt; enetc_lock_mdio
  -&gt; enetc_clean_rx_ring OR napi_complete_done
     -&gt; napi_gro_receive
        -&gt; enetc_start_xmit
           -&gt; enetc_lock_mdio
           -&gt; enetc_map_tx_buffs
           -&gt; enetc_unlock_mdio
  -&gt; enetc_unlock_mdio

After enetc_poll acquires the read lock, a higher-priority writer attempts
to acquire the lock, causing preemption. The writer detects that a
read lock is already held and is scheduled out. However, readers under
enetc_poll cannot acquire the read lock again because a writer is already
waiting, leading to a thread hang.

Currently, the deadlock is avoided by adjusting enetc_lock_mdio to prevent
recursive lock acquisition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40347/">CVE-2025-40347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40347">CVE-2025-40347 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255262">SUSE bug 1255262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40349</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40349" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40349" ref_url="https://www.suse.com/security/cve/CVE-2025-40349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hfs: validate record offset in hfsplus_bmap_alloc

hfsplus_bmap_alloc can trigger a crash if a
record offset or length is larger than node_size

[   15.264282] BUG: KASAN: slab-out-of-bounds in hfsplus_bmap_alloc+0x887/0x8b0
[   15.265192] Read of size 8 at addr ffff8881085ca188 by task test/183
[   15.265949]
[   15.266163] CPU: 0 UID: 0 PID: 183 Comm: test Not tainted 6.17.0-rc2-gc17b750b3ad9 #14 PREEMPT(voluntary)
[   15.266165] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.266167] Call Trace:
[   15.266168]  &lt;TASK&gt;
[   15.266169]  dump_stack_lvl+0x53/0x70
[   15.266173]  print_report+0xd0/0x660
[   15.266181]  kasan_report+0xce/0x100
[   15.266185]  hfsplus_bmap_alloc+0x887/0x8b0
[   15.266208]  hfs_btree_inc_height.isra.0+0xd5/0x7c0
[   15.266217]  hfsplus_brec_insert+0x870/0xb00
[   15.266222]  __hfsplus_ext_write_extent+0x428/0x570
[   15.266225]  __hfsplus_ext_cache_extent+0x5e/0x910
[   15.266227]  hfsplus_ext_read_extent+0x1b2/0x200
[   15.266233]  hfsplus_file_extend+0x5a7/0x1000
[   15.266237]  hfsplus_get_block+0x12b/0x8c0
[   15.266238]  __block_write_begin_int+0x36b/0x12c0
[   15.266251]  block_write_begin+0x77/0x110
[   15.266252]  cont_write_begin+0x428/0x720
[   15.266259]  hfsplus_write_begin+0x51/0x100
[   15.266262]  cont_write_begin+0x272/0x720
[   15.266270]  hfsplus_write_begin+0x51/0x100
[   15.266274]  generic_perform_write+0x321/0x750
[   15.266285]  generic_file_write_iter+0xc3/0x310
[   15.266289]  __kernel_write_iter+0x2fd/0x800
[   15.266296]  dump_user_range+0x2ea/0x910
[   15.266301]  elf_core_dump+0x2a94/0x2ed0
[   15.266320]  vfs_coredump+0x1d85/0x45e0
[   15.266349]  get_signal+0x12e3/0x1990
[   15.266357]  arch_do_signal_or_restart+0x89/0x580
[   15.266362]  irqentry_exit_to_user_mode+0xab/0x110
[   15.266364]  asm_exc_page_fault+0x26/0x30
[   15.266366] RIP: 0033:0x41bd35
[   15.266367] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 9f 0b 00 00 66 0f ef c0 &lt;f3&gt; 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8f
[   15.266369] RSP: 002b:00007ffc9e62d078 EFLAGS: 00010283
[   15.266371] RAX: 00007ffc9e62d100 RBX: 0000000000000000 RCX: 0000000000000000
[   15.266372] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007ffc9e62d100
[   15.266373] RBP: 0000400000000040 R08: 00000000000000e0 R09: 0000000000000000
[   15.266374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[   15.266375] R13: 0000000000000000 R14: 0000000000000000 R15: 0000400000000000
[   15.266376]  &lt;/TASK&gt;

When calling hfsplus_bmap_alloc to allocate a free node, this function
first retrieves the bitmap from header node and map node using node-&gt;page
together with the offset and length from hfs_brec_lenoff

```
len = hfs_brec_lenoff(node, 2, &amp;off16);
off = off16;

off += node-&gt;page_offset;
pagep = node-&gt;page + (off &gt;&gt; PAGE_SHIFT);
data = kmap_local_page(*pagep);
```

However, if the retrieved offset or length is invalid(i.e. exceeds
node_size), the code may end up accessing pages outside the allocated
range for this node.

This patch adds proper validation of both offset and length before use,
preventing out-of-bounds page access. Move is_bnode_offset_valid and
check_and_correct_requested_length to hfsplus_fs.h, as they may be
required by other functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40349/">CVE-2025-40349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40349">CVE-2025-40349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255280">SUSE bug 1255280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40350</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40350" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40350" ref_url="https://www.suse.com/security/cve/CVE-2025-40350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding RQ

XDP programs can change the layout of an xdp_buff through
bpf_xdp_adjust_tail() and bpf_xdp_adjust_head(). Therefore, the driver
cannot assume the size of the linear data area nor fragments. Fix the
bug in mlx5 by generating skb according to xdp_buff after XDP programs
run.

Currently, when handling multi-buf XDP, the mlx5 driver assumes the
layout of an xdp_buff to be unchanged. That is, the linear data area
continues to be empty and fragments remain the same. This may cause
the driver to generate erroneous skb or triggering a kernel
warning. When an XDP program added linear data through
bpf_xdp_adjust_head(), the linear data will be ignored as
mlx5e_build_linear_skb() builds an skb without linear data and then
pull data from fragments to fill the linear data area. When an XDP
program has shrunk the non-linear data through bpf_xdp_adjust_tail(),
the delta passed to __pskb_pull_tail() may exceed the actual nonlinear
data size and trigger the BUG_ON in it.

To fix the issue, first record the original number of fragments. If the
number of fragments changes after the XDP program runs, rewind the end
fragment pointer by the difference and recalculate the truesize. Then,
build the skb with the linear data area matching the xdp_buff. Finally,
only pull data in if there is non-linear data and fill the linear part
up to 256 bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40350/">CVE-2025-40350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40350">CVE-2025-40350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255260">SUSE bug 1255260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40351</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40351" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40351" ref_url="https://www.suse.com/security/cve/CVE-2025-40351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()

The syzbot reported issue in hfsplus_delete_cat():

[   70.682285][ T9333] =====================================================
[   70.682943][ T9333] BUG: KMSAN: uninit-value in hfsplus_subfolders_dec+0x1d7/0x220
[   70.683640][ T9333]  hfsplus_subfolders_dec+0x1d7/0x220
[   70.684141][ T9333]  hfsplus_delete_cat+0x105d/0x12b0
[   70.684621][ T9333]  hfsplus_rmdir+0x13d/0x310
[   70.685048][ T9333]  vfs_rmdir+0x5ba/0x810
[   70.685447][ T9333]  do_rmdir+0x964/0xea0
[   70.685833][ T9333]  __x64_sys_rmdir+0x71/0xb0
[   70.686260][ T9333]  x64_sys_call+0xcd8/0x3cf0
[   70.686695][ T9333]  do_syscall_64+0xd9/0x1d0
[   70.687119][ T9333]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   70.687646][ T9333]
[   70.687856][ T9333] Uninit was stored to memory at:
[   70.688311][ T9333]  hfsplus_subfolders_inc+0x1c2/0x1d0
[   70.688779][ T9333]  hfsplus_create_cat+0x148e/0x1800
[   70.689231][ T9333]  hfsplus_mknod+0x27f/0x600
[   70.689730][ T9333]  hfsplus_mkdir+0x5a/0x70
[   70.690146][ T9333]  vfs_mkdir+0x483/0x7a0
[   70.690545][ T9333]  do_mkdirat+0x3f2/0xd30
[   70.690944][ T9333]  __x64_sys_mkdir+0x9a/0xf0
[   70.691380][ T9333]  x64_sys_call+0x2f89/0x3cf0
[   70.691816][ T9333]  do_syscall_64+0xd9/0x1d0
[   70.692229][ T9333]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   70.692773][ T9333]
[   70.692990][ T9333] Uninit was stored to memory at:
[   70.693469][ T9333]  hfsplus_subfolders_inc+0x1c2/0x1d0
[   70.693960][ T9333]  hfsplus_create_cat+0x148e/0x1800
[   70.694438][ T9333]  hfsplus_fill_super+0x21c1/0x2700
[   70.694911][ T9333]  mount_bdev+0x37b/0x530
[   70.695320][ T9333]  hfsplus_mount+0x4d/0x60
[   70.695729][ T9333]  legacy_get_tree+0x113/0x2c0
[   70.696167][ T9333]  vfs_get_tree+0xb3/0x5c0
[   70.696588][ T9333]  do_new_mount+0x73e/0x1630
[   70.697013][ T9333]  path_mount+0x6e3/0x1eb0
[   70.697425][ T9333]  __se_sys_mount+0x733/0x830
[   70.697857][ T9333]  __x64_sys_mount+0xe4/0x150
[   70.698269][ T9333]  x64_sys_call+0x2691/0x3cf0
[   70.698704][ T9333]  do_syscall_64+0xd9/0x1d0
[   70.699117][ T9333]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   70.699730][ T9333]
[   70.699946][ T9333] Uninit was created at:
[   70.700378][ T9333]  __alloc_pages_noprof+0x714/0xe60
[   70.700843][ T9333]  alloc_pages_mpol_noprof+0x2a2/0x9b0
[   70.701331][ T9333]  alloc_pages_noprof+0xf8/0x1f0
[   70.701774][ T9333]  allocate_slab+0x30e/0x1390
[   70.702194][ T9333]  ___slab_alloc+0x1049/0x33a0
[   70.702635][ T9333]  kmem_cache_alloc_lru_noprof+0x5ce/0xb20
[   70.703153][ T9333]  hfsplus_alloc_inode+0x5a/0xd0
[   70.703598][ T9333]  alloc_inode+0x82/0x490
[   70.703984][ T9333]  iget_locked+0x22e/0x1320
[   70.704428][ T9333]  hfsplus_iget+0x5c/0xba0
[   70.704827][ T9333]  hfsplus_btree_open+0x135/0x1dd0
[   70.705291][ T9333]  hfsplus_fill_super+0x1132/0x2700
[   70.705776][ T9333]  mount_bdev+0x37b/0x530
[   70.706171][ T9333]  hfsplus_mount+0x4d/0x60
[   70.706579][ T9333]  legacy_get_tree+0x113/0x2c0
[   70.707019][ T9333]  vfs_get_tree+0xb3/0x5c0
[   70.707444][ T9333]  do_new_mount+0x73e/0x1630
[   70.707865][ T9333]  path_mount+0x6e3/0x1eb0
[   70.708270][ T9333]  __se_sys_mount+0x733/0x830
[   70.708711][ T9333]  __x64_sys_mount+0xe4/0x150
[   70.709158][ T9333]  x64_sys_call+0x2691/0x3cf0
[   70.709630][ T9333]  do_syscall_64+0xd9/0x1d0
[   70.710053][ T9333]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   70.710611][ T9333]
[   70.710842][ T9333] CPU: 3 UID: 0 PID: 9333 Comm: repro Not tainted 6.12.0-rc6-dirty #17
[   70.711568][ T9333] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   70.712490][ T9333] =====================================================
[   70.713085][ T9333] Disabling lock debugging due to kernel taint
[   70.713618][ T9333] Kernel panic - not syncing: kmsan.panic set ...
[   70.714159][ T9333] 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-17"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40351/">CVE-2025-40351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40351">CVE-2025-40351 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255281">SUSE bug 1255281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40353</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40353" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40353" ref_url="https://www.suse.com/security/cve/CVE-2025-40353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: mte: Do not warn if the page is already tagged in copy_highpage()

The arm64 copy_highpage() assumes that the destination page is newly
allocated and not MTE-tagged (PG_mte_tagged unset) and warns
accordingly. However, following commit 060913999d7a ("mm: migrate:
support poisoned recover from migrate folio"), folio_mc_copy() is called
before __folio_migrate_mapping(). If the latter fails (-EAGAIN), the
copy will be done again to the same destination page. Since
copy_highpage() already set the PG_mte_tagged flag, this second copy
will warn.

Replace the WARN_ON_ONCE(page already tagged) in the arm64
copy_highpage() with a comment.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40353/">CVE-2025-40353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40353">CVE-2025-40353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255312">SUSE bug 1255312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40354</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40354" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40354" ref_url="https://www.suse.com/security/cve/CVE-2025-40354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: increase max link count and fix link-&gt;enc NULL pointer access

[why]
1.) dc-&gt;links[MAX_LINKS] array size smaller than actual requested.
max_connector + max_dpia + 4 virtual = 14.
increase from 12 to 14.

2.) hw_init() access null LINK_ENC for dpia non display_endpoint.

(cherry picked from commit d7f5a61e1b04ed87b008c8d327649d184dc5bb45)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40354/">CVE-2025-40354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40354">CVE-2025-40354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255316">SUSE bug 1255316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40355</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40355" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40355" ref_url="https://www.suse.com/security/cve/CVE-2025-40355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sysfs: check visibility before changing group attribute ownership

Since commit 0c17270f9b92 ("net: sysfs: Implement is_visible for
phys_(port_id, port_name, switch_id)"), __dev_change_net_namespace() can
hit WARN_ON() when trying to change owner of a file that isn't visible.
See the trace below:

 WARNING: CPU: 6 PID: 2938 at net/core/dev.c:12410 __dev_change_net_namespace+0xb89/0xc30
 CPU: 6 UID: 0 PID: 2938 Comm: incusd Not tainted 6.17.1-1-mainline #1 PREEMPT(full)  4b783b4a638669fb644857f484487d17cb45ed1f
 Hardware name: Framework Laptop 13 (AMD Ryzen 7040Series)/FRANMDCP07, BIOS 03.07 02/19/2025
 RIP: 0010:__dev_change_net_namespace+0xb89/0xc30
 [...]
 Call Trace:
  &lt;TASK&gt;
  ? if6_seq_show+0x30/0x50
  do_setlink.isra.0+0xc7/0x1270
  ? __nla_validate_parse+0x5c/0xcc0
  ? security_capable+0x94/0x1a0
  rtnl_newlink+0x858/0xc20
  ? update_curr+0x8e/0x1c0
  ? update_entity_lag+0x71/0x80
  ? sched_balance_newidle+0x358/0x450
  ? psi_task_switch+0x113/0x2a0
  ? __pfx_rtnl_newlink+0x10/0x10
  rtnetlink_rcv_msg+0x346/0x3e0
  ? sched_clock+0x10/0x30
  ? __pfx_rtnetlink_rcv_msg+0x10/0x10
  netlink_rcv_skb+0x59/0x110
  netlink_unicast+0x285/0x3c0
  ? __alloc_skb+0xdb/0x1a0
  netlink_sendmsg+0x20d/0x430
  ____sys_sendmsg+0x39f/0x3d0
  ? import_iovec+0x2f/0x40
  ___sys_sendmsg+0x99/0xe0
  __sys_sendmsg+0x8a/0xf0
  do_syscall_64+0x81/0x970
  ? __sys_bind+0xe3/0x110
  ? syscall_exit_work+0x143/0x1b0
  ? do_syscall_64+0x244/0x970
  ? sock_alloc_file+0x63/0xc0
  ? syscall_exit_work+0x143/0x1b0
  ? do_syscall_64+0x244/0x970
  ? alloc_fd+0x12e/0x190
  ? put_unused_fd+0x2a/0x70
  ? do_sys_openat2+0xa2/0xe0
  ? syscall_exit_work+0x143/0x1b0
  ? do_syscall_64+0x244/0x970
  ? exc_page_fault+0x7e/0x1a0
  entry_SYSCALL_64_after_hwframe+0x76/0x7e
 [...]
  &lt;/TASK&gt;

Fix this by checking is_visible() before trying to touch the attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40355/">CVE-2025-40355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40355">CVE-2025-40355 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255261">SUSE bug 1255261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40357</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40357" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40357" ref_url="https://www.suse.com/security/cve/CVE-2025-40357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix general protection fault in __smc_diag_dump

The syzbot report a crash:

  Oops: general protection fault, probably for non-canonical address 0xfbd5a5d5a0000003: 0000 [#1] SMP KASAN NOPTI
  KASAN: maybe wild-memory-access in range [0xdead4ead00000018-0xdead4ead0000001f]
  CPU: 1 UID: 0 PID: 6949 Comm: syz.0.335 Not tainted syzkaller #0 PREEMPT(full)
  Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
  RIP: 0010:smc_diag_msg_common_fill net/smc/smc_diag.c:44 [inline]
  RIP: 0010:__smc_diag_dump.constprop.0+0x3ca/0x2550 net/smc/smc_diag.c:89
  Call Trace:
   &lt;TASK&gt;
   smc_diag_dump_proto+0x26d/0x420 net/smc/smc_diag.c:217
   smc_diag_dump+0x27/0x90 net/smc/smc_diag.c:234
   netlink_dump+0x539/0xd30 net/netlink/af_netlink.c:2327
   __netlink_dump_start+0x6d6/0x990 net/netlink/af_netlink.c:2442
   netlink_dump_start include/linux/netlink.h:341 [inline]
   smc_diag_handler_dump+0x1f9/0x240 net/smc/smc_diag.c:251
   __sock_diag_cmd net/core/sock_diag.c:249 [inline]
   sock_diag_rcv_msg+0x438/0x790 net/core/sock_diag.c:285
   netlink_rcv_skb+0x158/0x420 net/netlink/af_netlink.c:2552
   netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]
   netlink_unicast+0x5a7/0x870 net/netlink/af_netlink.c:1346
   netlink_sendmsg+0x8d1/0xdd0 net/netlink/af_netlink.c:1896
   sock_sendmsg_nosec net/socket.c:714 [inline]
   __sock_sendmsg net/socket.c:729 [inline]
   ____sys_sendmsg+0xa95/0xc70 net/socket.c:2614
   ___sys_sendmsg+0x134/0x1d0 net/socket.c:2668
   __sys_sendmsg+0x16d/0x220 net/socket.c:2700
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xcd/0x4e0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
   &lt;/TASK&gt;

The process like this:

               (CPU1)              |             (CPU2)
  ---------------------------------|-------------------------------
  inet_create()                    |
    // init clcsock to NULL        |
    sk = sk_alloc()                |
                                   |
    // unexpectedly change clcsock |
    inet_init_csk_locks()          |
                                   |
    // add sk to hash table        |
    smc_inet_init_sock()           |
      smc_sk_init()                |
        smc_hash_sk()              |
                                   | // traverse the hash table
                                   | smc_diag_dump_proto
                                   |   __smc_diag_dump()
                                   |     // visit wrong clcsock
                                   |     smc_diag_msg_common_fill()
    // alloc clcsock               |
    smc_create_clcsk               |
      sock_create_kern             |

With CONFIG_DEBUG_LOCK_ALLOC=y, the smc-&gt;clcsock is unexpectedly changed
in inet_init_csk_locks(). The INET_PROTOSW_ICSK flag is no need by smc,
just remove it.

After removing the INET_PROTOSW_ICSK flag, this patch alse revert
commit 6fd27ea183c2 ("net/smc: fix lacks of icsk_syn_mss with IPPROTO_SMC")
to avoid casting smc_sock to inet_connection_sock.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40357/">CVE-2025-40357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40357">CVE-2025-40357 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255097">SUSE bug 1255097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40358</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40358" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40358" ref_url="https://www.suse.com/security/cve/CVE-2025-40358" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: stacktrace: Disable KASAN checks for non-current tasks

Unwinding the stack of a task other than current, KASAN would report
"BUG: KASAN: out-of-bounds in walk_stackframe+0x41c/0x460"

There is a same issue on x86 and has been resolved by the commit
84936118bdf3 ("x86/unwind: Disable KASAN checks for non-current tasks")
The solution could be applied to RISC-V too.

This patch also can solve the issue:
https://seclists.org/oss-sec/2025/q4/23

[pjw@kernel.org: clean up checkpatch issues]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40358/">CVE-2025-40358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40358">CVE-2025-40358 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255096">SUSE bug 1255096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40359</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40359" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40359" ref_url="https://www.suse.com/security/cve/CVE-2025-40359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel: Fix KASAN global-out-of-bounds warning

When running "perf mem record" command on CWF, the below KASAN
global-out-of-bounds warning is seen.

  ==================================================================
  BUG: KASAN: global-out-of-bounds in cmt_latency_data+0x176/0x1b0
  Read of size 4 at addr ffffffffb721d000 by task dtlb/9850

  Call Trace:

   kasan_report+0xb8/0xf0
   cmt_latency_data+0x176/0x1b0
   setup_arch_pebs_sample_data+0xf49/0x2560
   intel_pmu_drain_arch_pebs+0x577/0xb00
   handle_pmi_common+0x6c4/0xc80

The issue is caused by below code in __grt_latency_data(). The code
tries to access x86_hybrid_pmu structure which doesn't exist on
non-hybrid platform like CWF.

        WARN_ON_ONCE(hybrid_pmu(event-&gt;pmu)-&gt;pmu_type == hybrid_big)

So add is_hybrid() check before calling this WARN_ON_ONCE to fix the
global-out-of-bounds access issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40359/">CVE-2025-40359 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40359">CVE-2025-40359 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255087">SUSE bug 1255087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40360</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40360" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40360" ref_url="https://www.suse.com/security/cve/CVE-2025-40360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/sysfb: Do not dereference NULL pointer in plane reset

The plane state in __drm_gem_reset_shadow_plane() can be NULL. Do not
deref that pointer, but forward NULL to the other plane-reset helpers.
Clears plane-&gt;state to NULL.

v2:
- fix typo in commit description (Javier)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40360/">CVE-2025-40360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40360">CVE-2025-40360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255095">SUSE bug 1255095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40362</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40362" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40362" ref_url="https://www.suse.com/security/cve/CVE-2025-40362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix multifs mds auth caps issue

The mds auth caps check should also validate the
fsname along with the associated caps. Not doing
so would result in applying the mds auth caps of
one fs on to the other fs in a multifs ceph cluster.
The bug causes multiple issues w.r.t user
authentication, following is one such example.

Steps to Reproduce (on vstart cluster):
1. Create two file systems in a cluster, say 'fsname1' and 'fsname2'
2. Authorize read only permission to the user 'client.usr' on fs 'fsname1'
    $ceph fs authorize fsname1 client.usr / r
3. Authorize read and write permission to the same user 'client.usr' on fs 'fsname2'
    $ceph fs authorize fsname2 client.usr / rw
4. Update the keyring
    $ceph auth get client.usr &gt;&gt; ./keyring

With above permssions for the user 'client.usr', following is the
expectation.
  a. The 'client.usr' should be able to only read the contents
     and not allowed to create or delete files on file system 'fsname1'.
  b. The 'client.usr' should be able to read/write on file system 'fsname2'.

But, with this bug, the 'client.usr' is allowed to read/write on file
system 'fsname1'. See below.

5. Mount the file system 'fsname1' with the user 'client.usr'
     $sudo bin/mount.ceph usr@.fsname1=/ /kmnt_fsname1_usr/
6. Try creating a file on file system 'fsname1' with user 'client.usr'. This
   should fail but passes with this bug.
     $touch /kmnt_fsname1_usr/file1
7. Mount the file system 'fsname1' with the user 'client.admin' and create a
   file.
     $sudo bin/mount.ceph admin@.fsname1=/ /kmnt_fsname1_admin
     $echo "data" &gt; /kmnt_fsname1_admin/admin_file1
8. Try removing an existing file on file system 'fsname1' with the user
   'client.usr'. This shoudn't succeed but succeeds with the bug.
     $rm -f /kmnt_fsname1_usr/admin_file1

For more information, please take a look at the corresponding mds/fuse patch
and tests added by looking into the tracker mentioned below.

v2: Fix a possible null dereference in doutc
v3: Don't store fsname from mdsmap, validate against
    ceph_mount_options's fsname and use it
v4: Code refactor, better warning message and
    fix possible compiler warning

[ Slava.Dubeyko: "fsname check failed" -&gt; "fsname mismatch" ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40362/">CVE-2025-40362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40362">CVE-2025-40362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255103">SUSE bug 1255103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255104">SUSE bug 1255104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40363</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40363" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40363" ref_url="https://www.suse.com/security/cve/CVE-2025-40363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ipv6: fix field-spanning memcpy warning in AH output

Fix field-spanning memcpy warnings in ah6_output() and
ah6_output_done() where extension headers are copied to/from IPv6
address fields, triggering fortify-string warnings about writes beyond
the 16-byte address fields.

  memcpy: detected field-spanning write (size 40) of single field "&amp;top_iph-&gt;saddr" at net/ipv6/ah6.c:439 (size 16)
  WARNING: CPU: 0 PID: 8838 at net/ipv6/ah6.c:439 ah6_output+0xe7e/0x14e0 net/ipv6/ah6.c:439

The warnings are false positives as the extension headers are
intentionally placed after the IPv6 header in memory. Fix by properly
copying addresses and extension headers separately, and introduce
helper functions to avoid code duplication.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40363/">CVE-2025-40363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40363">CVE-2025-40363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255102">SUSE bug 1255102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40364</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40364" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40364" ref_url="https://www.suse.com/security/cve/CVE-2025-40364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix io_req_prep_async with provided buffers

io_req_prep_async() can import provided buffers, commit the ring state
by giving up on that before, it'll be reimported later if needed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40364/">CVE-2025-40364 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40364">CVE-2025-40364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241637">SUSE bug 1241637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032145" comment="kernel-default-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032146" comment="kernel-rt-livepatch-6.12.0-160000.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202541244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-41244</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-41244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-41244" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-41244" ref_url="https://www.suse.com/security/cve/CVE-2025-41244" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17428" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002073.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17509" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:20677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03434-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03535-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20866-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023876.html" source="SUSE-SU"/>
    <description>
    VMware Aria Operations and VMware Tools contain a local privilege escalation vulnerability.  A malicious local actor with non-administrative privileges having access to a VM with VMware Tools  installed and managed by Aria Operations with SDMP enabled may exploit this vulnerability to escalate privileges to root on the same VM.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-41244/">CVE-2025-41244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-41244">CVE-2025-41244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250373">SUSE bug 1250373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039558" comment="libvmtools0-13.0.5-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039559" comment="open-vm-tools-13.0.5-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202545512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-45512</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-45512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-45512" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-45512" ref_url="https://www.suse.com/security/cve/CVE-2025-45512" source="SUSE CVE"/>
    <description>
    A lack of signature verification in the bootloader of DENX Software Engineering Das U-Boot (U-Boot) v1.1.3 allows attackers to install crafted firmware files, leading to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-17"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-45512/">CVE-2025-45512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-45512">CVE-2025-45512 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247734">SUSE bug 1247734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334115" comment="u-boot is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202545582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-45582</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-45582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-45582" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-45582" ref_url="https://www.suse.com/security/cve/CVE-2025-45582" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0067" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1177-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20955-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20959-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21002-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045404.html" source="SUSE-SU"/>
    <description>
    GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of "Member name contains '..'" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain "x -&gt; ../../../../../home/victim/.ssh" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal. This can also affect software installation processes in which "tar xf" is run more than once (e.g., when installing a package can automatically install two dependencies that are set up as untrusted tarballs instead of official packages). NOTE: the official GNU Tar manual has an otherwise-empty directory for each "tar xf" in its Security Rules of Thumb; however, third-party advice leads users to run "tar xf" more than once into the same directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-45582/">CVE-2025-45582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-45582">CVE-2025-45582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246399">SUSE bug 1246399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053388" comment="tar-1.35-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4565</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4565" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4565" ref_url="https://www.suse.com/security/cve/CVE-2025-4565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20514-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025106.html" source="SUSE-SU"/>
    <description>
    Any project that uses Protobuf Pure-Python backend  to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP  tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =&gt;6.31.1 or beyond commit  17838beda2943d08b8a9d4df5b68f5f04f26d901
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4565/">CVE-2025-4565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4565">CVE-2025-4565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244663">SUSE bug 1244663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050016" comment="libprotobuf28_3_0-28.3-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050017" comment="libutf8_range-28_3_0-28.3-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202546836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-46836</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-46836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46836" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-46836" ref_url="https://www.suse.com/security/cve/CVE-2025-46836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02974-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03245-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03260-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20747-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20948-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045254.html" source="SUSE-SU"/>
    <description>
    net-tools is a collection of programs that form the base set of the NET-3 networking distribution for the Linux operating system. Inn versions up to and including 2.10, the Linux network utilities (like ifconfig) from the net-tools package do not properly validate the structure of /proc files when showing interfaces. `get_name()` in `interface.c` copies interface labels from `/proc/net/dev` into a fixed 16-byte stack buffer without bounds checking, leading to possible arbitrary code execution or crash. The known attack path does not require privilege but also does not provide privilege escalation in this scenario. A patch is available and expected to be part of version 2.20.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46836/">CVE-2025-46836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46836">CVE-2025-46836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243581">SUSE bug 1243581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052277" comment="net-tools-2.10-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47291</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47291" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47291" ref_url="https://www.suse.com/security/cve/CVE-2025-47291" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2025:15159-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBVOKYMJCE2HZLSF5W3H3Q7KEHMMOQR3/" source="SUSE-SU"/>
    <description>
    containerd is an open-source container runtime. A bug was found in the containerd's CRI implementation where containerd, starting in version 2.0.1 and prior to version 2.0.5, doesn't put usernamespaced containers under the Kubernetes' cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node. This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue. As a workaround, disable usernamespaced pods in Kubernetes temporarily.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47291/">CVE-2025-47291 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47291">CVE-2025-47291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243632">SUSE bug 1243632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663792" comment="containerd is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334435" comment="docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953331" comment="docker-buildx is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958738" comment="docker-compose is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47911</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47911" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024734.html" source="SUSE-SU"/>
    <description>
    The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251308">SUSE bug 1251308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041418" comment="elemental-register-1.8.1-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041419" comment="elemental-support-1.8.1-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041666" comment="elemental-toolkit-2.3.2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047570" comment="helm-3.19.1-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047571" comment="helm-bash-completion-3.19.1-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009343329" comment="podman is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958376" comment="podman-docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871694" comment="podman-remote is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958377" comment="podmansh is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47913</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47913" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0437" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003134.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003176.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0753" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002398.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1084" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20949-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045355.html" source="SUSE-SU"/>
    <description>
    SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253506">SUSE bug 1253506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010052590" comment="docker-compose-2.33.1-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041418" comment="elemental-register-1.8.1-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041419" comment="elemental-support-1.8.1-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041666" comment="elemental-toolkit-2.3.2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047314" comment="podman-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047315" comment="podman-docker-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047316" comment="podman-remote-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047317" comment="podmansh-5.4.2-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47914</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47914" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47914" ref_url="https://www.suse.com/security/cve/CVE-2025-47914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20949-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045355.html" source="SUSE-SU"/>
    <description>
    SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47914/">CVE-2025-47914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47914">CVE-2025-47914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253967">SUSE bug 1253967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010052590" comment="docker-compose-2.33.1-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041418" comment="elemental-register-1.8.1-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041419" comment="elemental-support-1.8.1-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041666" comment="elemental-toolkit-2.3.2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047314" comment="podman-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047315" comment="podman-docker-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047316" comment="podman-remote-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047317" comment="podmansh-5.4.2-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4953</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4953" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4953" ref_url="https://www.suse.com/security/cve/CVE-2025-4953" source="SUSE CVE"/>
    <description>
    A flaw was found in Podman. In a Containerfile or Podman, data written to RUN --mount=type=bind mounts during the podman build is not discarded. This issue can lead to files created within the container appearing in the temporary build context directory on the host, leaving the created files accessible.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4953/">CVE-2025-4953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4953">CVE-2025-4953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249835">SUSE bug 1249835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009343329" comment="podman is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958376" comment="podman-docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871694" comment="podman-remote is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958377" comment="podmansh is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5244</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5244" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5244" ref_url="https://www.suse.com/security/cve/CVE-2025-5244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils up to 2.44. It has been rated as critical. Affected by this issue is the function elf_gc_sweep of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 2.45 is able to address this issue. It is recommended to upgrade the affected component.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-5244/">CVE-2025-5244 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5244">CVE-2025-5244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243756">SUSE bug 1243756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5245</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5245" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5245" ref_url="https://www.suse.com/security/cve/CVE-2025-5245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as critical has been found in GNU Binutils up to 2.44. This affects the function debug_type_samep of the file /binutils/debug.c of the component objdump. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5245/">CVE-2025-5245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5245">CVE-2025-5245 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243760">SUSE bug 1243760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202552565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-52565</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-52565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52565" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-52565" ref_url="https://www.suse.com/security/cve/CVE-2025-52565" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002207.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20957" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003086.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21232" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4073-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers according to the OCI specification. Versions 1.0.0-rc3 through 1.2.7, 1.3.0-rc.1 through 1.3.2, and 1.4.0-rc.1 through 1.4.0-rc.2, due to insufficient checks when bind-mounting `/dev/pts/$n` to `/dev/console` inside the container, an attacker can trick runc into bind-mounting paths which would normally be made read-only or be masked onto a path that the attacker can write to. This attack is very similar in concept and application to CVE-2025-31133, except that it attacks a similar vulnerability in a different target (namely, the bind-mount of `/dev/pts/$n` to `/dev/console` as configured for all containers that allocate a console). This happens after `pivot_root(2)`, so this cannot be used to write to host files directly -- however, as with CVE-2025-31133, this can load to denial of service of the host or a container breakout by providing the attacker with a writable copy of `/proc/sysrq-trigger` or `/proc/sys/kernel/core_pattern` (respectively). This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52565/">CVE-2025-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52565">CVE-2025-52565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252232">SUSE bug 1252232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255063">SUSE bug 1255063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010047314" comment="podman-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047315" comment="podman-docker-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047316" comment="podman-remote-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047317" comment="podmansh-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030577" comment="runc-1.3.3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334435" comment="docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953331" comment="docker-buildx is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202552881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-52881</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-52881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52881" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002207.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20957" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003086.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21232" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002236.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21702" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003127.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22030" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002275.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23543" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4073-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts (we have also verified this attack is possible to exploit using a standard Dockerfile with docker buildx build as that also permits triggering parallel execution of containers with custom shared mounts configured). This redirect could be through symbolic links in a tmpfs or theoretically other methods such as regular bind-mounts. While similar, the mitigation applied for the related CVE, CVE-2019-19921, was fairly limited and effectively only caused runc to verify that when LSM labels are written they are actually procfs files. This issue is fixed in versions 1.2.8, 1.3.3, and 1.4.0-rc.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252232">SUSE bug 1252232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255063">SUSE bug 1255063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010047314" comment="podman-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047315" comment="podman-docker-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047316" comment="podman-remote-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047317" comment="podmansh-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030577" comment="runc-1.3.3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334435" comment="docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953331" comment="docker-buildx is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53906</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53906" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53906" ref_url="https://www.suse.com/security/cve/CVE-2025-53906" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17715" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002070.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17742" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002089.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20945" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03240-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20857-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025100.html" source="SUSE-SU"/>
    <description>
    Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim's zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-53906/">CVE-2025-53906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53906">CVE-2025-53906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246602">SUSE bug 1246602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050022" comment="vim-data-common-9.2.0110-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050023" comment="vim-small-9.2.0110-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202554388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-54388</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-54388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54388" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-54388" ref_url="https://www.suse.com/security/cve/CVE-2025-54388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02912-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02913-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02914-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20743-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023877.html" source="SUSE-SU"/>
    <description>
    Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. In versions 28.2.0 through 28.3.2, when the firewalld service is reloaded it removes all iptables rules including those created by Docker. While Docker should automatically recreate these rules, versions before 28.3.3 fail to recreate the specific rules that block external access to containers. This means that after a firewalld reload, containers with ports published to localhost (like 127.0.0.1:8080) become accessible from remote machines that have network routing to the Docker bridge, even though they should only be accessible from the host itself. The vulnerability only affects explicitly published ports - unpublished ports remain protected. This issue is fixed in version 28.3.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54388/">CVE-2025-54388 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54388">CVE-2025-54388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247367">SUSE bug 1247367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037884" comment="docker-28.5.1_ce-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037886" comment="docker-buildx-0.29.0-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202554770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-54770</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-54770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54770" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-54770" ref_url="https://www.suse.com/security/cve/CVE-2025-54770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023439.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been identified in the GRUB2 bootloader's network module that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the net_set_vlan command is not properly unregistered when the network module is unloaded from memory. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-19"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54770/">CVE-2025-54770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54770">CVE-2025-54770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252930">SUSE bug 1252930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010034125" comment="grub2-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034126" comment="grub2-arm64-efi-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034131" comment="grub2-common-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034132" comment="grub2-i386-pc-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034135" comment="grub2-powerpc-ieee1275-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034138" comment="grub2-s390x-emu-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034141" comment="grub2-snapper-plugin-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034143" comment="grub2-x86_64-efi-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034147" comment="grub2-x86_64-xen-2.12-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202554771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-54771</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-54771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54771" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-54771" ref_url="https://www.suse.com/security/cve/CVE-2025-54771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023439.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability has been identified in the GNU GRUB (Grand Unified Bootloader). The flaw occurs because the file-closing process incorrectly retains a memory pointer, leaving an invalid reference to a file system structure. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-19"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54771/">CVE-2025-54771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54771">CVE-2025-54771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252931">SUSE bug 1252931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010034125" comment="grub2-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034126" comment="grub2-arm64-efi-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034131" comment="grub2-common-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034132" comment="grub2-i386-pc-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034135" comment="grub2-powerpc-ieee1275-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034138" comment="grub2-s390x-emu-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034141" comment="grub2-snapper-plugin-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034143" comment="grub2-x86_64-efi-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034147" comment="grub2-x86_64-xen-2.12-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202554798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-54798</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-54798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54798" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-54798" ref_url="https://www.suse.com/security/cve/CVE-2025-54798" source="SUSE CVE"/>
    <description>
    tmp is a temporary file and directory creator for node.js. In versions 0.2.3 and below, tmp is vulnerable to an arbitrary temporary file / directory write via symbolic link dir parameter. This is fixed in version 0.2.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54798/">CVE-2025-54798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54798">CVE-2025-54798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247787">SUSE bug 1247787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750401" comment="cockpit-podman is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55159</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55159" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55159" ref_url="https://www.suse.com/security/cve/CVE-2025-55159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02957-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02962-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024836.html" source="SUSE-SU"/>
    <description>
    slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab's capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab's actual length.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55159/">CVE-2025-55159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55159">CVE-2025-55159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248000">SUSE bug 1248000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010047574" comment="gstreamer-1.26.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047584" comment="gstreamer-plugins-base-1.26.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047602" comment="libgstallocators-1_0-0-1.26.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047604" comment="libgstapp-1_0-0-1.26.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047605" comment="libgstaudio-1_0-0-1.26.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047613" comment="libgstgl-1_0-0-1.26.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047618" comment="libgstpbutils-1_0-0-1.26.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047622" comment="libgstreamer-1_0-0-1.26.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047623" comment="libgstriff-1_0-0-1.26.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047629" comment="libgsttag-1_0-0-1.26.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047634" comment="libgstvideo-1_0-0-1.26.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010049113" comment="rust-keylime-0.2.8+116-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855782" comment="aardvark-dns is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009742210" comment="afterburn is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009742211" comment="afterburn-dracut is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009337725" comment="gdk-pixbuf-loader-rsvg is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009337726" comment="librsvg-2-2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855783" comment="netavark is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016082" comment="nm-configurator is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029144" comment="python313-maturin is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855784" comment="libekmfweb1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855803" comment="libkmipclient1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855787" comment="s390-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859140" comment="s390-tools-genprotimg-data is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855810" comment="sevctl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013777" comment="virtiofsd is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58058</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58058" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58058" ref_url="https://www.suse.com/security/cve/CVE-2025-58058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/041996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024058.html" source="SUSE-SU"/>
    <description>
    xz is a pure golang package for reading and writing xz-compressed files. Prior to version 0.5.14, it is possible to put data in front of an LZMA-encoded byte stream without detecting the situation while reading the header. This can lead to increased memory consumption because the current implementation allocates the full decoding buffer directly after reading the header. The LZMA header doesn't include a magic number or has a checksum to detect such an issue according to the specification. Note that the code recognizes the issue later while reading the stream, but at this time the memory allocation has already been done. This issue has been patched in version 0.5.14.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58058/">CVE-2025-58058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58058">CVE-2025-58058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248889">SUSE bug 1248889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009343329" comment="podman is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958376" comment="podman-docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871694" comment="podman-remote is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958377" comment="podmansh is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659876" comment="skopeo is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58060</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58060" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58060" ref_url="https://www.suse.com/security/cve/CVE-2025-58060" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002001.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15702" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001997.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17054" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03178-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024560.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, when the `AuthType` is set to anything but `Basic`, if the request contains an `Authorization: Basic ...` header, the password is not checked. This results in authentication bypass. Any configuration that allows an `AuthType` that is not `Basic` is affected. Version 2.4.13 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58060/">CVE-2025-58060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58060">CVE-2025-58060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249049">SUSE bug 1249049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010042224" comment="cups-config-2.4.16-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042227" comment="libcups2-2.4.16-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58160</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58160" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58160" ref_url="https://www.suse.com/security/cve/CVE-2025-58160" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2026:20990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024263.html" source="SUSE-SU"/>
    <description>
    tracing is a framework for instrumenting Rust programs to collect structured, event-based diagnostic information. Prior to version 0.3.20, tracing-subscriber was vulnerable to ANSI escape sequence injection attacks. Untrusted user input containing ANSI escape sequences could be injected into terminal output when logged, potentially allowing attackers to manipulate terminal title bars, clear screens or modify terminal display, and potentially mislead users through terminal manipulation. tracing-subscriber version 0.3.20 fixes this vulnerability by escaping ANSI control characters when writing events to destinations that may be printed to the terminal. A workaround involves avoiding printing logs to terminal emulators without escaping ANSI control sequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-04-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58160/">CVE-2025-58160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58160">CVE-2025-58160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249007">SUSE bug 1249007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042305" comment="python313-maturin-1.8.7-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58181</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58181" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025109.html" source="SUSE-SU"/>
    <description>
    SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253784">SUSE bug 1253784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010044571" comment="docker-28.5.1_ce-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044573" comment="docker-buildx-0.29.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041418" comment="elemental-register-1.8.1-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041419" comment="elemental-support-1.8.1-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041666" comment="elemental-toolkit-2.3.2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958738" comment="docker-compose is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009343329" comment="podman is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958376" comment="podman-docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871694" comment="podman-remote is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958377" comment="podmansh is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58190</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58190" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024734.html" source="SUSE-SU"/>
    <description>
    The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251309">SUSE bug 1251309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041418" comment="elemental-register-1.8.1-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041419" comment="elemental-support-1.8.1-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041666" comment="elemental-toolkit-2.3.2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047570" comment="helm-3.19.1-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047571" comment="helm-bash-completion-3.19.1-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334435" comment="docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953331" comment="docker-buildx is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958738" comment="docker-compose is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009343329" comment="podman is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958376" comment="podman-docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871694" comment="podman-remote is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958377" comment="podmansh is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58266</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58266" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58266" ref_url="https://www.suse.com/security/cve/CVE-2025-58266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024836.html" source="SUSE-SU"/>
    <description>
    Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fumiki Takahashi Gianism gianism allows Stored XSS.This issue affects Gianism: from n/a through &lt;= 6.0.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-58266/">CVE-2025-58266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58266">CVE-2025-58266 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010049113" comment="rust-keylime-0.2.8+116-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58364</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58364" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58364" ref_url="https://www.suse.com/security/cve/CVE-2025-58364" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002001.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03178-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024560.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, an unsafe deserialization and validation of printer attributes causes null dereference in the libcups library. This is a remote DoS vulnerability available in local subnet in default configurations. It can cause the cups &amp; cups-browsed to crash, on all the machines in local network who are listening for printers (so by default for all regular linux machines). On systems where the vulnerability CVE-2024-47176 (cups-filters 1.x/cups-browsed 2.x vulnerability) was not fixed, and the firewall on the machine does not reject incoming communication to IPP port, and the machine is set to be available to public internet, attack vector "Network" is possible. The current versions of CUPS and cups-browsed projects have the attack vector "Adjacent" in their default configurations. Version 2.4.13 contains a patch for CVE-2025-58364.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-58364/">CVE-2025-58364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58364">CVE-2025-58364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249128">SUSE bug 1249128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010042224" comment="cups-config-2.4.16-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042227" comment="libcups2-2.4.16-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58436</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58436" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58436" ref_url="https://www.suse.com/security/cve/CVE-2025-58436" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0312" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003168.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0596" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024560.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a client that connects to cupsd but sends slow messages, e.g. only one byte per second, delays cupsd as a whole, such that it becomes unusable by other clients. This issue has been patched in version 2.4.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58436/">CVE-2025-58436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58436">CVE-2025-58436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244057">SUSE bug 1244057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010042224" comment="cups-config-2.4.16-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042227" comment="libcups2-2.4.16-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59343</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59343" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59343" ref_url="https://www.suse.com/security/cve/CVE-2025-59343" source="SUSE CVE"/>
    <description>
    tar-fs provides filesystem bindings for tar-stream. Versions prior to 3.1.1, 2.1.3, and 1.16.5 are vulnerable to symlink validation bypass if the destination directory is predictable with a specific tarball. This issue has been patched in version 3.1.1, 2.1.4, and 1.16.6. A workaround involves using the ignore option on non files/directories.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59343/">CVE-2025-59343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59343">CVE-2025-59343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250515">SUSE bug 1250515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009750396" comment="cockpit is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750397" comment="cockpit-bridge is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029139" comment="cockpit-firewalld is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029140" comment="cockpit-kdump is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750404" comment="cockpit-networkmanager is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750405" comment="cockpit-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750406" comment="cockpit-storaged is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750399" comment="cockpit-system is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750400" comment="cockpit-ws is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029142" comment="cockpit-ws-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750402" comment="cockpit-machines is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59375</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59375" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59375" ref_url="https://www.suse.com/security/cve/CVE-2025-59375" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21773" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21776" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002247.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002294.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22175" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003146.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3407" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03508-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03536-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03624-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59375/">CVE-2025-59375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59375">CVE-2025-59375 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249584">SUSE bug 1249584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030544" comment="libexpat1-2.7.1-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59438</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59438" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59438" ref_url="https://www.suse.com/security/cve/CVE-2025-59438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21018-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045388.html" source="SUSE-SU"/>
    <description>
    Mbed TLS through 3.6.4 has an Observable Timing Discrepancy.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-13"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59438/">CVE-2025-59438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59438">CVE-2025-59438 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252433">SUSE bug 1252433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056323" comment="qemu-ovmf-x86_64-202502-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056324" comment="qemu-uefi-aarch64-202502-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59777</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59777" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59777" ref_url="https://www.suse.com/security/cve/CVE-2025-59777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023745.html" source="SUSE-SU"/>
    <description>
    NULL pointer dereference vulnerability exists in GNU libmicrohttpd v1.0.2 and earlier. The vulnerability was fixed in commit ff13abc on the master branch of the libmicrohttpd Git repository, after the v1.0.2 tag. A specially crafted packet sent by an attacker could cause a denial-of-service (DoS) condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59777/">CVE-2025-59777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59777">CVE-2025-59777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253177">SUSE bug 1253177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037184" comment="libmicrohttpd12-1.0.1-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6032</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6032" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6032" ref_url="https://www.suse.com/security/cve/CVE-2025-6032" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10550" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001767.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10551" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02806-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20692-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20805-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Podman. The podman machine init command fails to verify the TLS certificate when downloading the VM images from an OCI registry. This issue results in a Man In The Middle attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6032/">CVE-2025-6032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6032">CVE-2025-6032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245320">SUSE bug 1245320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010047314" comment="podman-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047315" comment="podman-docker-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047316" comment="podman-remote-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047317" comment="podmansh-5.4.2-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6069</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6069" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6069" ref_url="https://www.suse.com/security/cve/CVE-2025-6069" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23342" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003140.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23530" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02427-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02460-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02523-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02597-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20492-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20539-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
    <description>
    The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6069/">CVE-2025-6069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6069">CVE-2025-6069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244705">SUSE bug 1244705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039656" comment="libpython3_13-1_0-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039659" comment="python313-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039660" comment="python313-base-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039662" comment="python313-curses-3.13.11-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6075</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6075" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6075" ref_url="https://www.suse.com/security/cve/CVE-2025-6075" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23342" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003140.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23530" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4257-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
    <description>
    If the value passed to os.path.expandvars() is user-controlled a 
performance degradation is possible when expanding environment 
variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-6075/">CVE-2025-6075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6075">CVE-2025-6075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252974">SUSE bug 1252974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039656" comment="libpython3_13-1_0-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039659" comment="python313-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039660" comment="python313-base-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039662" comment="python313-curses-3.13.11-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61143</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61143" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61143" ref_url="https://www.suse.com/security/cve/CVE-2025-61143" source="SUSE CVE"/>
    <description>
    libtiff up to v4.7.1 was discovered to contain a NULL pointer dereference via the component libtiff/tif_open.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-61143/">CVE-2025-61143 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61143">CVE-2025-61143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258798">SUSE bug 1258798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859129" comment="libtiff6 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61144</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61144" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61144" ref_url="https://www.suse.com/security/cve/CVE-2025-61144" source="SUSE CVE"/>
    <description>
    libtiff up to v4.7.1 was discovered to contain a stack overflow via the readSeparateStripsIntoBuffer function.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-61144/">CVE-2025-61144 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61144">CVE-2025-61144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258801">SUSE bug 1258801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859129" comment="libtiff6 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61661</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61661" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61661" ref_url="https://www.suse.com/security/cve/CVE-2025-61661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023439.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been identified in the GRUB (Grand Unified Bootloader) component. This flaw occurs because the bootloader mishandles string conversion when reading information from a USB device, allowing an attacker to exploit inconsistent length values. A local attacker can connect a maliciously configured USB device during the boot sequence to trigger this issue. A successful exploitation may lead GRUB to crash, leading to a Denial of Service. Data corruption may be also possible, although given the complexity of the exploit the impact is most likely limited.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-19"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="4.3/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61661/">CVE-2025-61661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61661">CVE-2025-61661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252932">SUSE bug 1252932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010034125" comment="grub2-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034126" comment="grub2-arm64-efi-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034131" comment="grub2-common-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034132" comment="grub2-i386-pc-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034135" comment="grub2-powerpc-ieee1275-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034138" comment="grub2-s390x-emu-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034141" comment="grub2-snapper-plugin-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034143" comment="grub2-x86_64-efi-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034147" comment="grub2-x86_64-xen-2.12-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61662</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61662" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61662" ref_url="https://www.suse.com/security/cve/CVE-2025-61662" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0049" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002611.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4148" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002610.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4648" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002582.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003262.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4823" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023439.html" source="SUSE-SU"/>
    <description>
    A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-19"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61662/">CVE-2025-61662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61662">CVE-2025-61662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252933">SUSE bug 1252933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010034125" comment="grub2-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034126" comment="grub2-arm64-efi-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034131" comment="grub2-common-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034132" comment="grub2-i386-pc-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034135" comment="grub2-powerpc-ieee1275-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034138" comment="grub2-s390x-emu-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034141" comment="grub2-snapper-plugin-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034143" comment="grub2-x86_64-efi-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034147" comment="grub2-x86_64-xen-2.12-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61663</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61663" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61663" ref_url="https://www.suse.com/security/cve/CVE-2025-61663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023439.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been identified in the GRUB2 bootloader's normal command that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the normal command is not properly unregistered when the module is unloaded. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability. Impact on the data integrity and confidentiality is also not discarded.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-19"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61663/">CVE-2025-61663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61663">CVE-2025-61663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252934">SUSE bug 1252934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010034125" comment="grub2-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034126" comment="grub2-arm64-efi-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034131" comment="grub2-common-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034132" comment="grub2-i386-pc-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034135" comment="grub2-powerpc-ieee1275-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034138" comment="grub2-s390x-emu-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034141" comment="grub2-snapper-plugin-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034143" comment="grub2-x86_64-efi-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034147" comment="grub2-x86_64-xen-2.12-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61664</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61664" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61664" ref_url="https://www.suse.com/security/cve/CVE-2025-61664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023439.html" source="SUSE-SU"/>
    <description>
    A vulnerability in the GRUB2 bootloader has been identified in the normal module. This flaw, a memory Use After Free issue, occurs because the normal_exit command is not properly unregistered when its related module is unloaded. An attacker can exploit this condition by invoking the command after the module has been removed, causing the system to improperly access a previously freed memory location. This leads to a system crash or possible impacts in data confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-19"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61664/">CVE-2025-61664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61664">CVE-2025-61664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252935">SUSE bug 1252935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010034125" comment="grub2-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034126" comment="grub2-arm64-efi-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034131" comment="grub2-common-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034132" comment="grub2-i386-pc-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034135" comment="grub2-powerpc-ieee1275-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034138" comment="grub2-s390x-emu-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034141" comment="grub2-snapper-plugin-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034143" comment="grub2-x86_64-efi-2.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034147" comment="grub2-x86_64-xen-2.12-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61915</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61915" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61915" ref_url="https://www.suse.com/security/cve/CVE-2025-61915" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0312" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003168.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0596" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024560.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a user in the lpadmin group can use the cups web ui to change the config and insert a malicious line. Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write. This issue has been patched in version 2.4.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61915/">CVE-2025-61915 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61915">CVE-2025-61915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253783">SUSE bug 1253783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010042224" comment="cups-config-2.4.16-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042227" comment="libcups2-2.4.16-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61984</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61984" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61984" ref_url="https://www.suse.com/security/cve/CVE-2025-61984" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23480" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23481" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002307.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0693" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024750.html" source="SUSE-SU"/>
    <description>
    ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61984/">CVE-2025-61984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61984">CVE-2025-61984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251198">SUSE bug 1251198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010032319" comment="openssh-10.0p2-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032322" comment="openssh-clients-10.0p2-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032323" comment="openssh-common-10.0p2-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032325" comment="openssh-server-10.0p2-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032326" comment="openssh-server-config-rootlogin-10.0p2-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61985</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61985" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61985" ref_url="https://www.suse.com/security/cve/CVE-2025-61985" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23480" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23481" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002307.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0693" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024750.html" source="SUSE-SU"/>
    <description>
    ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61985/">CVE-2025-61985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61985">CVE-2025-61985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251199">SUSE bug 1251199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010032319" comment="openssh-10.0p2-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032322" comment="openssh-clients-10.0p2-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032323" comment="openssh-common-10.0p2-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032325" comment="openssh-server-10.0p2-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032326" comment="openssh-server-config-rootlogin-10.0p2-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6199</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6199" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6199" ref_url="https://www.suse.com/security/cve/CVE-2025-6199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02954-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03373-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20128-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023946.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the GIF parser of GdkPixbuf's LZW decoder. When an invalid symbol is encountered during decompression, the decoder sets the reported output size to the full buffer length rather than the actual number of written bytes. This logic error results in uninitialized sections of the buffer being included in the output, potentially leaking arbitrary memory contents in the processed image.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6199/">CVE-2025-6199 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6199">CVE-2025-6199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245227">SUSE bug 1245227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039695" comment="gdk-pixbuf-query-loaders-2.42.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039697" comment="libgdk_pixbuf-2_0-0-2.42.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039698" comment="typelib-1_0-GdkPixbuf-2_0-2.42.12-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62689</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62689" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62689" ref_url="https://www.suse.com/security/cve/CVE-2025-62689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023745.html" source="SUSE-SU"/>
    <description>
    NULL pointer dereference vulnerability exists in GNU libmicrohttpd v1.0.2 and earlier. The vulnerability was fixed in commit ff13abc on the master branch of the libmicrohttpd Git repository, after the v1.0.2 tag. A specially crafted packet sent by an attacker could cause a denial-of-service (DoS) condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-62689/">CVE-2025-62689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62689">CVE-2025-62689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253178">SUSE bug 1253178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037184" comment="libmicrohttpd12-1.0.1-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62718</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62718" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62718" ref_url="https://www.suse.com/security/cve/CVE-2025-62718" source="SUSE CVE"/>
    <description>
    Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0, Axios does not correctly handle hostname normalization when checking NO_PROXY rules. Requests to loopback addresses like localhost. (with a trailing dot) or [::1] (IPv6 literal) skip NO_PROXY matching and go through the configured proxy. This goes against what developers expect and lets attackers force requests through a proxy, even if NO_PROXY is set up to protect loopback or internal services. This issue leads to the possibility of proxy bypass and SSRF vulnerabilities allowing attackers to reach sensitive loopback or internal services despite the configured protections. This vulnerability is fixed in 1.15.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62718/">CVE-2025-62718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62718">CVE-2025-62718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261867">SUSE bug 1261867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009750396" comment="cockpit is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750397" comment="cockpit-bridge is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029139" comment="cockpit-firewalld is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029140" comment="cockpit-kdump is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750404" comment="cockpit-networkmanager is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750405" comment="cockpit-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750406" comment="cockpit-storaged is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750399" comment="cockpit-system is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750400" comment="cockpit-ws is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029142" comment="cockpit-ws-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750402" comment="cockpit-machines is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62725</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62725" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62725" ref_url="https://www.suse.com/security/cve/CVE-2025-62725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20949-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045355.html" source="SUSE-SU"/>
    <description>
    Docker Compose trusts the path information embedded in remote OCI compose artifacts. When a layer includes the annotations com.docker.compose.extends or com.docker.compose.envfile, Compose joins the attacker-supplied value from com.docker.compose.file/com.docker.compose.envfile with its local cache directory and writes the file there. This affects any platform or workflow that resolves remote OCI compose artifacts, Docker Desktop, standalone Compose binaries on Linux, CI/CD runners, cloud dev environments is affected. An attacker can escape the cache directory and overwrite arbitrary files on the machine running docker compose, even if the user only runs read-only commands such as docker compose config or docker compose ps. This issue is fixed in v2.40.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-62725/">CVE-2025-62725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62725">CVE-2025-62725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252752">SUSE bug 1252752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052590" comment="docker-compose-2.33.1-160000.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64324</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64324" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64324" ref_url="https://www.suse.com/security/cve/CVE-2025-64324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024607.html" source="SUSE-SU"/>
    <description>
    KubeVirt is a virtual machine management add-on for Kubernetes. The `hostDisk` feature in KubeVirt allows mounting a host file or directory owned by the user with UID 107 into a VM. However, prior to version 1.6.1 and 1.7.0, the implementation of this feature and more specifically the `DiskOrCreate` option (which creates a file if it doesn't exist) has a logic bug that allows an attacker to read and write arbitrary files owned by more privileged users on the host system. Versions 1.6.1 and 1.7.0 fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-64324/">CVE-2025-64324 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64324">CVE-2025-64324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253748">SUSE bug 1253748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045701" comment="kubevirt-manifests-1.7.0-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045713" comment="kubevirt-virtctl-1.7.0-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64432</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64432" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64432" ref_url="https://www.suse.com/security/cve/CVE-2025-64432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024607.html" source="SUSE-SU"/>
    <description>
    KubeVirt is a virtual machine management add-on for Kubernetes. Versions 1.5.3 and below, and 1.6.0 contained a flawed implementation of the Kubernetes aggregation layer's authentication flow which could enable bypass of RBAC controls. It was discovered that the virt-api component fails to correctly authenticate the client when receiving API requests over mTLS. In particular, it fails to validate the CN (Common Name) field in the received client TLS certificates against the set of allowed values defined in the extension-apiserver-authentication configmap. Failre to validate certain fields in the client TLS certificate may allow an attacker to bypass existing RBAC controls by directly communicating with the aggregated API server, impersonating the Kubernetes API server and its aggregator component. This issue is fixed in versions 1.5.3 and 1.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64432/">CVE-2025-64432 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64432">CVE-2025-64432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253181">SUSE bug 1253181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045701" comment="kubevirt-manifests-1.7.0-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045713" comment="kubevirt-virtctl-1.7.0-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64433</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64433" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64433" ref_url="https://www.suse.com/security/cve/CVE-2025-64433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024607.html" source="SUSE-SU"/>
    <description>
    KubeVirt is a virtual machine management add-on for Kubernetes. Prior to 1.5.3 and 1.6.1, a vulnerability was discovered that allows a VM to read arbitrary files from the virt-launcher pod's file system. This issue stems from improper symlink handling when mounting PVC disks into a VM. Specifically, if a malicious user has full or partial control over the contents of a PVC, they can create a symbolic link that points to a file within the virt-launcher pod's file system. Since libvirt can treat regular files as block devices, any file on the pod's file system that is symlinked in this way can be mounted into the VM and subsequently read. Although a security mechanism exists where VMs are executed as an unprivileged user with UID 107 inside the virt-launcher container, limiting the scope of accessible resources, this restriction is bypassed due to a second vulnerability. The latter causes the ownership of any file intended for mounting to be changed to the unprivileged user with UID 107 prior to mounting. As a result, an attacker can gain access to and read arbitrary files located within the virt-launcher pod's file system or on a mounted PVC from within the guest VM. This vulnerability is fixed in 1.5.3 and 1.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64433/">CVE-2025-64433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64433">CVE-2025-64433 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253185">SUSE bug 1253185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045701" comment="kubevirt-manifests-1.7.0-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045713" comment="kubevirt-virtctl-1.7.0-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64434</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64434" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64434" ref_url="https://www.suse.com/security/cve/CVE-2025-64434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024607.html" source="SUSE-SU"/>
    <description>
    KubeVirt is a virtual machine management add-on for Kubernetes. Prior to 1.5.3 and 1.6.1, due to the peer verification logic in virt-handler (via verifyPeerCert), an attacker who compromises a virt-handler instance, could exploit these shared credentials to impersonate virt-api and execute privileged operations against other virt-handler instances potentially compromising the integrity and availability of the VM managed by it. This vulnerability is fixed in 1.5.3 and 1.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64434/">CVE-2025-64434 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64434">CVE-2025-64434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253186">SUSE bug 1253186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045701" comment="kubevirt-manifests-1.7.0-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045713" comment="kubevirt-virtctl-1.7.0-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64435</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64435" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64435" ref_url="https://www.suse.com/security/cve/CVE-2025-64435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024607.html" source="SUSE-SU"/>
    <description>
    KubeVirt is a virtual machine management add-on for Kubernetes. Prior to 1.7.0-beta.0, a logic flaw in the virt-controller allows an attacker to disrupt the control over a running VMI by creating a pod with the same labels as the legitimate virt-launcher pod associated with the VMI. This can mislead the virt-controller into associating the fake pod with the VMI, resulting in incorrect status updates and potentially causing a DoS (Denial-of-Service). This vulnerability is fixed in 1.7.0-beta.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64435/">CVE-2025-64435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64435">CVE-2025-64435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253189">SUSE bug 1253189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045701" comment="kubevirt-manifests-1.7.0-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045713" comment="kubevirt-virtctl-1.7.0-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64437</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64437" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64437" ref_url="https://www.suse.com/security/cve/CVE-2025-64437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024607.html" source="SUSE-SU"/>
    <description>
    KubeVirt is a virtual machine management add-on for Kubernetes. In versions before 1.5.3 and 1.6.1, the virt-handler does not verify whether the launcher-sock is a symlink or a regular file. This oversight can be exploited, for example, to change the ownership of arbitrary files on the host node to the unprivileged user with UID 107 (the same user used by virt-launcher) thus, compromising the CIA (Confidentiality, Integrity and Availability) of data on the host. To successfully exploit this vulnerability, an attacker should be in control of the file system of the virt-launcher pod. This vulnerability is fixed in 1.5.3 and 1.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64437/">CVE-2025-64437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64437">CVE-2025-64437 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253194">SUSE bug 1253194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045701" comment="kubevirt-manifests-1.7.0-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045713" comment="kubevirt-virtctl-1.7.0-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64505</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64505" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64505" ref_url="https://www.suse.com/security/cve/CVE-2025-64505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023744.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64505/">CVE-2025-64505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64505">CVE-2025-64505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254157">SUSE bug 1254157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037185" comment="libpng16-16-1.6.44-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64506</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64506" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64506" ref_url="https://www.suse.com/security/cve/CVE-2025-64506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023744.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64506/">CVE-2025-64506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64506">CVE-2025-64506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254158">SUSE bug 1254158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037185" comment="libpng16-16-1.6.44-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64718</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64718" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64718" ref_url="https://www.suse.com/security/cve/CVE-2025-64718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024623.html" source="SUSE-SU"/>
    <description>
    js-yaml is a JavaScript YAML parser and dumper. In js-yaml before 4.1.1 and 3.14.2, it's possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution (`__proto__`). All users who parse untrusted yaml documents may be impacted. The problem is patched in js-yaml 4.1.1 and 3.14.2. Users can protect against this kind of attack on the server by using `node --disable-proto=delete` or `deno` (in Deno, pollution protection is on by default).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64718/">CVE-2025-64718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64718">CVE-2025-64718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255407">SUSE bug 1255407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010044577" comment="cockpit-repos-4.7-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041320" comment="cockpit-subscriptions-12.1-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750403" comment="cockpit-tukit is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64720</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64720" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0125" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002348.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002416.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003141.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002359.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002409.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002427.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002431.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023744.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha x 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254159">SUSE bug 1254159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037185" comment="libpng16-16-1.6.44-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202565018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-65018</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-65018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65018" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0125" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002348.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002416.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003141.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002359.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002409.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002427.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002431.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023744.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254160">SUSE bug 1254160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037185" comment="libpng16-16-1.6.44-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6545</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6545" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6545" ref_url="https://www.suse.com/security/cve/CVE-2025-6545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:3744-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042269.html" source="SUSE-SU"/>
    <description>
    Improper Input Validation vulnerability in pbkdf2 allows Signature Spoofing by Improper Validation. This vulnerability is associated with program files lib/to-buffer.Js.

This issue affects pbkdf2: from 3.0.10 through 3.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6545/">CVE-2025-6545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6545">CVE-2025-6545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245273">SUSE bug 1245273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009750396" comment="cockpit is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750397" comment="cockpit-bridge is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029139" comment="cockpit-firewalld is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029140" comment="cockpit-kdump is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750404" comment="cockpit-networkmanager is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750405" comment="cockpit-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750406" comment="cockpit-storaged is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750399" comment="cockpit-system is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750400" comment="cockpit-ws is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029142" comment="cockpit-ws-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750401" comment="cockpit-podman is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66199</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66199" ref_url="https://www.suse.com/security/cve/CVE-2025-66199" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: A TLS 1.3 connection using certificate compression can be
forced to allocate a large buffer before decompression without checking
against the configured certificate size limit.

Impact summary: An attacker can cause per-connection memory allocations of
up to approximately 22 MiB and extra CPU work, potentially leading to
service degradation or resource exhaustion (Denial of Service).

In affected configurations, the peer-supplied uncompressed certificate
length from a CompressedCertificate message is used to grow a heap buffer
prior to decompression. This length is not bounded by the max_cert_list
setting, which otherwise constrains certificate message sizes. An attacker
can exploit this to cause large per-connection allocations followed by
handshake failure. No memory corruption or information disclosure occurs.

This issue only affects builds where TLS 1.3 certificate compression is
compiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression
algorithm (brotli, zlib, or zstd) is available, and where the compression
extension is negotiated. Both clients receiving a server CompressedCertificate
and servers in mutual TLS scenarios receiving a client CompressedCertificate
are affected. Servers that do not request client certificates are not
vulnerable to client-initiated attacks.

Users can mitigate this issue by setting SSL_OP_NO_RX_CERTIFICATE_COMPRESSION
to disable receiving compressed certificates.

The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,
as the TLS implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.

OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66199/">CVE-2025-66199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66199">CVE-2025-66199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256833">SUSE bug 1256833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941029" comment="openssl-3-livepatches is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66293</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66293" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66293" ref_url="https://www.suse.com/security/cve/CVE-2025-66293" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0125" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002348.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002416.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003141.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023744.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng's simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng's internal state management. Upgrade to libpng 1.6.52 or later.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66293/">CVE-2025-66293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66293">CVE-2025-66293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254480">SUSE bug 1254480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037185" comment="libpng16-16-1.6.44-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66418</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66418" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1087" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003188.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003216.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1089" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003205.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1239" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003190.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1240" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002454.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1332" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002445.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1619" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002467.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1704" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002462.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024616.html" source="SUSE-SU"/>
    <description>
    urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254866">SUSE bug 1254866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041351" comment="python313-urllib3-2.5.0-160000.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66471</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66471" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66471" ref_url="https://www.suse.com/security/cve/CVE-2025-66471" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1087" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003188.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003216.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1089" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003205.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1239" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003190.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1240" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002454.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1619" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002467.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1704" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002462.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1706" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002464.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024616.html" source="SUSE-SU"/>
    <description>
    urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66471/">CVE-2025-66471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66471">CVE-2025-66471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254867">SUSE bug 1254867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041351" comment="python313-urllib3-2.5.0-160000.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66862</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66862" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66862" ref_url="https://www.suse.com/security/cve/CVE-2025-66862" source="SUSE CVE"/>
    <description>
    A buffer overflow vulnerability in function gnu_special in file cplus-dem.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66862/">CVE-2025-66862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66862">CVE-2025-66862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255738">SUSE bug 1255738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009342534" comment="libctf-nobfd0 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009342535" comment="libctf0 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202567724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-67724</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-67724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67724" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-67724" ref_url="https://www.suse.com/security/cve/CVE-2025-67724" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2026:0624-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024938.html" source="SUSE-SU"/>
    <description>
    Tornado is a Python web framework and asynchronous networking library. In versions 6.5.2 and below, the supplied reason phrase is used unescaped in HTTP headers (where it could be used for header injection) or in HTML in the default error page (where it could be used for XSS) and can be exploited by passing untrusted or malicious data into the reason argument. Used by both RequestHandler.set_status and tornado.web.HTTPError, the argument is designed to allow applications to pass custom "reason" phrases (the "Not Found" in HTTP/1.1 404 Not Found) to the HTTP status line (mainly for non-standard status codes). This issue is fixed in version 6.5.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67724/">CVE-2025-67724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-67724">CVE-2025-67724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254903">SUSE bug 1254903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037182" comment="python313-tornado6-6.5-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202567725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-67725</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-67725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67725" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-67725" ref_url="https://www.suse.com/security/cve/CVE-2025-67725" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0624-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024938.html" source="SUSE-SU"/>
    <description>
    Tornado is a Python web framework and asynchronous networking library. In versions 6.5.2 and below, a single maliciously crafted HTTP request can block the server's event loop for an extended period, caused by the HTTPHeaders.add method. The function accumulates values using string concatenation when the same header name is repeated, causing a Denial of Service (DoS).  Due to Python string immutability, each concatenation copies the entire string, resulting in O(n^2) time complexity. The severity can vary from high if max_header_size has been increased from its default, to low if it has its default value of 64KB. This issue is fixed in version 6.5.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67725/">CVE-2025-67725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67725">CVE-2025-67725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254905">SUSE bug 1254905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037182" comment="python313-tornado6-6.5-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202567726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-67726</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-67726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67726" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-67726" ref_url="https://www.suse.com/security/cve/CVE-2025-67726" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0624-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024938.html" source="SUSE-SU"/>
    <description>
    Tornado is a Python web framework and asynchronous networking library. Versions 6.5.2 and below use an inefficient algorithm when parsing parameters for HTTP header values, potentially causing a DoS. The _parseparam function in httputil.py is used to parse specific HTTP header values, such as those in multipart/form-data and repeatedly calls string.count() within a nested loop while processing quoted semicolons. If an attacker sends a request with a large number of maliciously crafted parameters in a Content-Disposition header, the server's CPU usage increases quadratically (O(n^2)) during parsing. Due to Tornado's single event loop architecture, a single malicious request can cause the entire server to become unresponsive for an extended period. This issue is fixed in version 6.5.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67726/">CVE-2025-67726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67726">CVE-2025-67726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254904">SUSE bug 1254904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037182" comment="python313-tornado6-6.5-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68160</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68160" ref_url="https://www.suse.com/security/cve/CVE-2025-68160" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: Writing large, newline-free data into a BIO chain using the
line-buffering filter where the next BIO performs short writes can trigger
a heap-based out-of-bounds write.

Impact summary: This out-of-bounds write can cause memory corruption which
typically results in a crash, leading to Denial of Service for an application.

The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in
TLS/SSL data paths. In OpenSSL command-line applications, it is typically
only pushed onto stdout/stderr on VMS systems. Third-party applications that
explicitly use this filter with a BIO chain that can short-write and that
write large, newline-free data influenced by an attacker would be affected.
However, the circumstances where this could happen are unlikely to be under
attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated
data controlled by an attacker. For that reason the issue was assessed as
Low severity.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the BIO implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68160/">CVE-2025-68160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68160">CVE-2025-68160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256834">SUSE bug 1256834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941029" comment="openssl-3-livepatches is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68167</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68167" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68167" ref_url="https://www.suse.com/security/cve/CVE-2025-68167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpiolib: fix invalid pointer access in debugfs

If the memory allocation in gpiolib_seq_start() fails, the s-&gt;private
field remains uninitialized and is later dereferenced without checking
in gpiolib_seq_stop(). Initialize s-&gt;private to NULL before calling
kzalloc() and check it before dereferencing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68167/">CVE-2025-68167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68167">CVE-2025-68167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255099">SUSE bug 1255099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68168</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68168" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68168" ref_url="https://www.suse.com/security/cve/CVE-2025-68168" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix uninitialized waitqueue in transaction manager

The transaction manager initialization in txInit() was not properly
initializing TxBlock[0].waitor waitqueue, causing a crash when
txEnd(0) is called on read-only filesystems.

When a filesystem is mounted read-only, txBegin() returns tid=0 to
indicate no transaction. However, txEnd(0) still gets called and
tries to access TxBlock[0].waitor via tid_to_tblock(0), but this
waitqueue was never initialized because the initialization loop
started at index 1 instead of 0.

This causes a 'non-static key' lockdep warning and system crash:
  INFO: trying to register non-static key in txEnd

Fix by ensuring all transaction blocks including TxBlock[0] have
their waitqueues properly initialized during txInit().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68168/">CVE-2025-68168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68168">CVE-2025-68168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255100">SUSE bug 1255100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68170</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68170" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68170" ref_url="https://www.suse.com/security/cve/CVE-2025-68170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Do not kfree() devres managed rdev

Since the allocation of the drivers main structure was changed to
devm_drm_dev_alloc() rdev is managed by devres and we shouldn't be calling
kfree() on it.

This fixes things exploding if the driver probe fails and devres cleans up
the rdev after we already free'd it.

(cherry picked from commit 16c0681617b8a045773d4d87b6140002fa75b03b)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68170/">CVE-2025-68170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68170">CVE-2025-68170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255256">SUSE bug 1255256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68171</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68171" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68171" ref_url="https://www.suse.com/security/cve/CVE-2025-68171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/fpu: Ensure XFD state on signal delivery

Sean reported [1] the following splat when running KVM tests:

   WARNING: CPU: 232 PID: 15391 at xfd_validate_state+0x65/0x70
   Call Trace:
    &lt;TASK&gt;
    fpu__clear_user_states+0x9c/0x100
    arch_do_signal_or_restart+0x142/0x210
    exit_to_user_mode_loop+0x55/0x100
    do_syscall_64+0x205/0x2c0
    entry_SYSCALL_64_after_hwframe+0x4b/0x53

Chao further identified [2] a reproducible scenario involving signal
delivery: a non-AMX task is preempted by an AMX-enabled task which
modifies the XFD MSR.

When the non-AMX task resumes and reloads XSTATE with init values,
a warning is triggered due to a mismatch between fpstate::xfd and the
CPU's current XFD state. fpu__clear_user_states() does not currently
re-synchronize the XFD state after such preemption.

Invoke xfd_update_state() which detects and corrects the mismatch if
there is a dynamic feature.

This also benefits the sigreturn path, as fpu__restore_sig() may call
fpu__clear_user_states() when the sigframe is inaccessible.

[ dhansen: minor changelog munging ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68171/">CVE-2025-68171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68171">CVE-2025-68171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255255">SUSE bug 1255255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68172</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68172" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68172" ref_url="https://www.suse.com/security/cve/CVE-2025-68172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: aspeed - fix double free caused by devm

The clock obtained via devm_clk_get_enabled() is automatically managed
by devres and will be disabled and freed on driver detach. Manually
calling clk_disable_unprepare() in error path and remove function
causes double free.

Remove the manual clock cleanup in both aspeed_acry_probe()'s error
path and aspeed_acry_remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68172/">CVE-2025-68172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68172">CVE-2025-68172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255253">SUSE bug 1255253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68173</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68173" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68173" ref_url="https://www.suse.com/security/cve/CVE-2025-68173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ftrace: Fix softlockup in ftrace_module_enable

A soft lockup was observed when loading amdgpu module.
If a module has a lot of tracable functions, multiple calls
to kallsyms_lookup can spend too much time in RCU critical
section and with disabled preemption, causing kernel panic.
This is the same issue that was fixed in
commit d0b24b4e91fc ("ftrace: Prevent RCU stall on PREEMPT_VOLUNTARY
kernels") and commit 42ea22e754ba ("ftrace: Add cond_resched() to
ftrace_graph_set_hash()").

Fix it the same way by adding cond_resched() in ftrace_module_enable.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68173/">CVE-2025-68173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68173">CVE-2025-68173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255311">SUSE bug 1255311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68174</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68174" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68174" ref_url="https://www.suse.com/security/cve/CVE-2025-68174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

amd/amdkfd: enhance kfd process check in switch partition

current switch partition only check if kfd_processes_table is empty.
kfd_prcesses_table entry is deleted in kfd_process_notifier_release, but
kfd_process tear down is in kfd_process_wq_release.

consider two processes:

Process A (workqueue) -&gt; kfd_process_wq_release -&gt; Access kfd_node member
Process B switch partition -&gt; amdgpu_xcp_pre_partition_switch -&gt; amdgpu_amdkfd_device_fini_sw
-&gt; kfd_node tear down.

Process A and B may trigger a race as shown in dmesg log.

This patch is to resolve the race by adding an atomic kfd_process counter
kfd_processes_count, it increment as create kfd process, decrement as
finish kfd_process_wq_release.

v2: Put kfd_processes_count per kfd_dev, move decrement to kfd_process_destroy_pdds
and bug fix. (Philip Yang)

[3966658.307702] divide error: 0000 [#1] SMP NOPTI
[3966658.350818]  i10nm_edac
[3966658.356318] CPU: 124 PID: 38435 Comm: kworker/124:0 Kdump: loaded Tainted
[3966658.356890] Workqueue: kfd_process_wq kfd_process_wq_release [amdgpu]
[3966658.362839]  nfit
[3966658.366457] RIP: 0010:kfd_get_num_sdma_engines+0x17/0x40 [amdgpu]
[3966658.366460] Code: 00 00 e9 ac 81 02 00 66 66 2e 0f 1f 84 00 00 00 00 00 90 0f 1f 44 00 00 48 8b 4f 08 48 8b b7 00 01 00 00 8b 81 58 26 03 00 99 &lt;f7&gt; be b8 01 00 00 80 b9 70 2e 00 00 00 74 0b 83 f8 02 ba 02 00 00
[3966658.380967]  x86_pkg_temp_thermal
[3966658.391529] RSP: 0018:ffffc900a0edfdd8 EFLAGS: 00010246
[3966658.391531] RAX: 0000000000000008 RBX: ffff8974e593b800 RCX: ffff888645900000
[3966658.391531] RDX: 0000000000000000 RSI: ffff888129154400 RDI: ffff888129151c00
[3966658.391532] RBP: ffff8883ad79d400 R08: 0000000000000000 R09: ffff8890d2750af4
[3966658.391532] R10: 0000000000000018 R11: 0000000000000018 R12: 0000000000000000
[3966658.391533] R13: ffff8883ad79d400 R14: ffffe87ff662ba00 R15: ffff8974e593b800
[3966658.391533] FS:  0000000000000000(0000) GS:ffff88fe7f600000(0000) knlGS:0000000000000000
[3966658.391534] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[3966658.391534] CR2: 0000000000d71000 CR3: 000000dd0e970004 CR4: 0000000002770ee0
[3966658.391535] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[3966658.391535] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[3966658.391536] PKRU: 55555554
[3966658.391536] Call Trace:
[3966658.391674]  deallocate_sdma_queue+0x38/0xa0 [amdgpu]
[3966658.391762]  process_termination_cpsch+0x1ed/0x480 [amdgpu]
[3966658.399754]  intel_powerclamp
[3966658.402831]  kfd_process_dequeue_from_all_devices+0x5b/0xc0 [amdgpu]
[3966658.402908]  kfd_process_wq_release+0x1a/0x1a0 [amdgpu]
[3966658.410516]  coretemp
[3966658.434016]  process_one_work+0x1ad/0x380
[3966658.434021]  worker_thread+0x49/0x310
[3966658.438963]  kvm_intel
[3966658.446041]  ? process_one_work+0x380/0x380
[3966658.446045]  kthread+0x118/0x140
[3966658.446047]  ? __kthread_bind_mask+0x60/0x60
[3966658.446050]  ret_from_fork+0x1f/0x30
[3966658.446053] Modules linked in: kpatch_20765354(OEK)
[3966658.455310]  kvm
[3966658.464534]  mptcp_diag xsk_diag raw_diag unix_diag af_packet_diag netlink_diag udp_diag act_pedit act_mirred act_vlan cls_flower kpatch_21951273(OEK) kpatch_18424469(OEK) kpatch_19749756(OEK)
[3966658.473462]  idxd_mdev
[3966658.482306]  kpatch_17971294(OEK) sch_ingress xt_conntrack amdgpu(OE) amdxcp(OE) amddrm_buddy(OE) amd_sched(OE) amdttm(OE) amdkcl(OE) intel_ifs iptable_mangle tcm_loop target_core_pscsi tcp_diag target_core_file inet_diag target_core_iblock target_core_user target_core_mod coldpgs kpatch_18383292(OEK) ip6table_nat ip6table_filter ip6_tables ip_set_hash_ipportip ip_set_hash_ipportnet ip_set_hash_ipport ip_set_bitmap_port xt_comment iptable_nat nf_nat iptable_filter ip_tables ip_set ip_vs_sh ip_vs_wrr ip_vs_rr ip_vs nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 sn_core_odd(OE) i40e overlay binfmt_misc tun bonding(OE) aisqos(OE) aisqo
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68174/">CVE-2025-68174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68174">CVE-2025-68174 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255327">SUSE bug 1255327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68176</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68176" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68176" ref_url="https://www.suse.com/security/cve/CVE-2025-68176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: cadence: Check for the existence of cdns_pcie::ops before using it

cdns_pcie::ops might not be populated by all the Cadence glue drivers. This
is going to be true for the upcoming Sophgo platform which doesn't set the
ops.

Hence, add a check to prevent NULL pointer dereference.

[mani: reworded subject and description]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68176/">CVE-2025-68176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68176">CVE-2025-68176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255329">SUSE bug 1255329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68177</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68177" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68177" ref_url="https://www.suse.com/security/cve/CVE-2025-68177" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq/longhaul: handle NULL policy in longhaul_exit

longhaul_exit() was calling cpufreq_cpu_get(0) without checking
for a NULL policy pointer. On some systems, this could lead to a
NULL dereference and a kernel warning or panic.

This patch adds a check using unlikely() and returns early if the
policy is NULL.

Bugzilla: #219962
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-17"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68177/">CVE-2025-68177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68177">CVE-2025-68177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255323">SUSE bug 1255323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68178</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68178" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68178" ref_url="https://www.suse.com/security/cve/CVE-2025-68178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: fix possible deadlock while configuring policy

Following deadlock can be triggered easily by lockdep:

WARNING: possible circular locking dependency detected
6.17.0-rc3-00124-ga12c2658ced0 #1665 Not tainted
------------------------------------------------------
check/1334 is trying to acquire lock:
ff1100011d9d0678 (&amp;q-&gt;sysfs_lock){+.+.}-{4:4}, at: blk_unregister_queue+0x53/0x180

but task is already holding lock:
ff1100011d9d00e0 (&amp;q-&gt;q_usage_counter(queue)#3){++++}-{0:0}, at: del_gendisk+0xba/0x110

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:

-&gt; #2 (&amp;q-&gt;q_usage_counter(queue)#3){++++}-{0:0}:
       blk_queue_enter+0x40b/0x470
       blkg_conf_prep+0x7b/0x3c0
       tg_set_limit+0x10a/0x3e0
       cgroup_file_write+0xc6/0x420
       kernfs_fop_write_iter+0x189/0x280
       vfs_write+0x256/0x490
       ksys_write+0x83/0x190
       __x64_sys_write+0x21/0x30
       x64_sys_call+0x4608/0x4630
       do_syscall_64+0xdb/0x6b0
       entry_SYSCALL_64_after_hwframe+0x76/0x7e

-&gt; #1 (&amp;q-&gt;rq_qos_mutex){+.+.}-{4:4}:
       __mutex_lock+0xd8/0xf50
       mutex_lock_nested+0x2b/0x40
       wbt_init+0x17e/0x280
       wbt_enable_default+0xe9/0x140
       blk_register_queue+0x1da/0x2e0
       __add_disk+0x38c/0x5d0
       add_disk_fwnode+0x89/0x250
       device_add_disk+0x18/0x30
       virtblk_probe+0x13a3/0x1800
       virtio_dev_probe+0x389/0x610
       really_probe+0x136/0x620
       __driver_probe_device+0xb3/0x230
       driver_probe_device+0x2f/0xe0
       __driver_attach+0x158/0x250
       bus_for_each_dev+0xa9/0x130
       driver_attach+0x26/0x40
       bus_add_driver+0x178/0x3d0
       driver_register+0x7d/0x1c0
       __register_virtio_driver+0x2c/0x60
       virtio_blk_init+0x6f/0xe0
       do_one_initcall+0x94/0x540
       kernel_init_freeable+0x56a/0x7b0
       kernel_init+0x2b/0x270
       ret_from_fork+0x268/0x4c0
       ret_from_fork_asm+0x1a/0x30

-&gt; #0 (&amp;q-&gt;sysfs_lock){+.+.}-{4:4}:
       __lock_acquire+0x1835/0x2940
       lock_acquire+0xf9/0x450
       __mutex_lock+0xd8/0xf50
       mutex_lock_nested+0x2b/0x40
       blk_unregister_queue+0x53/0x180
       __del_gendisk+0x226/0x690
       del_gendisk+0xba/0x110
       sd_remove+0x49/0xb0 [sd_mod]
       device_remove+0x87/0xb0
       device_release_driver_internal+0x11e/0x230
       device_release_driver+0x1a/0x30
       bus_remove_device+0x14d/0x220
       device_del+0x1e1/0x5a0
       __scsi_remove_device+0x1ff/0x2f0
       scsi_remove_device+0x37/0x60
       sdev_store_delete+0x77/0x100
       dev_attr_store+0x1f/0x40
       sysfs_kf_write+0x65/0x90
       kernfs_fop_write_iter+0x189/0x280
       vfs_write+0x256/0x490
       ksys_write+0x83/0x190
       __x64_sys_write+0x21/0x30
       x64_sys_call+0x4608/0x4630
       do_syscall_64+0xdb/0x6b0
       entry_SYSCALL_64_after_hwframe+0x76/0x7e

other info that might help us debug this:

Chain exists of:
  &amp;q-&gt;sysfs_lock --&gt; &amp;q-&gt;rq_qos_mutex --&gt; &amp;q-&gt;q_usage_counter(queue)#3

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(&amp;q-&gt;q_usage_counter(queue)#3);
                               lock(&amp;q-&gt;rq_qos_mutex);
                               lock(&amp;q-&gt;q_usage_counter(queue)#3);
  lock(&amp;q-&gt;sysfs_lock);

Root cause is that queue_usage_counter is grabbed with rq_qos_mutex
held in blkg_conf_prep(), while queue should be freezed before
rq_qos_mutex from other context.

The blk_queue_enter() from blkg_conf_prep() is used to protect against
policy deactivation, which is already protected with blkcg_mutex, hence
convert blk_queue_enter() to blkcg_mutex to fix this problem. Meanwhile,
consider that blkcg_mutex is held after queue is freezed from policy
deactivation, also convert blkg_alloc() to use GFP_NOIO.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68178/">CVE-2025-68178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68178">CVE-2025-68178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255266">SUSE bug 1255266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68180</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68180" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68180" ref_url="https://www.suse.com/security/cve/CVE-2025-68180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix NULL deref in debugfs odm_combine_segments

When a connector is connected but inactive (e.g., disabled by desktop
environments), pipe_ctx-&gt;stream_res.tg will be destroyed. Then, reading
odm_combine_segments causes kernel NULL pointer dereference.

 BUG: kernel NULL pointer dereference, address: 0000000000000000
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: Oops: 0000 [#1] SMP NOPTI
 CPU: 16 UID: 0 PID: 26474 Comm: cat Not tainted 6.17.0+ #2 PREEMPT(lazy)  e6a17af9ee6db7c63e9d90dbe5b28ccab67520c6
 Hardware name: LENOVO 21Q4/LNVNB161216, BIOS PXCN25WW 03/27/2025
 RIP: 0010:odm_combine_segments_show+0x93/0xf0 [amdgpu]
 Code: 41 83 b8 b0 00 00 00 01 75 6e 48 98 ba a1 ff ff ff 48 c1 e0 0c 48 8d 8c 07 d8 02 00 00 48 85 c9 74 2d 48 8b bc 07 f0 08 00 00 &lt;48&gt; 8b 07 48 8b 80 08 02 00&gt;
 RSP: 0018:ffffd1bf4b953c58 EFLAGS: 00010286
 RAX: 0000000000005000 RBX: ffff8e35976b02d0 RCX: ffff8e3aeed052d8
 RDX: 00000000ffffffa1 RSI: ffff8e35a3120800 RDI: 0000000000000000
 RBP: 0000000000000000 R08: ffff8e3580eb0000 R09: ffff8e35976b02d0
 R10: ffffd1bf4b953c78 R11: 0000000000000000 R12: ffffd1bf4b953d08
 R13: 0000000000040000 R14: 0000000000000001 R15: 0000000000000001
 FS:  00007f44d3f9f740(0000) GS:ffff8e3caa47f000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000000 CR3: 00000006485c2000 CR4: 0000000000f50ef0
 PKRU: 55555554
 Call Trace:
  &lt;TASK&gt;
  seq_read_iter+0x125/0x490
  ? __alloc_frozen_pages_noprof+0x18f/0x350
  seq_read+0x12c/0x170
  full_proxy_read+0x51/0x80
  vfs_read+0xbc/0x390
  ? __handle_mm_fault+0xa46/0xef0
  ? do_syscall_64+0x71/0x900
  ksys_read+0x73/0xf0
  do_syscall_64+0x71/0x900
  ? count_memcg_events+0xc2/0x190
  ? handle_mm_fault+0x1d7/0x2d0
  ? do_user_addr_fault+0x21a/0x690
  ? exc_page_fault+0x7e/0x1a0
  entry_SYSCALL_64_after_hwframe+0x6c/0x74
 RIP: 0033:0x7f44d4031687
 Code: 48 89 fa 4c 89 df e8 58 b3 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 &lt;5b&gt; c3 0f 1f 80 00 00 00 00&gt;
 RSP: 002b:00007ffdb4b5f0b0 EFLAGS: 00000202 ORIG_RAX: 0000000000000000
 RAX: ffffffffffffffda RBX: 00007f44d3f9f740 RCX: 00007f44d4031687
 RDX: 0000000000040000 RSI: 00007f44d3f5e000 RDI: 0000000000000003
 RBP: 0000000000040000 R08: 0000000000000000 R09: 0000000000000000
 R10: 0000000000000000 R11: 0000000000000202 R12: 00007f44d3f5e000
 R13: 0000000000000003 R14: 0000000000000000 R15: 0000000000040000
  &lt;/TASK&gt;
 Modules linked in: tls tcp_diag inet_diag xt_mark ccm snd_hrtimer snd_seq_dummy snd_seq_midi snd_seq_oss snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device x&gt;
  snd_hda_codec_atihdmi snd_hda_codec_realtek_lib lenovo_wmi_helpers think_lmi snd_hda_codec_generic snd_hda_codec_hdmi snd_soc_core kvm snd_compress uvcvideo sn&gt;
  platform_profile joydev amd_pmc mousedev mac_hid sch_fq_codel uinput i2c_dev parport_pc ppdev lp parport nvme_fabrics loop nfnetlink ip_tables x_tables dm_cryp&gt;
 CR2: 0000000000000000
 ---[ end trace 0000000000000000 ]---
 RIP: 0010:odm_combine_segments_show+0x93/0xf0 [amdgpu]
 Code: 41 83 b8 b0 00 00 00 01 75 6e 48 98 ba a1 ff ff ff 48 c1 e0 0c 48 8d 8c 07 d8 02 00 00 48 85 c9 74 2d 48 8b bc 07 f0 08 00 00 &lt;48&gt; 8b 07 48 8b 80 08 02 00&gt;
 RSP: 0018:ffffd1bf4b953c58 EFLAGS: 00010286
 RAX: 0000000000005000 RBX: ffff8e35976b02d0 RCX: ffff8e3aeed052d8
 RDX: 00000000ffffffa1 RSI: ffff8e35a3120800 RDI: 0000000000000000
 RBP: 0000000000000000 R08: ffff8e3580eb0000 R09: ffff8e35976b02d0
 R10: ffffd1bf4b953c78 R11: 0000000000000000 R12: ffffd1bf4b953d08
 R13: 0000000000040000 R14: 0000000000000001 R15: 0000000000000001
 FS:  00007f44d3f9f740(0000) GS:ffff8e3caa47f000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000000 CR3: 00000006485c2000 CR4: 0000000000f50ef0
 PKRU: 55555554

Fix this by checking pipe_ctx-&gt;
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68180/">CVE-2025-68180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68180">CVE-2025-68180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255252">SUSE bug 1255252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68181</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68181" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68181" ref_url="https://www.suse.com/security/cve/CVE-2025-68181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Remove calls to drm_put_dev()

Since the allocation of the drivers main structure was changed to
devm_drm_dev_alloc() drm_put_dev()'ing to trigger it to be free'd
should be done by devres.

However, drm_put_dev() is still in the probe error and device remove
paths. When the driver fails to probe warnings like the following are
shown because devres is trying to drm_put_dev() after the driver
already did it.

[    5.642230] radeon 0000:01:05.0: probe with driver radeon failed with error -22
[    5.649605] ------------[ cut here ]------------
[    5.649607] refcount_t: underflow; use-after-free.
[    5.649620] WARNING: CPU: 0 PID: 357 at lib/refcount.c:28 refcount_warn_saturate+0xbe/0x110

(cherry picked from commit 3eb8c0b4c091da0a623ade0d3ee7aa4a93df1ea4)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68181/">CVE-2025-68181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68181">CVE-2025-68181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255247">SUSE bug 1255247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68183</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68183" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68183" ref_url="https://www.suse.com/security/cve/CVE-2025-68183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr

Currently when both IMA and EVM are in fix mode, the IMA signature will
be reset to IMA hash if a program first stores IMA signature in
security.ima and then writes/removes some other security xattr for the
file.

For example, on Fedora, after booting the kernel with "ima_appraise=fix
evm=fix ima_policy=appraise_tcb" and installing rpm-plugin-ima,
installing/reinstalling a package will not make good reference IMA
signature generated. Instead IMA hash is generated,

    # getfattr -m - -d -e hex /usr/bin/bash
    # file: usr/bin/bash
    security.ima=0x0404...

This happens because when setting security.selinux, the IMA_DIGSIG flag
that had been set early was cleared. As a result, IMA hash is generated
when the file is closed.

Similarly, IMA signature can be cleared on file close after removing
security xattr like security.evm or setting/removing ACL.

Prevent replacing the IMA file signature with a file hash, by preventing
the IMA_DIGSIG flag from being reset.

Here's a minimal C reproducer which sets security.selinux as the last
step which can also replaced by removing security.evm or setting ACL,

    #include &lt;stdio.h&gt;
    #include &lt;sys/xattr.h&gt;
    #include &lt;fcntl.h&gt;
    #include &lt;unistd.h&gt;
    #include &lt;string.h&gt;
    #include &lt;stdlib.h&gt;

    int main() {
        const char* file_path = "/usr/sbin/test_binary";
        const char* hex_string = "030204d33204490066306402304";
        int length = strlen(hex_string);
        char* ima_attr_value;
        int fd;

        fd = open(file_path, O_WRONLY|O_CREAT|O_EXCL, 0644);
        if (fd == -1) {
            perror("Error opening file");
            return 1;
        }

        ima_attr_value = (char*)malloc(length / 2 );
        for (int i = 0, j = 0; i &lt; length; i += 2, j++) {
            sscanf(hex_string + i, "%2hhx", &amp;ima_attr_value[j]);
        }

        if (fsetxattr(fd, "security.ima", ima_attr_value, length/2, 0) == -1) {
            perror("Error setting extended attribute");
            close(fd);
            return 1;
        }

        const char* selinux_value= "system_u:object_r:bin_t:s0";
        if (fsetxattr(fd, "security.selinux", selinux_value, strlen(selinux_value), 0) == -1) {
            perror("Error setting extended attribute");
            close(fd);
            return 1;
        }

        close(fd);

        return 0;
    }
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68183/">CVE-2025-68183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68183">CVE-2025-68183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255251">SUSE bug 1255251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68184</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68184" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68184" ref_url="https://www.suse.com/security/cve/CVE-2025-68184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: Disable AFBC support on Mediatek DRM driver

Commit c410fa9b07c3 ("drm/mediatek: Add AFBC support to Mediatek DRM
driver") added AFBC support to Mediatek DRM and enabled the
32x8/split/sparse modifier.

However, this is currently broken on Mediatek MT8188 (Genio 700 EVK
platform); tested using upstream Kernel and Mesa (v25.2.1), AFBC is used by
default since Mesa v25.0.

Kernel trace reports vblank timeouts constantly, and the render is garbled:

```
[CRTC:62:crtc-0] vblank wait timed out
WARNING: CPU: 7 PID: 70 at drivers/gpu/drm/drm_atomic_helper.c:1835 drm_atomic_helper_wait_for_vblanks.part.0+0x24c/0x27c
[...]
Hardware name: MediaTek Genio-700 EVK (DT)
Workqueue: events_unbound commit_work
pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : drm_atomic_helper_wait_for_vblanks.part.0+0x24c/0x27c
lr : drm_atomic_helper_wait_for_vblanks.part.0+0x24c/0x27c
sp : ffff80008337bca0
x29: ffff80008337bcd0 x28: 0000000000000061 x27: 0000000000000000
x26: 0000000000000001 x25: 0000000000000000 x24: ffff0000c9dcc000
x23: 0000000000000001 x22: 0000000000000000 x21: ffff0000c66f2f80
x20: ffff0000c0d7d880 x19: 0000000000000000 x18: 000000000000000a
x17: 000000040044ffff x16: 005000f2b5503510 x15: 0000000000000000
x14: 0000000000000000 x13: 74756f2064656d69 x12: 742074696177206b
x11: 0000000000000058 x10: 0000000000000018 x9 : ffff800082396a70
x8 : 0000000000057fa8 x7 : 0000000000000cce x6 : ffff8000823eea70
x5 : ffff0001fef5f408 x4 : ffff80017ccee000 x3 : ffff0000c12cb480
x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000c12cb480
Call trace:
 drm_atomic_helper_wait_for_vblanks.part.0+0x24c/0x27c (P)
 drm_atomic_helper_commit_tail_rpm+0x64/0x80
 commit_tail+0xa4/0x1a4
 commit_work+0x14/0x20
 process_one_work+0x150/0x290
 worker_thread+0x2d0/0x3ec
 kthread+0x12c/0x210
 ret_from_fork+0x10/0x20
---[ end trace 0000000000000000 ]---
```

Until this gets fixed upstream, disable AFBC support on this platform, as
it's currently broken with upstream Mesa.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68184/">CVE-2025-68184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68184">CVE-2025-68184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255220">SUSE bug 1255220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68185</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68185" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68185" ref_url="https://www.suse.com/security/cve/CVE-2025-68185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfs4_setup_readdir(): insufficient locking for -&gt;d_parent-&gt;d_inode dereferencing

Theoretically it's an oopsable race, but I don't believe one can manage
to hit it on real hardware; might become doable on a KVM, but it still
won't be easy to attack.

Anyway, it's easy to deal with - since xdr_encode_hyper() is just a call of
put_unaligned_be64(), we can put that under -&gt;d_lock and be done with that.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68185/">CVE-2025-68185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68185">CVE-2025-68185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255135">SUSE bug 1255135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68186</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68186" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68186" ref_url="https://www.suse.com/security/cve/CVE-2025-68186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Do not warn in ring_buffer_map_get_reader() when reader catches up

The function ring_buffer_map_get_reader() is a bit more strict than the
other get reader functions, and except for certain situations the
rb_get_reader_page() should not return NULL. If it does, it triggers a
warning.

This warning was triggering but after looking at why, it was because
another acceptable situation was happening and it wasn't checked for.

If the reader catches up to the writer and there's still data to be read
on the reader page, then the rb_get_reader_page() will return NULL as
there's no new page to get.

In this situation, the reader page should not be updated and no warning
should trigger.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68186/">CVE-2025-68186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68186">CVE-2025-68186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255144">SUSE bug 1255144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68188</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68188" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68188" ref_url="https://www.suse.com/security/cve/CVE-2025-68188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check()

Use RCU to avoid a pair of atomic operations and a potential
UAF on dst_dev()-&gt;flags.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68188/">CVE-2025-68188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68188">CVE-2025-68188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255269">SUSE bug 1255269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68190</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68190" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68190" ref_url="https://www.suse.com/security/cve/CVE-2025-68190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked()

kcalloc() may fail. When WS is non-zero and allocation fails, ectx.ws
remains NULL while ectx.ws_size is set, leading to a potential NULL
pointer dereference in atom_get_src_int() when accessing WS entries.

Return -ENOMEM on allocation failure to avoid the NULL dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68190/">CVE-2025-68190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68190">CVE-2025-68190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255131">SUSE bug 1255131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68192</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68192" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68192" ref_url="https://www.suse.com/security/cve/CVE-2025-68192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup

Raw IP packets have no MAC header, leaving skb-&gt;mac_header uninitialized.
This can trigger kernel panics on ARM64 when xfrm or other subsystems
access the offset due to strict alignment checks.

Initialize the MAC header to prevent such crashes.

This can trigger kernel panics on ARM when running IPsec over the
qmimux0 interface.

Example trace:

    Internal error: Oops: 000000009600004f [#1] SMP
    CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.34-gbe78e49cb433 #1
    Hardware name: LS1028A RDB Board (DT)
    pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
    pc : xfrm_input+0xde8/0x1318
    lr : xfrm_input+0x61c/0x1318
    sp : ffff800080003b20
    Call trace:
     xfrm_input+0xde8/0x1318
     xfrm6_rcv+0x38/0x44
     xfrm6_esp_rcv+0x48/0xa8
     ip6_protocol_deliver_rcu+0x94/0x4b0
     ip6_input_finish+0x44/0x70
     ip6_input+0x44/0xc0
     ipv6_rcv+0x6c/0x114
     __netif_receive_skb_one_core+0x5c/0x8c
     __netif_receive_skb+0x18/0x60
     process_backlog+0x78/0x17c
     __napi_poll+0x38/0x180
     net_rx_action+0x168/0x2f0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68192/">CVE-2025-68192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68192">CVE-2025-68192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255246">SUSE bug 1255246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68194</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68194" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68194" ref_url="https://www.suse.com/security/cve/CVE-2025-68194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: imon: make send_packet() more robust

syzbot is reporting that imon has three problems which result in
hung tasks due to forever holding device lock [1].

First problem is that when usb_rx_callback_intf0() once got -EPROTO error
after ictx-&gt;dev_present_intf0 became true, usb_rx_callback_intf0()
resubmits urb after printk(), and resubmitted urb causes
usb_rx_callback_intf0() to again get -EPROTO error. This results in
printk() flooding (RCU stalls).

Alan Stern commented [2] that

  In theory it's okay to resubmit _if_ the driver has a robust
  error-recovery scheme (such as giving up after some fixed limit on the
  number of errors or after some fixed time has elapsed, perhaps with a
  time delay to prevent a flood of errors).  Most drivers don't bother to
  do this; they simply give up right away.  This makes them more
  vulnerable to short-term noise interference during USB transfers, but in
  reality such interference is quite rare.  There's nothing really wrong
  with giving up right away.

but imon has a poor error-recovery scheme which just retries forever;
this behavior should be fixed.

Since I'm not sure whether it is safe for imon users to give up upon any
error code, this patch takes care of only union of error codes chosen from
modules in drivers/media/rc/ directory which handle -EPROTO error (i.e.
ir_toy, mceusb and igorplugusb).

Second problem is that when usb_rx_callback_intf0() once got -EPROTO error
before ictx-&gt;dev_present_intf0 becomes true, usb_rx_callback_intf0() always
resubmits urb due to commit 8791d63af0cf ("[media] imon: don't wedge
hardware after early callbacks"). Move the ictx-&gt;dev_present_intf0 test
introduced by commit 6f6b90c9231a ("[media] imon: don't parse scancodes
until intf configured") to immediately before imon_incoming_packet(), or
the first problem explained above happens without printk() flooding (i.e.
hung task).

Third problem is that when usb_rx_callback_intf0() is not called for some
reason (e.g. flaky hardware; the reproducer for this problem sometimes
prevents usb_rx_callback_intf0() from being called),
wait_for_completion_interruptible() in send_packet() never returns (i.e.
hung task). As a workaround for such situation, change send_packet() to
wait for completion with timeout of 10 seconds.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68194/">CVE-2025-68194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68194">CVE-2025-68194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255325">SUSE bug 1255325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68195</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68195" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68195" ref_url="https://www.suse.com/security/cve/CVE-2025-68195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode

Running x86_match_min_microcode_rev() on a Zen5 CPU trips up KASAN for an out
of bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68195/">CVE-2025-68195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68195">CVE-2025-68195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255259">SUSE bug 1255259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68197</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68197" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68197" ref_url="https://www.suse.com/security/cve/CVE-2025-68197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap()

With older FW, we may get the ASYNC_EVENT_CMPL_EVENT_ID_DBG_BUF_PRODUCER
for FW trace data type that has not been initialized.  This will result
in a crash in bnxt_bs_trace_type_wrap().  Add a guard to check for a
valid magic_byte pointer before proceeding.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68197/">CVE-2025-68197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68197">CVE-2025-68197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255242">SUSE bug 1255242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68198</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68198" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68198" ref_url="https://www.suse.com/security/cve/CVE-2025-68198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crash: fix crashkernel resource shrink

When crashkernel is configured with a high reservation, shrinking its
value below the low crashkernel reservation causes two issues:

1. Invalid crashkernel resource objects
2. Kernel crash if crashkernel shrinking is done twice

For example, with crashkernel=200M,high, the kernel reserves 200MB of high
memory and some default low memory (say 256MB).  The reservation appears
as:

cat /proc/iomem | grep -i crash
af000000-beffffff : Crash kernel
433000000-43f7fffff : Crash kernel

If crashkernel is then shrunk to 50MB (echo 52428800 &gt;
/sys/kernel/kexec_crash_size), /proc/iomem still shows 256MB reserved:
af000000-beffffff : Crash kernel

Instead, it should show 50MB:
af000000-b21fffff : Crash kernel

Further shrinking crashkernel to 40MB causes a kernel crash with the
following trace (x86):

BUG: kernel NULL pointer dereference, address: 0000000000000038
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP NOPTI
&lt;snip...&gt;
Call Trace: &lt;TASK&gt;
? __die_body.cold+0x19/0x27
? page_fault_oops+0x15a/0x2f0
? search_module_extables+0x19/0x60
? search_bpf_extables+0x5f/0x80
? exc_page_fault+0x7e/0x180
? asm_exc_page_fault+0x26/0x30
? __release_resource+0xd/0xb0
release_resource+0x26/0x40
__crash_shrink_memory+0xe5/0x110
crash_shrink_memory+0x12a/0x190
kexec_crash_size_store+0x41/0x80
kernfs_fop_write_iter+0x141/0x1f0
vfs_write+0x294/0x460
ksys_write+0x6d/0xf0
&lt;snip...&gt;

This happens because __crash_shrink_memory()/kernel/crash_core.c
incorrectly updates the crashk_res resource object even when
crashk_low_res should be updated.

Fix this by ensuring the correct crashkernel resource object is updated
when shrinking crashkernel memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68198/">CVE-2025-68198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68198">CVE-2025-68198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255243">SUSE bug 1255243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68200</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68200" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68200" ref_url="https://www.suse.com/security/cve/CVE-2025-68200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Add bpf_prog_run_data_pointers()

syzbot found that cls_bpf_classify() is able to change
tc_skb_cb(skb)-&gt;drop_reason triggering a warning in sk_skb_reason_drop().

WARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 __sk_skb_reason_drop net/core/skbuff.c:1189 [inline]
WARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 sk_skb_reason_drop+0x76/0x170 net/core/skbuff.c:1214

struct tc_skb_cb has been added in commit ec624fe740b4 ("net/sched:
Extend qdisc control block with tc control block"), which added a wrong
interaction with db58ba459202 ("bpf: wire in data and data_end for
cls_act_bpf").

drop_reason was added later.

Add bpf_prog_run_data_pointers() helper to save/restore the net_sched
storage colliding with BPF data_meta/data_end.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68200/">CVE-2025-68200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68200">CVE-2025-68200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255241">SUSE bug 1255241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68201</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68201" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68201" ref_url="https://www.suse.com/security/cve/CVE-2025-68201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: remove two invalid BUG_ON()s

Those can be triggered trivially by userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68201/">CVE-2025-68201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68201">CVE-2025-68201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255136">SUSE bug 1255136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68202</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68202" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68202" ref_url="https://www.suse.com/security/cve/CVE-2025-68202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched_ext: Fix unsafe locking in the scx_dump_state()

For built with CONFIG_PREEMPT_RT=y kernels, the dump_lock will be converted
sleepable spinlock and not disable-irq, so the following scenarios occur:

inconsistent {IN-HARDIRQ-W} -&gt; {HARDIRQ-ON-W} usage.
irq_work/0/27 [HC0[0]:SC0[0]:HE1:SE1] takes:
(&amp;rq-&gt;__lock){?...}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x40
{IN-HARDIRQ-W} state was registered at:
   lock_acquire+0x1e1/0x510
   _raw_spin_lock_nested+0x42/0x80
   raw_spin_rq_lock_nested+0x2b/0x40
   sched_tick+0xae/0x7b0
   update_process_times+0x14c/0x1b0
   tick_periodic+0x62/0x1f0
   tick_handle_periodic+0x48/0xf0
   timer_interrupt+0x55/0x80
   __handle_irq_event_percpu+0x20a/0x5c0
   handle_irq_event_percpu+0x18/0xc0
   handle_irq_event+0xb5/0x150
   handle_level_irq+0x220/0x460
   __common_interrupt+0xa2/0x1e0
   common_interrupt+0xb0/0xd0
   asm_common_interrupt+0x2b/0x40
   _raw_spin_unlock_irqrestore+0x45/0x80
   __setup_irq+0xc34/0x1a30
   request_threaded_irq+0x214/0x2f0
   hpet_time_init+0x3e/0x60
   x86_late_time_init+0x5b/0xb0
   start_kernel+0x308/0x410
   x86_64_start_reservations+0x1c/0x30
   x86_64_start_kernel+0x96/0xa0
   common_startup_64+0x13e/0x148

 other info that might help us debug this:
 Possible unsafe locking scenario:

        CPU0
        ----
   lock(&amp;rq-&gt;__lock);
   &lt;Interrupt&gt;
     lock(&amp;rq-&gt;__lock);

  *** DEADLOCK ***

 stack backtrace:
 CPU: 0 UID: 0 PID: 27 Comm: irq_work/0
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x8c/0xd0
  dump_stack+0x14/0x20
  print_usage_bug+0x42e/0x690
  mark_lock.part.44+0x867/0xa70
  ? __pfx_mark_lock.part.44+0x10/0x10
  ? string_nocheck+0x19c/0x310
  ? number+0x739/0x9f0
  ? __pfx_string_nocheck+0x10/0x10
  ? __pfx_check_pointer+0x10/0x10
  ? kvm_sched_clock_read+0x15/0x30
  ? sched_clock_noinstr+0xd/0x20
  ? local_clock_noinstr+0x1c/0xe0
  __lock_acquire+0xc4b/0x62b0
  ? __pfx_format_decode+0x10/0x10
  ? __pfx_string+0x10/0x10
  ? __pfx___lock_acquire+0x10/0x10
  ? __pfx_vsnprintf+0x10/0x10
  lock_acquire+0x1e1/0x510
  ? raw_spin_rq_lock_nested+0x2b/0x40
  ? __pfx_lock_acquire+0x10/0x10
  ? dump_line+0x12e/0x270
  ? raw_spin_rq_lock_nested+0x20/0x40
  _raw_spin_lock_nested+0x42/0x80
  ? raw_spin_rq_lock_nested+0x2b/0x40
  raw_spin_rq_lock_nested+0x2b/0x40
  scx_dump_state+0x3b3/0x1270
  ? finish_task_switch+0x27e/0x840
  scx_ops_error_irq_workfn+0x67/0x80
  irq_work_single+0x113/0x260
  irq_work_run_list.part.3+0x44/0x70
  run_irq_workd+0x6b/0x90
  ? __pfx_run_irq_workd+0x10/0x10
  smpboot_thread_fn+0x529/0x870
  ? __pfx_smpboot_thread_fn+0x10/0x10
  kthread+0x305/0x3f0
  ? __pfx_kthread+0x10/0x10
  ret_from_fork+0x40/0x70
  ? __pfx_kthread+0x10/0x10
  ret_from_fork_asm+0x1a/0x30
  &lt;/TASK&gt;

This commit therefore use rq_lock_irqsave/irqrestore() to replace
rq_lock/unlock() in the scx_dump_state().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68202/">CVE-2025-68202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68202">CVE-2025-68202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255223">SUSE bug 1255223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68203</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68203" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68203" ref_url="https://www.suse.com/security/cve/CVE-2025-68203" source="SUSE CVE"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68203/">CVE-2025-68203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68203">CVE-2025-68203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255141">SUSE bug 1255141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68206</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68206" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68206" ref_url="https://www.suse.com/security/cve/CVE-2025-68206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_ct: add seqadj extension for natted connections

Sequence adjustment may be required for FTP traffic with PASV/EPSV modes.
due to need to re-write packet payload (IP, port) on the ftp control
connection. This can require changes to the TCP length and expected
seq / ack_seq.

The easiest way to reproduce this issue is with PASV mode.
Example ruleset:
table inet ftp_nat {
        ct helper ftp_helper {
                type "ftp" protocol tcp
                l3proto inet
        }

        chain prerouting {
                type filter hook prerouting priority 0; policy accept;
                tcp dport 21 ct state new ct helper set "ftp_helper"
        }
}
table ip nat {
        chain prerouting {
                type nat hook prerouting priority -100; policy accept;
                tcp dport 21 dnat ip prefix to ip daddr map {
			192.168.100.1 : 192.168.13.2/32 }
        }

        chain postrouting {
                type nat hook postrouting priority 100 ; policy accept;
                tcp sport 21 snat ip prefix to ip saddr map {
			192.168.13.2 : 192.168.100.1/32 }
        }
}

Note that the ftp helper gets assigned *after* the dnat setup.

The inverse (nat after helper assign) is handled by an existing
check in nf_nat_setup_info() and will not show the problem.

Topoloy:

 +-------------------+     +----------------------------------+
 | FTP: 192.168.13.2 | &lt;-&gt; | NAT: 192.168.13.3, 192.168.100.1 |
 +-------------------+     +----------------------------------+
                                      |
                         +-----------------------+
                         | Client: 192.168.100.2 |
                         +-----------------------+

ftp nat changes do not work as expected in this case:
Connected to 192.168.100.1.
[..]
ftp&gt; epsv
EPSV/EPRT on IPv4 off.
ftp&gt; ls
227 Entering passive mode (192,168,100,1,209,129).
421 Service not available, remote server has closed connection.

Kernel logs:
Missing nfct_seqadj_ext_add() setup call
WARNING: CPU: 1 PID: 0 at net/netfilter/nf_conntrack_seqadj.c:41
[..]
 __nf_nat_mangle_tcp_packet+0x100/0x160 [nf_nat]
 nf_nat_ftp+0x142/0x280 [nf_nat_ftp]
 help+0x4d1/0x880 [nf_conntrack_ftp]
 nf_confirm+0x122/0x2e0 [nf_conntrack]
 nf_hook_slow+0x3c/0xb0
 ..

Fix this by adding the required extension when a conntrack helper is assigned
to a connection that has a nat binding.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68206/">CVE-2025-68206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68206">CVE-2025-68206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255142">SUSE bug 1255142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68207</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68207" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68207" ref_url="https://www.suse.com/security/cve/CVE-2025-68207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/guc: Synchronize Dead CT worker with unbind

Cancel and wait for any Dead CT worker to complete before continuing
with device unbinding. Else the worker will end up using resources freed
by the undind operation.

(cherry picked from commit 492671339114e376aaa38626d637a2751cdef263)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68207/">CVE-2025-68207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68207">CVE-2025-68207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255234">SUSE bug 1255234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68208</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68208" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68208" ref_url="https://www.suse.com/security/cve/CVE-2025-68208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: account for current allocated stack depth in widen_imprecise_scalars()

The usage pattern for widen_imprecise_scalars() looks as follows:

    prev_st = find_prev_entry(env, ...);
    queued_st = push_stack(...);
    widen_imprecise_scalars(env, prev_st, queued_st);

Where prev_st is an ancestor of the queued_st in the explored states
tree. This ancestor is not guaranteed to have same allocated stack
depth as queued_st. E.g. in the following case:

    def main():
      for i in 1..2:
        foo(i)        // same callsite, differnt param

    def foo(i):
      if i == 1:
        use 128 bytes of stack
      iterator based loop

Here, for a second 'foo' call prev_st-&gt;allocated_stack is 128,
while queued_st-&gt;allocated_stack is much smaller.
widen_imprecise_scalars() needs to take this into account and avoid
accessing bpf_verifier_state-&gt;frame[*]-&gt;stack out of bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68208/">CVE-2025-68208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68208">CVE-2025-68208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255227">SUSE bug 1255227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68209</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68209" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68209" ref_url="https://www.suse.com/security/cve/CVE-2025-68209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlx5: Fix default values in create CQ

Currently, CQs without a completion function are assigned the
mlx5_add_cq_to_tasklet function by default. This is problematic since
only user CQs created through the mlx5_ib driver are intended to use
this function.

Additionally, all CQs that will use doorbells instead of polling for
completions must call mlx5_cq_arm. However, the default CQ creation flow
leaves a valid value in the CQ's arm_db field, allowing FW to send
interrupts to polling-only CQs in certain corner cases.

These two factors would allow a polling-only kernel CQ to be triggered
by an EQ interrupt and call a completion function intended only for user
CQs, causing a null pointer exception.

Some areas in the driver have prevented this issue with one-off fixes
but did not address the root cause.

This patch fixes the described issue by adding defaults to the create CQ
flow. It adds a default dummy completion function to protect against
null pointer exceptions, and it sets an invalid command sequence number
by default in kernel CQs to prevent the FW from sending an interrupt to
the CQ until it is armed. User CQs are responsible for their own
initialization values.

Callers of mlx5_core_create_cq are responsible for changing the
completion function and arming the CQ per their needs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68209/">CVE-2025-68209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68209">CVE-2025-68209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255230">SUSE bug 1255230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68210</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68210" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68210" ref_url="https://www.suse.com/security/cve/CVE-2025-68210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: avoid infinite loop due to incomplete zstd-compressed data

Currently, the decompression logic incorrectly spins if compressed
data is truncated in crafted (deliberately corrupted) images.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68210/">CVE-2025-68210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68210">CVE-2025-68210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255231">SUSE bug 1255231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68211</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68211" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68211" ref_url="https://www.suse.com/security/cve/CVE-2025-68211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksm: use range-walk function to jump over holes in scan_get_next_rmap_item

Currently, scan_get_next_rmap_item() walks every page address in a VMA to
locate mergeable pages.  This becomes highly inefficient when scanning
large virtual memory areas that contain mostly unmapped regions, causing
ksmd to use large amount of cpu without deduplicating much pages.

This patch replaces the per-address lookup with a range walk using
walk_page_range().  The range walker allows KSM to skip over entire
unmapped holes in a VMA, avoiding unnecessary lookups.  This problem was
previously discussed in [1].

Consider the following test program which creates a 32 TiB mapping in the
virtual address space but only populates a single page:

#include &lt;unistd.h&gt;
#include &lt;stdio.h&gt;
#include &lt;sys/mman.h&gt;

/* 32 TiB */
const size_t size = 32ul * 1024 * 1024 * 1024 * 1024;

int main() {
        char *area = mmap(NULL, size, PROT_READ | PROT_WRITE,
                          MAP_NORESERVE | MAP_PRIVATE | MAP_ANON, -1, 0);

        if (area == MAP_FAILED) {
                perror("mmap() failed\n");
                return -1;
        }

        /* Populate a single page such that we get an anon_vma. */
        *area = 0;

        /* Enable KSM. */
        madvise(area, size, MADV_MERGEABLE);
        pause();
        return 0;
}

$ ./ksm-sparse  &amp;
$ echo 1 &gt; /sys/kernel/mm/ksm/run 

Without this patch ksmd uses 100% of the cpu for a long time (more then 1
hour in my test machine) scanning all the 32 TiB virtual address space
that contain only one mapped page.  This makes ksmd essentially deadlocked
not able to deduplicate anything of value.  With this patch ksmd walks
only the one mapped page and skips the rest of the 32 TiB virtual address
space, making the scan fast using little cpu.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68211/">CVE-2025-68211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68211">CVE-2025-68211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255319">SUSE bug 1255319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68213</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68213" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68213" ref_url="https://www.suse.com/security/cve/CVE-2025-68213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix possible vport_config NULL pointer deref in remove

Attempting to remove the driver will cause a crash in cases where
the vport failed to initialize. Following trace is from an instance where
the driver failed during an attempt to create a VF:
[ 1661.543624] idpf 0000:84:00.7: Device HW Reset initiated
[ 1722.923726] idpf 0000:84:00.7: Transaction timed-out (op:1 cookie:2900 vc_op:1 salt:29 timeout:60000ms)
[ 1723.353263] BUG: kernel NULL pointer dereference, address: 0000000000000028
...
[ 1723.358472] RIP: 0010:idpf_remove+0x11c/0x200 [idpf]
...
[ 1723.364973] Call Trace:
[ 1723.365475]  &lt;TASK&gt;
[ 1723.365972]  pci_device_remove+0x42/0xb0
[ 1723.366481]  device_release_driver_internal+0x1a9/0x210
[ 1723.366987]  pci_stop_bus_device+0x6d/0x90
[ 1723.367488]  pci_stop_and_remove_bus_device+0x12/0x20
[ 1723.367971]  pci_iov_remove_virtfn+0xbd/0x120
[ 1723.368309]  sriov_disable+0x34/0xe0
[ 1723.368643]  idpf_sriov_configure+0x58/0x140 [idpf]
[ 1723.368982]  sriov_numvfs_store+0xda/0x1c0

Avoid the NULL pointer dereference by adding NULL pointer check for
vport_config[i], before freeing user_config.q_coalesce.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68213/">CVE-2025-68213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68213">CVE-2025-68213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255228">SUSE bug 1255228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68215</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68215" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68215" ref_url="https://www.suse.com/security/cve/CVE-2025-68215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix PTP cleanup on driver removal in error path

Improve the cleanup on releasing PTP resources in error path.
The error case might happen either at the driver probe and PTP
feature initialization or on PTP restart (errors in reset handling, NVM
update etc). In both cases, calls to PF PTP cleanup (ice_ptp_cleanup_pf
function) and 'ps_lock' mutex deinitialization were missed.
Additionally, ptp clock was not unregistered in the latter case.

Keep PTP state as 'uninitialized' on init to distinguish between error
scenarios and to avoid resource release duplication at driver removal.

The consequence of missing ice_ptp_cleanup_pf call is the following call
trace dumped when ice_adapter object is freed (port list is not empty,
as it is required at this stage):

[  T93022] ------------[ cut here ]------------
[  T93022] WARNING: CPU: 10 PID: 93022 at
ice/ice_adapter.c:67 ice_adapter_put+0xef/0x100 [ice]
...
[  T93022] RIP: 0010:ice_adapter_put+0xef/0x100 [ice]
...
[  T93022] Call Trace:
[  T93022]  &lt;TASK&gt;
[  T93022]  ? ice_adapter_put+0xef/0x100 [ice
33d2647ad4f6d866d41eefff1806df37c68aef0c]
[  T93022]  ? __warn.cold+0xb0/0x10e
[  T93022]  ? ice_adapter_put+0xef/0x100 [ice
33d2647ad4f6d866d41eefff1806df37c68aef0c]
[  T93022]  ? report_bug+0xd8/0x150
[  T93022]  ? handle_bug+0xe9/0x110
[  T93022]  ? exc_invalid_op+0x17/0x70
[  T93022]  ? asm_exc_invalid_op+0x1a/0x20
[  T93022]  ? ice_adapter_put+0xef/0x100 [ice
33d2647ad4f6d866d41eefff1806df37c68aef0c]
[  T93022]  pci_device_remove+0x42/0xb0
[  T93022]  device_release_driver_internal+0x19f/0x200
[  T93022]  driver_detach+0x48/0x90
[  T93022]  bus_remove_driver+0x70/0xf0
[  T93022]  pci_unregister_driver+0x42/0xb0
[  T93022]  ice_module_exit+0x10/0xdb0 [ice
33d2647ad4f6d866d41eefff1806df37c68aef0c]
...
[  T93022] ---[ end trace 0000000000000000 ]---
[  T93022] ice: module unloaded
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68215/">CVE-2025-68215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68215">CVE-2025-68215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255226">SUSE bug 1255226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68217</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68217" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68217" ref_url="https://www.suse.com/security/cve/CVE-2025-68217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: pegasus-notetaker - fix potential out-of-bounds access

In the pegasus_notetaker driver, the pegasus_probe() function allocates
the URB transfer buffer using the wMaxPacketSize value from
the endpoint descriptor. An attacker can use a malicious USB descriptor
to force the allocation of a very small buffer.

Subsequently, if the device sends an interrupt packet with a specific
pattern (e.g., where the first byte is 0x80 or 0x42),
the pegasus_parse_packet() function parses the packet without checking
the allocated buffer size. This leads to an out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68217/">CVE-2025-68217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68217">CVE-2025-68217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255221">SUSE bug 1255221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68218</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68218" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68218" ref_url="https://www.suse.com/security/cve/CVE-2025-68218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-multipath: fix lockdep WARN due to partition scan work

Blktests test cases nvme/014, 057 and 058 fail occasionally due to a
lockdep WARN. As reported in the Closes tag URL, the WARN indicates that
a deadlock can happen due to the dependency among disk-&gt;open_mutex,
kblockd workqueue completion and partition_scan_work completion.

To avoid the lockdep WARN and the potential deadlock, cut the dependency
by running the partition_scan_work not by kblockd workqueue but by
nvme_wq.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68218/">CVE-2025-68218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68218">CVE-2025-68218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255245">SUSE bug 1255245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68220</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68220" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68220" ref_url="https://www.suse.com/security/cve/CVE-2025-68220" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: ti: netcp: Standardize knav_dma_open_channel to return NULL on error

Make knav_dma_open_channel consistently return NULL on error instead
of ERR_PTR. Currently the header include/linux/soc/ti/knav_dma.h
returns NULL when the driver is disabled, but the driver
implementation does not even return NULL or ERR_PTR on failure,
causing inconsistency in the users. This results in a crash in
netcp_free_navigator_resources as followed (trimmed):

Unhandled fault: alignment exception (0x221) at 0xfffffff2
[fffffff2] *pgd=80000800207003, *pmd=82ffda003, *pte=00000000
Internal error: : 221 [#1] SMP ARM
Modules linked in:
CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.17.0-rc7 #1 NONE
Hardware name: Keystone
PC is at knav_dma_close_channel+0x30/0x19c
LR is at netcp_free_navigator_resources+0x2c/0x28c

[... TRIM...]

Call trace:
 knav_dma_close_channel from netcp_free_navigator_resources+0x2c/0x28c
 netcp_free_navigator_resources from netcp_ndo_open+0x430/0x46c
 netcp_ndo_open from __dev_open+0x114/0x29c
 __dev_open from __dev_change_flags+0x190/0x208
 __dev_change_flags from netif_change_flags+0x1c/0x58
 netif_change_flags from dev_change_flags+0x38/0xa0
 dev_change_flags from ip_auto_config+0x2c4/0x11f0
 ip_auto_config from do_one_initcall+0x58/0x200
 do_one_initcall from kernel_init_freeable+0x1cc/0x238
 kernel_init_freeable from kernel_init+0x1c/0x12c
 kernel_init from ret_from_fork+0x14/0x38
[... TRIM...]

Standardize the error handling by making the function return NULL on
all error conditions. The API is used in just the netcp_core.c so the
impact is limited.

Note, this change, in effect reverts commit 5b6cb43b4d62 ("net:
ethernet: ti: netcp_core: return error while dma channel open issue"),
but provides a less error prone implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68220/">CVE-2025-68220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68220">CVE-2025-68220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255271">SUSE bug 1255271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68222</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68222" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68222" ref_url="https://www.suse.com/security/cve/CVE-2025-68222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc

s32_pinctrl_desc is allocated with devm_kmalloc(), but not all of its
fields are initialized. Notably, num_custom_params is used in
pinconf_generic_parse_dt_config(), resulting in intermittent allocation
errors, such as the following splat when probing i2c-imx:

        WARNING: CPU: 0 PID: 176 at mm/page_alloc.c:4795 __alloc_pages_noprof+0x290/0x300
        [...]
        Hardware name: NXP S32G3 Reference Design Board 3 (S32G-VNP-RDB3) (DT)
        [...]
        Call trace:
         __alloc_pages_noprof+0x290/0x300 (P)
         ___kmalloc_large_node+0x84/0x168
         __kmalloc_large_node_noprof+0x34/0x120
         __kmalloc_noprof+0x2ac/0x378
         pinconf_generic_parse_dt_config+0x68/0x1a0
         s32_dt_node_to_map+0x104/0x248
         dt_to_map_one_config+0x154/0x1d8
         pinctrl_dt_to_map+0x12c/0x280
         create_pinctrl+0x6c/0x270
         pinctrl_get+0xc0/0x170
         devm_pinctrl_get+0x50/0xa0
         pinctrl_bind_pins+0x60/0x2a0
         really_probe+0x60/0x3a0
        [...]
         __platform_driver_register+0x2c/0x40
         i2c_adap_imx_init+0x28/0xff8 [i2c_imx]
        [...]

This results in later parse failures that can cause issues in dependent
drivers:

        s32g-siul2-pinctrl 4009c240.pinctrl: /soc@0/pinctrl@4009c240/i2c0-pins/i2c0-grp0: could not parse node property
        s32g-siul2-pinctrl 4009c240.pinctrl: /soc@0/pinctrl@4009c240/i2c0-pins/i2c0-grp0: could not parse node property
        [...]
        pca953x 0-0022: failed writing register: -6
        i2c i2c-0: IMX I2C adapter registered
        s32g-siul2-pinctrl 4009c240.pinctrl: /soc@0/pinctrl@4009c240/i2c2-pins/i2c2-grp0: could not parse node property
        s32g-siul2-pinctrl 4009c240.pinctrl: /soc@0/pinctrl@4009c240/i2c2-pins/i2c2-grp0: could not parse node property
        i2c i2c-1: IMX I2C adapter registered
        s32g-siul2-pinctrl 4009c240.pinctrl: /soc@0/pinctrl@4009c240/i2c4-pins/i2c4-grp0: could not parse node property
        s32g-siul2-pinctrl 4009c240.pinctrl: /soc@0/pinctrl@4009c240/i2c4-pins/i2c4-grp0: could not parse node property
        i2c i2c-2: IMX I2C adapter registered

Fix this by initializing s32_pinctrl_desc with devm_kzalloc() instead of
devm_kmalloc() in s32_pinctrl_probe(), which sets the previously
uninitialized fields to zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68222/">CVE-2025-68222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68222">CVE-2025-68222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255218">SUSE bug 1255218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68223</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68223" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68223" ref_url="https://www.suse.com/security/cve/CVE-2025-68223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: delete radeon_fence_process in is_signaled, no deadlock

Delete the attempt to progress the queue when checking if fence is
signaled. This avoids deadlock.

dma-fence_ops::signaled can be called with the fence lock in unknown
state. For radeon, the fence lock is also the wait queue lock. This can
cause a self deadlock when signaled() tries to make forward progress on
the wait queue. But advancing the queue is unneeded because incorrectly
returning false from signaled() is perfectly acceptable.

(cherry picked from commit 527ba26e50ec2ca2be9c7c82f3ad42998a75d0db)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68223/">CVE-2025-68223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68223">CVE-2025-68223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255357">SUSE bug 1255357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255358">SUSE bug 1255358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68227</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68227" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68227" ref_url="https://www.suse.com/security/cve/CVE-2025-68227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: Fix proto fallback detection with BPF

The sockmap feature allows bpf syscall from userspace, or based
on bpf sockops, replacing the sk_prot of sockets during protocol stack
processing with sockmap's custom read/write interfaces.
'''
tcp_rcv_state_process()
  syn_recv_sock()/subflow_syn_recv_sock()
    tcp_init_transfer(BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB)
      bpf_skops_established       &lt;== sockops
        bpf_sock_map_update(sk)   &lt;== call bpf helper
          tcp_bpf_update_proto()  &lt;== update sk_prot
'''

When the server has MPTCP enabled but the client sends a TCP SYN
without MPTCP, subflow_syn_recv_sock() performs a fallback on the
subflow, replacing the subflow sk's sk_prot with the native sk_prot.
'''
subflow_syn_recv_sock()
  subflow_ulp_fallback()
    subflow_drop_ctx()
      mptcp_subflow_ops_undo_override()
'''

Then, this subflow can be normally used by sockmap, which replaces the
native sk_prot with sockmap's custom sk_prot. The issue occurs when the
user executes accept::mptcp_stream_accept::mptcp_fallback_tcp_ops().
Here, it uses sk-&gt;sk_prot to compare with the native sk_prot, but this
is incorrect when sockmap is used, as we may incorrectly set
sk-&gt;sk_socket-&gt;ops.

This fix uses the more generic sk_family for the comparison instead.

Additionally, this also prevents a WARNING from occurring:

result from ./scripts/decode_stacktrace.sh:
------------[ cut here ]------------
WARNING: CPU: 0 PID: 337 at net/mptcp/protocol.c:68 mptcp_stream_accept \
(net/mptcp/protocol.c:4005)
Modules linked in:
...

PKRU: 55555554
Call Trace:
&lt;TASK&gt;
do_accept (net/socket.c:1989)
__sys_accept4 (net/socket.c:2028 net/socket.c:2057)
__x64_sys_accept (net/socket.c:2067)
x64_sys_call (arch/x86/entry/syscall_64.c:41)
do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94)
entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)
RIP: 0033:0x7f87ac92b83d

---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68227/">CVE-2025-68227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68227">CVE-2025-68227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255216">SUSE bug 1255216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68230</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68230" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68230" ref_url="https://www.suse.com/security/cve/CVE-2025-68230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix gpu page fault after hibernation on PF passthrough

On PF passthrough environment, after hibernate and then resume, coralgemm
will cause gpu page fault.

Mode1 reset happens during hibernate, but partition mode is not restored
on resume, register mmCP_HYP_XCP_CTL and mmCP_PSP_XCP_CTL is not right
after resume. When CP access the MQD BO, wrong stride size is used,
this will cause out of bound access on the MQD BO, resulting page fault.

The fix is to ensure gfx_v9_4_3_switch_compute_partition() is called
when resume from a hibernation.
KFD resume is called separately during a reset recovery or resume from
suspend sequence. Hence it's not required to be called as part of
partition switch.

(cherry picked from commit 5d1b32cfe4a676fe552416cb5ae847b215463a1a)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68230/">CVE-2025-68230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68230">CVE-2025-68230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255134">SUSE bug 1255134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68233</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68233" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68233" ref_url="https://www.suse.com/security/cve/CVE-2025-68233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/tegra: Add call to put_pid()

Add a call to put_pid() corresponding to get_task_pid().
host1x_memory_context_alloc() does not take ownership of the PID so we
need to free it here to avoid leaking.

[mperttunen@nvidia.com: reword commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68233/">CVE-2025-68233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68233">CVE-2025-68233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255206">SUSE bug 1255206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68235</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68235" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68235" ref_url="https://www.suse.com/security/cve/CVE-2025-68235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot

nvkm_falcon_fw::boot is allocated, but no one frees it. This causes a
kmemleak warning.

Make sure this data is deallocated.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68235/">CVE-2025-68235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68235">CVE-2025-68235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255209">SUSE bug 1255209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68237</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68237" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68237" ref_url="https://www.suse.com/security/cve/CVE-2025-68237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtdchar: fix integer overflow in read/write ioctls

The "req.start" and "req.len" variables are u64 values that come from the
user at the start of the function.  We mask away the high 32 bits of
"req.len" so that's capped at U32_MAX but the "req.start" variable can go
up to U64_MAX which means that the addition can still integer overflow.

Use check_add_overflow() to fix this bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68237/">CVE-2025-68237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68237">CVE-2025-68237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255203">SUSE bug 1255203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68238</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68238" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68238" ref_url="https://www.suse.com/security/cve/CVE-2025-68238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: rawnand: cadence: fix DMA device NULL pointer dereference

The DMA device pointer `dma_dev` was being dereferenced before ensuring
that `cdns_ctrl-&gt;dmac` is properly initialized.

Move the assignment of `dma_dev` after successfully acquiring the DMA
channel to ensure the pointer is valid before use.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68238/">CVE-2025-68238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68238">CVE-2025-68238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255202">SUSE bug 1255202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68239</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68239" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68239" ref_url="https://www.suse.com/security/cve/CVE-2025-68239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binfmt_misc: restore write access before closing files opened by open_exec()

bm_register_write() opens an executable file using open_exec(), which
internally calls do_open_execat() and denies write access on the file to
avoid modification while it is being executed.

However, when an error occurs, bm_register_write() closes the file using
filp_close() directly. This does not restore the write permission, which
may cause subsequent write operations on the same file to fail.

Fix this by calling exe_file_allow_write_access() before filp_close() to
restore the write permission properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68239/">CVE-2025-68239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68239">CVE-2025-68239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255272">SUSE bug 1255272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68240</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68240" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68240" ref_url="https://www.suse.com/security/cve/CVE-2025-68240" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: avoid having an active sc_timer before freeing sci

Because kthread_stop did not stop sc_task properly and returned -EINTR,
the sc_timer was not properly closed, ultimately causing the problem [1]
reported by syzbot when freeing sci due to the sc_timer not being closed.

Because the thread sc_task main function nilfs_segctor_thread() returns 0
when it succeeds, when the return value of kthread_stop() is not 0 in
nilfs_segctor_destroy(), we believe that it has not properly closed
sc_timer.

We use timer_shutdown_sync() to sync wait for sc_timer to shutdown, and
set the value of sc_task to NULL under the protection of lock
sc_state_lock, so as to avoid the issue caused by sc_timer not being
properly shutdowned.

[1]
ODEBUG: free active (active state 0) object: 00000000dacb411a object type: timer_list hint: nilfs_construction_timeout
Call trace:
 nilfs_segctor_destroy fs/nilfs2/segment.c:2811 [inline]
 nilfs_detach_log_writer+0x668/0x8cc fs/nilfs2/segment.c:2877
 nilfs_put_super+0x4c/0x12c fs/nilfs2/super.c:509
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68240/">CVE-2025-68240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68240">CVE-2025-68240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255180">SUSE bug 1255180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68241</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68241" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68241" ref_url="https://www.suse.com/security/cve/CVE-2025-68241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe

The sit driver's packet transmission path calls: sit_tunnel_xmit() -&gt;
update_or_create_fnhe(), which lead to fnhe_remove_oldest() being called
to delete entries exceeding FNHE_RECLAIM_DEPTH+random.

The race window is between fnhe_remove_oldest() selecting fnheX for
deletion and the subsequent kfree_rcu(). During this time, the
concurrent path's __mkroute_output() -&gt; find_exception() can fetch the
soon-to-be-deleted fnheX, and rt_bind_exception() then binds it with a
new dst using a dst_hold(). When the original fnheX is freed via RCU,
the dst reference remains permanently leaked.

CPU 0                             CPU 1
__mkroute_output()
  find_exception() [fnheX]
                                  update_or_create_fnhe()
                                    fnhe_remove_oldest() [fnheX]
  rt_bind_exception() [bind dst]
                                  RCU callback [fnheX freed, dst leak]

This issue manifests as a device reference count leak and a warning in
dmesg when unregistering the net device:

  unregister_netdevice: waiting for sitX to become free. Usage count = N

Ido Schimmel provided the simple test validation method [1].

The fix clears 'oldest-&gt;fnhe_daddr' before calling fnhe_flush_routes().
Since rt_bind_exception() checks this field, setting it to zero prevents
the stale fnhe from being reused and bound to a new dst just before it
is freed.

[1]
ip netns add ns1
ip -n ns1 link set dev lo up
ip -n ns1 address add 192.0.2.1/32 dev lo
ip -n ns1 link add name dummy1 up type dummy
ip -n ns1 route add 192.0.2.2/32 dev dummy1
ip -n ns1 link add name gretap1 up arp off type gretap \
    local 192.0.2.1 remote 192.0.2.2
ip -n ns1 route add 198.51.0.0/16 dev gretap1
taskset -c 0 ip netns exec ns1 mausezahn gretap1 \
    -A 198.51.100.1 -B 198.51.0.0/16 -t udp -p 1000 -c 0 -q &amp;
taskset -c 2 ip netns exec ns1 mausezahn gretap1 \
    -A 198.51.100.1 -B 198.51.0.0/16 -t udp -p 1000 -c 0 -q &amp;
sleep 10
ip netns pids ns1 | xargs kill
ip netns del ns1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68241/">CVE-2025-68241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68241">CVE-2025-68241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255157">SUSE bug 1255157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68242</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68242" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68242" ref_url="https://www.suse.com/security/cve/CVE-2025-68242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix LTP test failures when timestamps are delegated

The utimes01 and utime06 tests fail when delegated timestamps are
enabled, specifically in subtests that modify the atime and mtime
fields using the 'nobody' user ID.

The problem can be reproduced as follow:

# echo "/media *(rw,no_root_squash,sync)" &gt;&gt; /etc/exports
# export -ra
# mount -o rw,nfsvers=4.2 127.0.0.1:/media /tmpdir
# cd /opt/ltp
# ./runltp -d /tmpdir -s utimes01
# ./runltp -d /tmpdir -s utime06

This issue occurs because nfs_setattr does not verify the inode's
UID against the caller's fsuid when delegated timestamps are
permitted for the inode.

This patch adds the UID check and if it does not match then the
request is sent to the server for permission checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68242/">CVE-2025-68242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68242">CVE-2025-68242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255186">SUSE bug 1255186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68244</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68244" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68244" ref_url="https://www.suse.com/security/cve/CVE-2025-68244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD

On completion of i915_vma_pin_ww(), a synchronous variant of
dma_fence_work_commit() is called.  When pinning a VMA to GGTT address
space on a Cherry View family processor, or on a Broxton generation SoC
with VTD enabled, i.e., when stop_machine() is then called from
intel_ggtt_bind_vma(), that can potentially lead to lock inversion among
reservation_ww and cpu_hotplug locks.

[86.861179] ======================================================
[86.861193] WARNING: possible circular locking dependency detected
[86.861209] 6.15.0-rc5-CI_DRM_16515-gca0305cadc2d+ #1 Tainted: G     U
[86.861226] ------------------------------------------------------
[86.861238] i915_module_loa/1432 is trying to acquire lock:
[86.861252] ffffffff83489090 (cpu_hotplug_lock){++++}-{0:0}, at: stop_machine+0x1c/0x50
[86.861290]
but task is already holding lock:
[86.861303] ffffc90002e0b4c8 (reservation_ww_class_mutex){+.+.}-{3:3}, at: i915_vma_pin.constprop.0+0x39/0x1d0 [i915]
[86.862233]
which lock already depends on the new lock.
[86.862251]
the existing dependency chain (in reverse order) is:
[86.862265]
-&gt; #5 (reservation_ww_class_mutex){+.+.}-{3:3}:
[86.862292]        dma_resv_lockdep+0x19a/0x390
[86.862315]        do_one_initcall+0x60/0x3f0
[86.862334]        kernel_init_freeable+0x3cd/0x680
[86.862353]        kernel_init+0x1b/0x200
[86.862369]        ret_from_fork+0x47/0x70
[86.862383]        ret_from_fork_asm+0x1a/0x30
[86.862399]
-&gt; #4 (reservation_ww_class_acquire){+.+.}-{0:0}:
[86.862425]        dma_resv_lockdep+0x178/0x390
[86.862440]        do_one_initcall+0x60/0x3f0
[86.862454]        kernel_init_freeable+0x3cd/0x680
[86.862470]        kernel_init+0x1b/0x200
[86.862482]        ret_from_fork+0x47/0x70
[86.862495]        ret_from_fork_asm+0x1a/0x30
[86.862509]
-&gt; #3 (&amp;mm-&gt;mmap_lock){++++}-{3:3}:
[86.862531]        down_read_killable+0x46/0x1e0
[86.862546]        lock_mm_and_find_vma+0xa2/0x280
[86.862561]        do_user_addr_fault+0x266/0x8e0
[86.862578]        exc_page_fault+0x8a/0x2f0
[86.862593]        asm_exc_page_fault+0x27/0x30
[86.862607]        filldir64+0xeb/0x180
[86.862620]        kernfs_fop_readdir+0x118/0x480
[86.862635]        iterate_dir+0xcf/0x2b0
[86.862648]        __x64_sys_getdents64+0x84/0x140
[86.862661]        x64_sys_call+0x1058/0x2660
[86.862675]        do_syscall_64+0x91/0xe90
[86.862689]        entry_SYSCALL_64_after_hwframe+0x76/0x7e
[86.862703]
-&gt; #2 (&amp;root-&gt;kernfs_rwsem){++++}-{3:3}:
[86.862725]        down_write+0x3e/0xf0
[86.862738]        kernfs_add_one+0x30/0x3c0
[86.862751]        kernfs_create_dir_ns+0x53/0xb0
[86.862765]        internal_create_group+0x134/0x4c0
[86.862779]        sysfs_create_group+0x13/0x20
[86.862792]        topology_add_dev+0x1d/0x30
[86.862806]        cpuhp_invoke_callback+0x4b5/0x850
[86.862822]        cpuhp_issue_call+0xbf/0x1f0
[86.862836]        __cpuhp_setup_state_cpuslocked+0x111/0x320
[86.862852]        __cpuhp_setup_state+0xb0/0x220
[86.862866]        topology_sysfs_init+0x30/0x50
[86.862879]        do_one_initcall+0x60/0x3f0
[86.862893]        kernel_init_freeable+0x3cd/0x680
[86.862908]        kernel_init+0x1b/0x200
[86.862921]        ret_from_fork+0x47/0x70
[86.862934]        ret_from_fork_asm+0x1a/0x30
[86.862947]
-&gt; #1 (cpuhp_state_mutex){+.+.}-{3:3}:
[86.862969]        __mutex_lock+0xaa/0xed0
[86.862982]        mutex_lock_nested+0x1b/0x30
[86.862995]        __cpuhp_setup_state_cpuslocked+0x67/0x320
[86.863012]        __cpuhp_setup_state+0xb0/0x220
[86.863026]        page_alloc_init_cpuhp+0x2d/0x60
[86.863041]        mm_core_init+0x22/0x2d0
[86.863054]        start_kernel+0x576/0xbd0
[86.863068]        x86_64_start_reservations+0x18/0x30
[86.863084]        x86_64_start_kernel+0xbf/0x110
[86.863098]        common_startup_64+0x13e/0x141
[86.863114]
-&gt; #0 (cpu_hotplug_lock){++++}-{0:0}:
[86.863135]        __lock_acquire+0x16
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68244/">CVE-2025-68244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68244">CVE-2025-68244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255190">SUSE bug 1255190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68245</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68245" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68245" ref_url="https://www.suse.com/security/cve/CVE-2025-68245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: netpoll: fix incorrect refcount handling causing incorrect cleanup

commit efa95b01da18 ("netpoll: fix use after free") incorrectly
ignored the refcount and prematurely set dev-&gt;npinfo to NULL during
netpoll cleanup, leading to improper behavior and memory leaks.

Scenario causing lack of proper cleanup:

1) A netpoll is associated with a NIC (e.g., eth0) and netdev-&gt;npinfo is
   allocated, and refcnt = 1
   - Keep in mind that npinfo is shared among all netpoll instances. In
     this case, there is just one.

2) Another netpoll is also associated with the same NIC and
   npinfo-&gt;refcnt += 1.
   - Now dev-&gt;npinfo-&gt;refcnt = 2;
   - There is just one npinfo associated to the netdev.

3) When the first netpolls goes to clean up:
   - The first cleanup succeeds and clears np-&gt;dev-&gt;npinfo, ignoring
     refcnt.
     - It basically calls `RCU_INIT_POINTER(np-&gt;dev-&gt;npinfo, NULL);`
   - Set dev-&gt;npinfo = NULL, without proper cleanup
   - No -&gt;ndo_netpoll_cleanup() is either called

4) Now the second target tries to clean up
   - The second cleanup fails because np-&gt;dev-&gt;npinfo is already NULL.
     * In this case, ops-&gt;ndo_netpoll_cleanup() was never called, and
       the skb pool is not cleaned as well (for the second netpoll
       instance)
  - This leaks npinfo and skbpool skbs, which is clearly reported by
    kmemleak.

Revert commit efa95b01da18 ("netpoll: fix use after free") and adds
clarifying comments emphasizing that npinfo cleanup should only happen
once the refcount reaches zero, ensuring stable and correct netpoll
behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68245/">CVE-2025-68245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68245">CVE-2025-68245 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255268">SUSE bug 1255268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68249</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68249" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68249" ref_url="https://www.suse.com/security/cve/CVE-2025-68249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

most: usb: hdm_probe: Fix calling put_device() before device initialization

The early error path in hdm_probe() can jump to err_free_mdev before
&amp;mdev-&gt;dev has been initialized with device_initialize(). Calling
put_device(&amp;mdev-&gt;dev) there triggers a device core WARN and ends up
invoking kref_put(&amp;kobj-&gt;kref, kobject_release) on an uninitialized
kobject.

In this path the private struct was only kmalloc'ed and the intended
release is effectively kfree(mdev) anyway, so free it directly instead
of calling put_device() on an uninitialized device.

This removes the WARNING and fixes the pre-initialization error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68249/">CVE-2025-68249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68249">CVE-2025-68249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255233">SUSE bug 1255233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68252</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68252" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68252" ref_url="https://www.suse.com/security/cve/CVE-2025-68252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: fastrpc: Fix dma_buf object leak in fastrpc_map_lookup

In fastrpc_map_lookup, dma_buf_get is called to obtain a reference to
the dma_buf for comparison purposes. However, this reference is never
released when the function returns, leading to a dma_buf memory leak.

Fix this by adding dma_buf_put before returning from the function,
ensuring that the temporarily acquired reference is properly released
regardless of whether a matching map is found.

Rule: add
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68252/">CVE-2025-68252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68252">CVE-2025-68252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255197">SUSE bug 1255197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68254</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68254" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68254" ref_url="https://www.suse.com/security/cve/CVE-2025-68254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing

The Extended Supported Rates (ESR) IE handling in OnBeacon accessed
*(p + 1 + ielen) and *(p + 2 + ielen) without verifying that these
offsets lie within the received frame buffer. A malformed beacon with
an ESR IE positioned at the end of the buffer could cause an
out-of-bounds read, potentially triggering a kernel panic.

Add a boundary check to ensure that the ESR IE body and the subsequent
bytes are within the limits of the frame before attempting to access
them.

This prevents OOB reads caused by malformed beacon frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68254/">CVE-2025-68254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68254">CVE-2025-68254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255140">SUSE bug 1255140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68255</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68255" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68255" ref_url="https://www.suse.com/security/cve/CVE-2025-68255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing

The Supported Rates IE length from an incoming Association Request frame
was used directly as the memcpy() length when copying into a fixed-size
16-byte stack buffer (supportRate). A malicious station can advertise an
IE length larger than 16 bytes, causing a stack buffer overflow.

Clamp ie_len to the buffer size before copying the Supported Rates IE,
and correct the bounds check when merging Extended Supported Rates to
prevent a second potential overflow.

This prevents kernel stack corruption triggered by malformed association
requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68255/">CVE-2025-68255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68255">CVE-2025-68255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255395">SUSE bug 1255395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68256</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68256" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68256" ref_url="https://www.suse.com/security/cve/CVE-2025-68256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser

The Information Element (IE) parser rtw_get_ie() trusted the length
byte of each IE without validating that the IE body (len bytes after
the 2-byte header) fits inside the remaining frame buffer. A malformed
frame can advertise an IE length larger than the available data, causing
the parser to increment its pointer beyond the buffer end. This results
in out-of-bounds reads or, depending on the pattern, an infinite loop.

Fix by validating that (offset + 2 + len) does not exceed the limit
before accepting the IE or advancing to the next element.

This prevents OOB reads and ensures the parser terminates safely on
malformed frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68256/">CVE-2025-68256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68256">CVE-2025-68256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255138">SUSE bug 1255138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68257</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68257" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68257" ref_url="https://www.suse.com/security/cve/CVE-2025-68257" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: check device's attached status in compat ioctls

Syzbot identified an issue [1] that crashes kernel, seemingly due to
unexistent callback dev-&gt;get_valid_routes(). By all means, this should
not occur as said callback must always be set to
get_zero_valid_routes() in __comedi_device_postconfig().

As the crash seems to appear exclusively in i386 kernels, at least,
judging from [1] reports, the blame lies with compat versions
of standard IOCTL handlers. Several of them are modified and
do not use comedi_unlocked_ioctl(). While functionality of these
ioctls essentially copy their original versions, they do not
have required sanity check for device's attached status. This,
in turn, leads to a possibility of calling select IOCTLs on a
device that has not been properly setup, even via COMEDI_DEVCONFIG.

Doing so on unconfigured devices means that several crucial steps
are missed, for instance, specifying dev-&gt;get_valid_routes()
callback.

Fix this somewhat crudely by ensuring device's attached status before
performing any ioctls, improving logic consistency between modern
and compat functions.

[1] Syzbot report:
BUG: kernel NULL pointer dereference, address: 0000000000000000
...
CR2: ffffffffffffffd6 CR3: 000000006c717000 CR4: 0000000000352ef0
Call Trace:
 &lt;TASK&gt;
 get_valid_routes drivers/comedi/comedi_fops.c:1322 [inline]
 parse_insn+0x78c/0x1970 drivers/comedi/comedi_fops.c:1401
 do_insnlist_ioctl+0x272/0x700 drivers/comedi/comedi_fops.c:1594
 compat_insnlist drivers/comedi/comedi_fops.c:3208 [inline]
 comedi_compat_ioctl+0x810/0x990 drivers/comedi/comedi_fops.c:3273
 __do_compat_sys_ioctl fs/ioctl.c:695 [inline]
 __se_compat_sys_ioctl fs/ioctl.c:638 [inline]
 __ia32_compat_sys_ioctl+0x242/0x370 fs/ioctl.c:638
 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]
...
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68257/">CVE-2025-68257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68257">CVE-2025-68257 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255167">SUSE bug 1255167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68258</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68258" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68258" ref_url="https://www.suse.com/security/cve/CVE-2025-68258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: multiq3: sanitize config options in multiq3_attach()

Syzbot identified an issue [1] in multiq3_attach() that induces a
task timeout due to open() or COMEDI_DEVCONFIG ioctl operations,
specifically, in the case of multiq3 driver.

This problem arose when syzkaller managed to craft weird configuration
options used to specify the number of channels in encoder subdevice.
If a particularly great number is passed to s-&gt;n_chan in
multiq3_attach() via it-&gt;options[2], then multiple calls to
multiq3_encoder_reset() at the end of driver-specific attach() method
will be running for minutes, thus blocking tasks and affected devices
as well.

While this issue is most likely not too dangerous for real-life
devices, it still makes sense to sanitize configuration inputs. Enable
a sensible limit on the number of encoder chips (4 chips max, each
with 2 channels) to stop this behaviour from manifesting.

[1] Syzbot crash:
INFO: task syz.2.19:6067 blocked for more than 143 seconds.
...
Call Trace:
 &lt;TASK&gt;
 context_switch kernel/sched/core.c:5254 [inline]
 __schedule+0x17c4/0x4d60 kernel/sched/core.c:6862
 __schedule_loop kernel/sched/core.c:6944 [inline]
 schedule+0x165/0x360 kernel/sched/core.c:6959
 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:7016
 __mutex_lock_common kernel/locking/mutex.c:676 [inline]
 __mutex_lock+0x7e6/0x1350 kernel/locking/mutex.c:760
 comedi_open+0xc0/0x590 drivers/comedi/comedi_fops.c:2868
 chrdev_open+0x4cc/0x5e0 fs/char_dev.c:414
 do_dentry_open+0x953/0x13f0 fs/open.c:965
 vfs_open+0x3b/0x340 fs/open.c:1097
...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68258/">CVE-2025-68258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68258">CVE-2025-68258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255182">SUSE bug 1255182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68259</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68259" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68259" ref_url="https://www.suse.com/security/cve/CVE-2025-68259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced

When re-injecting a soft interrupt from an INT3, INT0, or (select) INTn
instruction, discard the exception and retry the instruction if the code
stream is changed (e.g. by a different vCPU) between when the CPU
executes the instruction and when KVM decodes the instruction to get the
next RIP.

As effectively predicted by commit 6ef88d6e36c2 ("KVM: SVM: Re-inject
INT3/INTO instead of retrying the instruction"), failure to verify that
the correct INTn instruction was decoded can effectively clobber guest
state due to decoding the wrong instruction and thus specifying the
wrong next RIP.

The bug most often manifests as "Oops: int3" panics on static branch
checks in Linux guests.  Enabling or disabling a static branch in Linux
uses the kernel's "text poke" code patching mechanism.  To modify code
while other CPUs may be executing that code, Linux (temporarily)
replaces the first byte of the original instruction with an int3 (opcode
0xcc), then patches in the new code stream except for the first byte,
and finally replaces the int3 with the first byte of the new code
stream.  If a CPU hits the int3, i.e. executes the code while it's being
modified, then the guest kernel must look up the RIP to determine how to
handle the #BP, e.g. by emulating the new instruction.  If the RIP is
incorrect, then this lookup fails and the guest kernel panics.

The bug reproduces almost instantly by hacking the guest kernel to
repeatedly check a static branch[1] while running a drgn script[2] on
the host to constantly swap out the memory containing the guest's TSS.

[1]: https://gist.github.com/osandov/44d17c51c28c0ac998ea0334edf90b5a
[2]: https://gist.github.com/osandov/10e45e45afa29b11e0c7209247afc00b
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68259/">CVE-2025-68259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68259">CVE-2025-68259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255199">SUSE bug 1255199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68261</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68261" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68261" ref_url="https://www.suse.com/security/cve/CVE-2025-68261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock()

Fix a race between inline data destruction and block mapping.

The function ext4_destroy_inline_data_nolock() changes the inode data
layout by clearing EXT4_INODE_INLINE_DATA and setting EXT4_INODE_EXTENTS.
At the same time, another thread may execute ext4_map_blocks(), which
tests EXT4_INODE_EXTENTS to decide whether to call ext4_ext_map_blocks()
or ext4_ind_map_blocks().

Without i_data_sem protection, ext4_ind_map_blocks() may receive inode
with EXT4_INODE_EXTENTS flag and triggering assert.

kernel BUG at fs/ext4/indirect.c:546!
EXT4-fs (loop2): unmounting filesystem.
invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:ext4_ind_map_blocks.cold+0x2b/0x5a fs/ext4/indirect.c:546

Call Trace:
 &lt;TASK&gt;
 ext4_map_blocks+0xb9b/0x16f0 fs/ext4/inode.c:681
 _ext4_get_block+0x242/0x590 fs/ext4/inode.c:822
 ext4_block_write_begin+0x48b/0x12c0 fs/ext4/inode.c:1124
 ext4_write_begin+0x598/0xef0 fs/ext4/inode.c:1255
 ext4_da_write_begin+0x21e/0x9c0 fs/ext4/inode.c:3000
 generic_perform_write+0x259/0x5d0 mm/filemap.c:3846
 ext4_buffered_write_iter+0x15b/0x470 fs/ext4/file.c:285
 ext4_file_write_iter+0x8e0/0x17f0 fs/ext4/file.c:679
 call_write_iter include/linux/fs.h:2271 [inline]
 do_iter_readv_writev+0x212/0x3c0 fs/read_write.c:735
 do_iter_write+0x186/0x710 fs/read_write.c:861
 vfs_iter_write+0x70/0xa0 fs/read_write.c:902
 iter_file_splice_write+0x73b/0xc90 fs/splice.c:685
 do_splice_from fs/splice.c:763 [inline]
 direct_splice_actor+0x10f/0x170 fs/splice.c:950
 splice_direct_to_actor+0x33a/0xa10 fs/splice.c:896
 do_splice_direct+0x1a9/0x280 fs/splice.c:1002
 do_sendfile+0xb13/0x12c0 fs/read_write.c:1255
 __do_sys_sendfile64 fs/read_write.c:1323 [inline]
 __se_sys_sendfile64 fs/read_write.c:1309 [inline]
 __x64_sys_sendfile64+0x1cf/0x210 fs/read_write.c:1309
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x6e/0xd8
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68261/">CVE-2025-68261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68261">CVE-2025-68261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255164">SUSE bug 1255164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68264</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68264" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68264" ref_url="https://www.suse.com/security/cve/CVE-2025-68264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: refresh inline data size before write operations

The cached ei-&gt;i_inline_size can become stale between the initial size
check and when ext4_update_inline_data()/ext4_create_inline_data() use
it. Although ext4_get_max_inline_size() reads the correct value at the
time of the check, concurrent xattr operations can modify i_inline_size
before ext4_write_lock_xattr() is acquired.

This causes ext4_update_inline_data() and ext4_create_inline_data() to
work with stale capacity values, leading to a BUG_ON() crash in
ext4_write_inline_data():

  kernel BUG at fs/ext4/inline.c:1331!
  BUG_ON(pos + len &gt; EXT4_I(inode)-&gt;i_inline_size);

The race window:
1. ext4_get_max_inline_size() reads i_inline_size = 60 (correct)
2. Size check passes for 50-byte write
3. [Another thread adds xattr, i_inline_size changes to 40]
4. ext4_write_lock_xattr() acquires lock
5. ext4_update_inline_data() uses stale i_inline_size = 60
6. Attempts to write 50 bytes but only 40 bytes actually available
7. BUG_ON() triggers

Fix this by recalculating i_inline_size via ext4_find_inline_data_nolock()
immediately after acquiring xattr_sem. This ensures ext4_update_inline_data()
and ext4_create_inline_data() work with current values that are protected
from concurrent modifications.

This is similar to commit a54c4613dac1 ("ext4: fix race writing to an
inline_data file while its xattrs are changing") which fixed i_inline_off
staleness. This patch addresses the related i_inline_size staleness issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68264/">CVE-2025-68264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68264">CVE-2025-68264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255380">SUSE bug 1255380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68266</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68266" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68266" ref_url="https://www.suse.com/security/cve/CVE-2025-68266" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bfs: Reconstruct file type when loading from disk

syzbot is reporting that S_IFMT bits of inode-&gt;i_mode can become bogus when
the S_IFMT bits of the 32bits "mode" field loaded from disk are corrupted
or when the 32bits "attributes" field loaded from disk are corrupted.

A documentation says that BFS uses only lower 9 bits of the "mode" field.
But I can't find an explicit explanation that the unused upper 23 bits
(especially, the S_IFMT bits) are initialized with 0.

Therefore, ignore the S_IFMT bits of the "mode" field loaded from disk.
Also, verify that the value of the "attributes" field loaded from disk is
either BFS_VREG or BFS_VDIR (because BFS supports only regular files and
the root directory).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68266/">CVE-2025-68266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68266">CVE-2025-68266 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255132">SUSE bug 1255132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68276</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68276" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68276" ref_url="https://www.suse.com/security/cve/CVE-2025-68276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024497.html" source="SUSE-SU"/>
    <description>
    Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, an unprivileged local users can crash avahi-daemon (with wide-area disabled) by creating record browsers with the AVAHI_LOOKUP_USE_WIDE_AREA flag set via D-Bus. This can be done by either calling
the RecordBrowserNew method directly or creating hostname/address/service resolvers/browsers that create those browsers internally themselves.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68276/">CVE-2025-68276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68276">CVE-2025-68276 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256498">SUSE bug 1256498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010040025" comment="avahi-0.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040032" comment="libavahi-client3-0.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040033" comment="libavahi-common3-0.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040034" comment="libavahi-core7-0.8-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68283</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68283" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68283" ref_url="https://www.suse.com/security/cve/CVE-2025-68283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: replace BUG_ON with bounds check for map-&gt;max_osd

OSD indexes come from untrusted network packets. Boundary checks are
added to validate these against map-&gt;max_osd.

[ idryomov: drop BUG_ON in ceph_get_primary_affinity(), minor cosmetic
  edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68283/">CVE-2025-68283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68283">CVE-2025-68283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255379">SUSE bug 1255379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68284</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68284" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68284" ref_url="https://www.suse.com/security/cve/CVE-2025-68284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20887-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20888-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20889-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: prevent potential out-of-bounds writes in handle_auth_session_key()

The len field originates from untrusted network packets. Boundary
checks have been added to prevent potential out-of-bounds writes when
decrypting the connection secret or processing service tickets.

[ idryomov: changelog ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68284/">CVE-2025-68284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68284">CVE-2025-68284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255377">SUSE bug 1255377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255378">SUSE bug 1255378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052000" comment="kernel-livepatch-6_12_0-160000_5-default-8-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051986" comment="kernel-livepatch-6_12_0-160000_5-rt-6-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052001" comment="kernel-livepatch-6_12_0-160000_6-default-6-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051990" comment="kernel-livepatch-6_12_0-160000_6-rt-5-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052002" comment="kernel-livepatch-6_12_0-160000_7-default-4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051985" comment="kernel-livepatch-6_12_0-160000_7-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051998" comment="kernel-livepatch-6_12_0-160000_8-default-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051984" comment="kernel-livepatch-6_12_0-160000_8-rt-2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68285</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68285" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68285" ref_url="https://www.suse.com/security/cve/CVE-2025-68285" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0755" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002421.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20887-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20888-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20889-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: fix potential use-after-free in have_mon_and_osd_map()

The wait loop in __ceph_open_session() can race with the client
receiving a new monmap or osdmap shortly after the initial map is
received.  Both ceph_monc_handle_map() and handle_one_map() install
a new map immediately after freeing the old one

    kfree(monc-&gt;monmap);
    monc-&gt;monmap = monmap;

    ceph_osdmap_destroy(osdc-&gt;osdmap);
    osdc-&gt;osdmap = newmap;

under client-&gt;monc.mutex and client-&gt;osdc.lock respectively, but
because neither is taken in have_mon_and_osd_map() it's possible for
client-&gt;monc.monmap-&gt;epoch and client-&gt;osdc.osdmap-&gt;epoch arms in

    client-&gt;monc.monmap &amp;&amp; client-&gt;monc.monmap-&gt;epoch &amp;&amp;
        client-&gt;osdc.osdmap &amp;&amp; client-&gt;osdc.osdmap-&gt;epoch;

condition to dereference an already freed map.  This happens to be
reproducible with generic/395 and generic/397 with KASAN enabled:

    BUG: KASAN: slab-use-after-free in have_mon_and_osd_map+0x56/0x70
    Read of size 4 at addr ffff88811012d810 by task mount.ceph/13305
    CPU: 2 UID: 0 PID: 13305 Comm: mount.ceph Not tainted 6.14.0-rc2-build2+ #1266
    ...
    Call Trace:
    &lt;TASK&gt;
    have_mon_and_osd_map+0x56/0x70
    ceph_open_session+0x182/0x290
    ceph_get_tree+0x333/0x680
    vfs_get_tree+0x49/0x180
    do_new_mount+0x1a3/0x2d0
    path_mount+0x6dd/0x730
    do_mount+0x99/0xe0
    __do_sys_mount+0x141/0x180
    do_syscall_64+0x9f/0x100
    entry_SYSCALL_64_after_hwframe+0x76/0x7e
    &lt;/TASK&gt;

    Allocated by task 13305:
    ceph_osdmap_alloc+0x16/0x130
    ceph_osdc_init+0x27a/0x4c0
    ceph_create_client+0x153/0x190
    create_fs_client+0x50/0x2a0
    ceph_get_tree+0xff/0x680
    vfs_get_tree+0x49/0x180
    do_new_mount+0x1a3/0x2d0
    path_mount+0x6dd/0x730
    do_mount+0x99/0xe0
    __do_sys_mount+0x141/0x180
    do_syscall_64+0x9f/0x100
    entry_SYSCALL_64_after_hwframe+0x76/0x7e

    Freed by task 9475:
    kfree+0x212/0x290
    handle_one_map+0x23c/0x3b0
    ceph_osdc_handle_map+0x3c9/0x590
    mon_dispatch+0x655/0x6f0
    ceph_con_process_message+0xc3/0xe0
    ceph_con_v1_try_read+0x614/0x760
    ceph_con_workfn+0x2de/0x650
    process_one_work+0x486/0x7c0
    process_scheduled_works+0x73/0x90
    worker_thread+0x1c8/0x2a0
    kthread+0x2ec/0x300
    ret_from_fork+0x24/0x40
    ret_from_fork_asm+0x1a/0x30

Rewrite the wait loop to check the above condition directly with
client-&gt;monc.mutex and client-&gt;osdc.lock taken as appropriate.  While
at it, improve the timeout handling (previously mount_timeout could be
exceeded in case wait_event_interruptible_timeout() slept more than
once) and access client-&gt;auth_err under client-&gt;monc.mutex to match
how it's set in finish_auth().

monmap_show() and osdmap_show() now take the respective lock before
accessing the map as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68285/">CVE-2025-68285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68285">CVE-2025-68285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255401">SUSE bug 1255401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255402">SUSE bug 1255402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052000" comment="kernel-livepatch-6_12_0-160000_5-default-8-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051986" comment="kernel-livepatch-6_12_0-160000_5-rt-6-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052001" comment="kernel-livepatch-6_12_0-160000_6-default-6-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051990" comment="kernel-livepatch-6_12_0-160000_6-rt-5-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052002" comment="kernel-livepatch-6_12_0-160000_7-default-4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051985" comment="kernel-livepatch-6_12_0-160000_7-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051998" comment="kernel-livepatch-6_12_0-160000_8-default-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051984" comment="kernel-livepatch-6_12_0-160000_8-rt-2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68286</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68286" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68286" ref_url="https://www.suse.com/security/cve/CVE-2025-68286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check NULL before accessing

[WHAT]
IGT kms_cursor_legacy's long-nonblocking-modeset-vs-cursor-atomic
fails with NULL pointer dereference. This can be reproduced with
both an eDP panel and a DP monitors connected.

 BUG: kernel NULL pointer dereference, address: 0000000000000000
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: Oops: 0000 [#1] SMP NOPTI
 CPU: 13 UID: 0 PID: 2960 Comm: kms_cursor_lega Not tainted
6.16.0-99-custom #8 PREEMPT(voluntary)
 Hardware name: AMD ........
 RIP: 0010:dc_stream_get_scanoutpos+0x34/0x130 [amdgpu]
 Code: 57 4d 89 c7 41 56 49 89 ce 41 55 49 89 d5 41 54 49
 89 fc 53 48 83 ec 18 48 8b 87 a0 64 00 00 48 89 75 d0 48 c7 c6 e0 41 30
 c2 &lt;48&gt; 8b 38 48 8b 9f 68 06 00 00 e8 8d d7 fd ff 31 c0 48 81 c3 e0 02
 RSP: 0018:ffffd0f3c2bd7608 EFLAGS: 00010292
 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffd0f3c2bd7668
 RDX: ffffd0f3c2bd7664 RSI: ffffffffc23041e0 RDI: ffff8b32494b8000
 RBP: ffffd0f3c2bd7648 R08: ffffd0f3c2bd766c R09: ffffd0f3c2bd7760
 R10: ffffd0f3c2bd7820 R11: 0000000000000000 R12: ffff8b32494b8000
 R13: ffffd0f3c2bd7664 R14: ffffd0f3c2bd7668 R15: ffffd0f3c2bd766c
 FS:  000071f631b68700(0000) GS:ffff8b399f114000(0000)
knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000000 CR3: 00000001b8105000 CR4: 0000000000f50ef0
 PKRU: 55555554
 Call Trace:
 &lt;TASK&gt;
 dm_crtc_get_scanoutpos+0xd7/0x180 [amdgpu]
 amdgpu_display_get_crtc_scanoutpos+0x86/0x1c0 [amdgpu]
 ? __pfx_amdgpu_crtc_get_scanout_position+0x10/0x10[amdgpu]
 amdgpu_crtc_get_scanout_position+0x27/0x50 [amdgpu]
 drm_crtc_vblank_helper_get_vblank_timestamp_internal+0xf7/0x400
 drm_crtc_vblank_helper_get_vblank_timestamp+0x1c/0x30
 drm_crtc_get_last_vbltimestamp+0x55/0x90
 drm_crtc_next_vblank_start+0x45/0xa0
 drm_atomic_helper_wait_for_fences+0x81/0x1f0
 ...

(cherry picked from commit 621e55f1919640acab25383362b96e65f2baea3c)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68286/">CVE-2025-68286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68286">CVE-2025-68286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255351">SUSE bug 1255351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68287</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68287" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68287" ref_url="https://www.suse.com/security/cve/CVE-2025-68287" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths

This patch addresses a race condition caused by unsynchronized
execution of multiple call paths invoking `dwc3_remove_requests()`,
leading to premature freeing of USB requests and subsequent crashes.

Three distinct execution paths interact with `dwc3_remove_requests()`:
Path 1:
Triggered via `dwc3_gadget_reset_interrupt()` during USB reset
handling. The call stack includes:
- `dwc3_ep0_reset_state()`
- `dwc3_ep0_stall_and_restart()`
- `dwc3_ep0_out_start()`
- `dwc3_remove_requests()`
- `dwc3_gadget_del_and_unmap_request()`

Path 2:
Also initiated from `dwc3_gadget_reset_interrupt()`, but through
`dwc3_stop_active_transfers()`. The call stack includes:
- `dwc3_stop_active_transfers()`
- `dwc3_remove_requests()`
- `dwc3_gadget_del_and_unmap_request()`

Path 3:
Occurs independently during `adb root` execution, which triggers
USB function unbind and bind operations. The sequence includes:
- `gserial_disconnect()`
- `usb_ep_disable()`
- `dwc3_gadget_ep_disable()`
- `dwc3_remove_requests()` with `-ESHUTDOWN` status

Path 3 operates asynchronously and lacks synchronization with Paths
1 and 2. When Path 3 completes, it disables endpoints and frees 'out'
requests. If Paths 1 or 2 are still processing these requests,
accessing freed memory leads to a crash due to use-after-free conditions.

To fix this added check for request completion and skip processing
if already completed and added the request status for ep0 while queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68287/">CVE-2025-68287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68287">CVE-2025-68287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255152">SUSE bug 1255152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68289</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68289" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68289" ref_url="https://www.suse.com/security/cve/CVE-2025-68289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_eem: Fix memory leak in eem_unwrap

The existing code did not handle the failure case of usb_ep_queue in the
command path, potentially leading to memory leaks.

Improve error handling to free all allocated resources on usb_ep_queue
failure. This patch continues to use goto logic for error handling, as the
existing error handling is complex and not easily adaptable to auto-cleanup
helpers.

kmemleak results:
  unreferenced object 0xffffff895a512300 (size 240):
    backtrace:
      slab_post_alloc_hook+0xbc/0x3a4
      kmem_cache_alloc+0x1b4/0x358
      skb_clone+0x90/0xd8
      eem_unwrap+0x1cc/0x36c
  unreferenced object 0xffffff8a157f4000 (size 256):
    backtrace:
      slab_post_alloc_hook+0xbc/0x3a4
      __kmem_cache_alloc_node+0x1b4/0x2dc
      kmalloc_trace+0x48/0x140
      dwc3_gadget_ep_alloc_request+0x58/0x11c
      usb_ep_alloc_request+0x40/0xe4
      eem_unwrap+0x204/0x36c
  unreferenced object 0xffffff8aadbaac00 (size 128):
    backtrace:
      slab_post_alloc_hook+0xbc/0x3a4
      __kmem_cache_alloc_node+0x1b4/0x2dc
      __kmalloc+0x64/0x1a8
      eem_unwrap+0x218/0x36c
  unreferenced object 0xffffff89ccef3500 (size 64):
    backtrace:
      slab_post_alloc_hook+0xbc/0x3a4
      __kmem_cache_alloc_node+0x1b4/0x2dc
      kmalloc_trace+0x48/0x140
      eem_unwrap+0x238/0x36c
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68289/">CVE-2025-68289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68289">CVE-2025-68289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255155">SUSE bug 1255155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68290</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68290" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68290" ref_url="https://www.suse.com/security/cve/CVE-2025-68290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

most: usb: fix double free on late probe failure

The MOST subsystem has a non-standard registration function which frees
the interface on registration failures and on deregistration.

This unsurprisingly leads to bugs in the MOST drivers, and a couple of
recent changes turned a reference underflow and use-after-free in the
USB driver into several double free and a use-after-free on late probe
failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68290/">CVE-2025-68290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68290">CVE-2025-68290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255154">SUSE bug 1255154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68292</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68292" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68292" ref_url="https://www.suse.com/security/cve/CVE-2025-68292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/memfd: fix information leak in hugetlb folios

When allocating hugetlb folios for memfd, three initialization steps are
missing:

1. Folios are not zeroed, leading to kernel memory disclosure to userspace
2. Folios are not marked uptodate before adding to page cache
3. hugetlb_fault_mutex is not taken before hugetlb_add_to_page_cache()

The memfd allocation path bypasses the normal page fault handler
(hugetlb_no_page) which would handle all of these initialization steps. 
This is problematic especially for udmabuf use cases where folios are
pinned and directly accessed by userspace via DMA.

Fix by matching the initialization pattern used in hugetlb_no_page():
- Zero the folio using folio_zero_user() which is optimized for huge pages
- Mark it uptodate with folio_mark_uptodate()
- Take hugetlb_fault_mutex before adding to page cache to prevent races

The folio_zero_user() change also fixes a potential security issue where
uninitialized kernel memory could be disclosed to userspace through read()
or mmap() operations on the memfd.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68292/">CVE-2025-68292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68292">CVE-2025-68292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255148">SUSE bug 1255148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68293</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68293" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68293" ref_url="https://www.suse.com/security/cve/CVE-2025-68293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/huge_memory: fix NULL pointer deference when splitting folio

Commit c010d47f107f ("mm: thp: split huge page to any lower order pages")
introduced an early check on the folio's order via mapping-&gt;flags before
proceeding with the split work.

This check introduced a bug: for shmem folios in the swap cache and
truncated folios, the mapping pointer can be NULL.  Accessing
mapping-&gt;flags in this state leads directly to a NULL pointer dereference.

This commit fixes the issue by moving the check for mapping != NULL before
any attempt to access mapping-&gt;flags.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68293/">CVE-2025-68293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68293">CVE-2025-68293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255150">SUSE bug 1255150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68295</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68295" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68295" ref_url="https://www.suse.com/security/cve/CVE-2025-68295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix memory leak in cifs_construct_tcon()

When having a multiuser mount with domain= specified and using
cifscreds, cifs_set_cifscreds() will end up setting @ctx-&gt;domainname,
so it needs to be freed before leaving cifs_construct_tcon().

This fixes the following memory leak reported by kmemleak:

  mount.cifs //srv/share /mnt -o domain=ZELDA,multiuser,...
  su - testuser
  cifscreds add -d ZELDA -u testuser
  ...
  ls /mnt/1
  ...
  umount /mnt
  echo scan &gt; /sys/kernel/debug/kmemleak
  cat /sys/kernel/debug/kmemleak
  unreferenced object 0xffff8881203c3f08 (size 8):
    comm "ls", pid 5060, jiffies 4307222943
    hex dump (first 8 bytes):
      5a 45 4c 44 41 00 cc cc                          ZELDA...
    backtrace (crc d109a8cf):
      __kmalloc_node_track_caller_noprof+0x572/0x710
      kstrdup+0x3a/0x70
      cifs_sb_tlink+0x1209/0x1770 [cifs]
      cifs_get_fattr+0xe1/0xf50 [cifs]
      cifs_get_inode_info+0xb5/0x240 [cifs]
      cifs_revalidate_dentry_attr+0x2d1/0x470 [cifs]
      cifs_getattr+0x28e/0x450 [cifs]
      vfs_getattr_nosec+0x126/0x180
      vfs_statx+0xf6/0x220
      do_statx+0xab/0x110
      __x64_sys_statx+0xd5/0x130
      do_syscall_64+0xbb/0x380
      entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68295/">CVE-2025-68295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68295">CVE-2025-68295 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255129">SUSE bug 1255129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68296</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68296" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68296" ref_url="https://www.suse.com/security/cve/CVE-2025-68296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup

Protect vga_switcheroo_client_fb_set() with console lock. Avoids OOB
access in fbcon_remap_all(). Without holding the console lock the call
races with switching outputs.

VGA switcheroo calls fbcon_remap_all() when switching clients. The fbcon
function uses struct fb_info.node, which is set by register_framebuffer().
As the fb-helper code currently sets up VGA switcheroo before registering
the framebuffer, the value of node is -1 and therefore not a legal value.
For example, fbcon uses the value within set_con2fb_map() [1] as an index
into an array.

Moving vga_switcheroo_client_fb_set() after register_framebuffer() can
result in VGA switching that does not switch fbcon correctly.

Therefore move vga_switcheroo_client_fb_set() under fbcon_fb_registered(),
which already holds the console lock. Fbdev calls fbcon_fb_registered()
from within register_framebuffer(). Serializes the helper with VGA
switcheroo's call to fbcon_remap_all().

Although vga_switcheroo_client_fb_set() takes an instance of struct fb_info
as parameter, it really only needs the contained fbcon state. Moving the
call to fbcon initialization is therefore cleaner than before. Only amdgpu,
i915, nouveau and radeon support vga_switcheroo. For all other drivers,
this change does nothing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68296/">CVE-2025-68296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68296">CVE-2025-68296 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255128">SUSE bug 1255128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68297</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68297" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68297" ref_url="https://www.suse.com/security/cve/CVE-2025-68297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix crash in process_v2_sparse_read() for encrypted directories

The crash in process_v2_sparse_read() for fscrypt-encrypted directories
has been reported. Issue takes place for Ceph msgr2 protocol in secure
mode. It can be reproduced by the steps:

sudo mount -t ceph :/ /mnt/cephfs/ -o name=admin,fs=cephfs,ms_mode=secure

(1) mkdir /mnt/cephfs/fscrypt-test-3
(2) cp area_decrypted.tar /mnt/cephfs/fscrypt-test-3
(3) fscrypt encrypt --source=raw_key --key=./my.key /mnt/cephfs/fscrypt-test-3
(4) fscrypt lock /mnt/cephfs/fscrypt-test-3
(5) fscrypt unlock --key=my.key /mnt/cephfs/fscrypt-test-3
(6) cat /mnt/cephfs/fscrypt-test-3/area_decrypted.tar
(7) Issue has been triggered

[  408.072247] ------------[ cut here ]------------
[  408.072251] WARNING: CPU: 1 PID: 392 at net/ceph/messenger_v2.c:865
ceph_con_v2_try_read+0x4b39/0x72f0
[  408.072267] Modules linked in: intel_rapl_msr intel_rapl_common
intel_uncore_frequency_common intel_pmc_core pmt_telemetry pmt_discovery
pmt_class intel_pmc_ssram_telemetry intel_vsec kvm_intel joydev kvm irqbypass
polyval_clmulni ghash_clmulni_intel aesni_intel rapl input_leds psmouse
serio_raw i2c_piix4 vga16fb bochs vgastate i2c_smbus floppy mac_hid qemu_fw_cfg
pata_acpi sch_fq_codel rbd msr parport_pc ppdev lp parport efi_pstore
[  408.072304] CPU: 1 UID: 0 PID: 392 Comm: kworker/1:3 Not tainted 6.17.0-rc7+
[  408.072307] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.17.0-5.fc42 04/01/2014
[  408.072310] Workqueue: ceph-msgr ceph_con_workfn
[  408.072314] RIP: 0010:ceph_con_v2_try_read+0x4b39/0x72f0
[  408.072317] Code: c7 c1 20 f0 d4 ae 50 31 d2 48 c7 c6 60 27 d5 ae 48 c7 c7 f8
8e 6f b0 68 60 38 d5 ae e8 00 47 61 fe 48 83 c4 18 e9 ac fc ff ff &lt;0f&gt; 0b e9 06
fe ff ff 4c 8b 9d 98 fd ff ff 0f 84 64 e7 ff ff 89 85
[  408.072319] RSP: 0018:ffff88811c3e7a30 EFLAGS: 00010246
[  408.072322] RAX: ffffed1024874c6f RBX: ffffea00042c2b40 RCX: 0000000000000f38
[  408.072324] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[  408.072325] RBP: ffff88811c3e7ca8 R08: 0000000000000000 R09: 00000000000000c8
[  408.072326] R10: 00000000000000c8 R11: 0000000000000000 R12: 00000000000000c8
[  408.072327] R13: dffffc0000000000 R14: ffff8881243a6030 R15: 0000000000003000
[  408.072329] FS:  0000000000000000(0000) GS:ffff88823eadf000(0000)
knlGS:0000000000000000
[  408.072331] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  408.072332] CR2: 000000c0003c6000 CR3: 000000010c106005 CR4: 0000000000772ef0
[  408.072336] PKRU: 55555554
[  408.072337] Call Trace:
[  408.072338]  &lt;TASK&gt;
[  408.072340]  ? sched_clock_noinstr+0x9/0x10
[  408.072344]  ? __pfx_ceph_con_v2_try_read+0x10/0x10
[  408.072347]  ? _raw_spin_unlock+0xe/0x40
[  408.072349]  ? finish_task_switch.isra.0+0x15d/0x830
[  408.072353]  ? __kasan_check_write+0x14/0x30
[  408.072357]  ? mutex_lock+0x84/0xe0
[  408.072359]  ? __pfx_mutex_lock+0x10/0x10
[  408.072361]  ceph_con_workfn+0x27e/0x10e0
[  408.072364]  ? metric_delayed_work+0x311/0x2c50
[  408.072367]  process_one_work+0x611/0xe20
[  408.072371]  ? __kasan_check_write+0x14/0x30
[  408.072373]  worker_thread+0x7e3/0x1580
[  408.072375]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
[  408.072378]  ? __pfx_worker_thread+0x10/0x10
[  408.072381]  kthread+0x381/0x7a0
[  408.072383]  ? __pfx__raw_spin_lock_irq+0x10/0x10
[  408.072385]  ? __pfx_kthread+0x10/0x10
[  408.072387]  ? __kasan_check_write+0x14/0x30
[  408.072389]  ? recalc_sigpending+0x160/0x220
[  408.072392]  ? _raw_spin_unlock_irq+0xe/0x50
[  408.072394]  ? calculate_sigpending+0x78/0xb0
[  408.072395]  ? __pfx_kthread+0x10/0x10
[  408.072397]  ret_from_fork+0x2b6/0x380
[  408.072400]  ? __pfx_kthread+0x10/0x10
[  408.072402]  ret_from_fork_asm+0x1a/0x30
[  408.072406]  &lt;/TASK&gt;
[  408.072407] ---[ end trace 0000000000000000 ]---
[  408.072418] Oops: general protection fault, probably for non-canonical
address 0xdffffc00000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68297/">CVE-2025-68297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68297">CVE-2025-68297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255403">SUSE bug 1255403</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68298</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68298" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68298" ref_url="https://www.suse.com/security/cve/CVE-2025-68298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btusb: mediatek: Avoid btusb_mtk_claim_iso_intf() NULL deref

In btusb_mtk_setup(), we set `btmtk_data-&gt;isopkt_intf` to:
  usb_ifnum_to_if(data-&gt;udev, MTK_ISO_IFNUM)

That function can return NULL in some cases. Even when it returns
NULL, though, we still go on to call btusb_mtk_claim_iso_intf().

As of commit e9087e828827 ("Bluetooth: btusb: mediatek: Add locks for
usb_driver_claim_interface()"), calling btusb_mtk_claim_iso_intf()
when `btmtk_data-&gt;isopkt_intf` is NULL will cause a crash because
we'll end up passing a bad pointer to device_lock(). Prior to that
commit we'd pass the NULL pointer directly to
usb_driver_claim_interface() which would detect it and return an
error, which was handled.

Resolve the crash in btusb_mtk_claim_iso_intf() by adding a NULL check
at the start of the function. This makes the code handle a NULL
`btmtk_data-&gt;isopkt_intf` the same way it did before the problematic
commit (just with a slight change to the error message printed).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68298/">CVE-2025-68298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68298">CVE-2025-68298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255124">SUSE bug 1255124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68301</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68301" ref_url="https://www.suse.com/security/cve/CVE-2025-68301" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002404.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1703" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: atlantic: fix fragment overflow handling in RX path

The atlantic driver can receive packets with more than MAX_SKB_FRAGS (17)
fragments when handling large multi-descriptor packets. This causes an
out-of-bounds write in skb_add_rx_frag_netmem() leading to kernel panic.

The issue occurs because the driver doesn't check the total number of
fragments before calling skb_add_rx_frag(). When a packet requires more
than MAX_SKB_FRAGS fragments, the fragment index exceeds the array bounds.

Fix by assuming there will be an extra frag if buff-&gt;len &gt; AQ_CFG_RX_HDR_SIZE,
then all fragments are accounted for. And reusing the existing check to
prevent the overflow earlier in the code path.

This crash occurred in production with an Aquantia AQC113 10G NIC.

Stack trace from production environment:
```
RIP: 0010:skb_add_rx_frag_netmem+0x29/0xd0
Code: 90 f3 0f 1e fa 0f 1f 44 00 00 48 89 f8 41 89
ca 48 89 d7 48 63 ce 8b 90 c0 00 00 00 48 c1 e1 04 48 01 ca 48 03 90
c8 00 00 00 &lt;48&gt; 89 7a 30 44 89 52 3c 44 89 42 38 40 f6 c7 01 75 74 48
89 fa 83
RSP: 0018:ffffa9bec02a8d50 EFLAGS: 00010287
RAX: ffff925b22e80a00 RBX: ffff925ad38d2700 RCX:
fffffffe0a0c8000
RDX: ffff9258ea95bac0 RSI: ffff925ae0a0c800 RDI:
0000000000037a40
RBP: 0000000000000024 R08: 0000000000000000 R09:
0000000000000021
R10: 0000000000000848 R11: 0000000000000000 R12:
ffffa9bec02a8e24
R13: ffff925ad8615570 R14: 0000000000000000 R15:
ffff925b22e80a00
FS: 0000000000000000(0000)
GS:ffff925e47880000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff9258ea95baf0 CR3: 0000000166022004 CR4:
0000000000f72ef0
PKRU: 55555554
Call Trace:
&lt;IRQ&gt;
aq_ring_rx_clean+0x175/0xe60 [atlantic]
? aq_ring_rx_clean+0x14d/0xe60 [atlantic]
? aq_ring_tx_clean+0xdf/0x190 [atlantic]
? kmem_cache_free+0x348/0x450
? aq_vec_poll+0x81/0x1d0 [atlantic]
? __napi_poll+0x28/0x1c0
? net_rx_action+0x337/0x420
```

Changes in v4:
- Add Fixes: tag to satisfy patch validation requirements.

Changes in v3:
- Fix by assuming there will be an extra frag if buff-&gt;len &gt; AQ_CFG_RX_HDR_SIZE,
  then all fragments are accounted for.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68301/">CVE-2025-68301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68301">CVE-2025-68301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255120">SUSE bug 1255120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68302</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68302" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68302" ref_url="https://www.suse.com/security/cve/CVE-2025-68302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sxgbe: fix potential NULL dereference in sxgbe_rx()

Currently, when skb is null, the driver prints an error and then
dereferences skb on the next line.

To fix this, let's add a 'break' after the error message to switch
to sxgbe_rx_refill(), which is similar to the approach taken by the
other drivers in this particular case, e.g. calxeda with xgmac_rx().

Found during a code review.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68302/">CVE-2025-68302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68302">CVE-2025-68302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255121">SUSE bug 1255121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68303</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68303" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68303" ref_url="https://www.suse.com/security/cve/CVE-2025-68303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: intel: punit_ipc: fix memory corruption

This passes the address of the pointer "&amp;punit_ipcdev" when the intent
was to pass the pointer itself "punit_ipcdev" (without the ampersand).
This means that the:

	complete(&amp;ipcdev-&gt;cmd_complete);

in intel_punit_ioc() will write to a wrong memory address corrupting it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68303/">CVE-2025-68303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68303">CVE-2025-68303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255122">SUSE bug 1255122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68305</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68305" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68305" ref_url="https://www.suse.com/security/cve/CVE-2025-68305" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_sock: Prevent race in socket write iter and sock bind

There is a potential race condition between sock bind and socket write
iter. bind may free the same cmd via mgmt_pending before write iter sends
the cmd, just as syzbot reported in UAF[1].

Here we use hci_dev_lock to synchronize the two, thereby avoiding the
UAF mentioned in [1].

[1]
syzbot reported:
BUG: KASAN: slab-use-after-free in mgmt_pending_remove+0x3b/0x210 net/bluetooth/mgmt_util.c:316
Read of size 8 at addr ffff888077164818 by task syz.0.17/5989
Call Trace:
 mgmt_pending_remove+0x3b/0x210 net/bluetooth/mgmt_util.c:316
 set_link_security+0x5c2/0x710 net/bluetooth/mgmt.c:1918
 hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719
 hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839
 sock_sendmsg_nosec net/socket.c:727 [inline]
 __sock_sendmsg+0x21c/0x270 net/socket.c:742
 sock_write_iter+0x279/0x360 net/socket.c:1195

Allocated by task 5989:
 mgmt_pending_add+0x35/0x140 net/bluetooth/mgmt_util.c:296
 set_link_security+0x557/0x710 net/bluetooth/mgmt.c:1910
 hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719
 hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839
 sock_sendmsg_nosec net/socket.c:727 [inline]
 __sock_sendmsg+0x21c/0x270 net/socket.c:742
 sock_write_iter+0x279/0x360 net/socket.c:1195

Freed by task 5991:
 mgmt_pending_free net/bluetooth/mgmt_util.c:311 [inline]
 mgmt_pending_foreach+0x30d/0x380 net/bluetooth/mgmt_util.c:257
 mgmt_index_removed+0x112/0x2f0 net/bluetooth/mgmt.c:9477
 hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68305/">CVE-2025-68305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68305">CVE-2025-68305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255169">SUSE bug 1255169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68306</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68306" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68306" ref_url="https://www.suse.com/security/cve/CVE-2025-68306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btusb: mediatek: Fix kernel crash when releasing mtk iso interface

When performing reset tests and encountering abnormal card drop issues
that lead to a kernel crash, it is necessary to perform a null check
before releasing resources to avoid attempting to release a null pointer.

&lt;4&gt;[   29.158070] Hardware name: Google Quigon sku196612/196613 board (DT)
&lt;4&gt;[   29.158076] Workqueue: hci0 hci_cmd_sync_work [bluetooth]
&lt;4&gt;[   29.158154] pstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
&lt;4&gt;[   29.158162] pc : klist_remove+0x90/0x158
&lt;4&gt;[   29.158174] lr : klist_remove+0x88/0x158
&lt;4&gt;[   29.158180] sp : ffffffc0846b3c00
&lt;4&gt;[   29.158185] pmr_save: 000000e0
&lt;4&gt;[   29.158188] x29: ffffffc0846b3c30 x28: ffffff80cd31f880 x27: ffffff80c1bdc058
&lt;4&gt;[   29.158199] x26: dead000000000100 x25: ffffffdbdc624ea3 x24: ffffff80c1bdc4c0
&lt;4&gt;[   29.158209] x23: ffffffdbdc62a3e6 x22: ffffff80c6c07000 x21: ffffffdbdc829290
&lt;4&gt;[   29.158219] x20: 0000000000000000 x19: ffffff80cd3e0648 x18: 000000031ec97781
&lt;4&gt;[   29.158229] x17: ffffff80c1bdc4a8 x16: ffffffdc10576548 x15: ffffff80c1180428
&lt;4&gt;[   29.158238] x14: 0000000000000000 x13: 000000000000e380 x12: 0000000000000018
&lt;4&gt;[   29.158248] x11: ffffff80c2a7fd10 x10: 0000000000000000 x9 : 0000000100000000
&lt;4&gt;[   29.158257] x8 : 0000000000000000 x7 : 7f7f7f7f7f7f7f7f x6 : 2d7223ff6364626d
&lt;4&gt;[   29.158266] x5 : 0000008000000000 x4 : 0000000000000020 x3 : 2e7325006465636e
&lt;4&gt;[   29.158275] x2 : ffffffdc11afeff8 x1 : 0000000000000000 x0 : ffffffdc11be4d0c
&lt;4&gt;[   29.158285] Call trace:
&lt;4&gt;[   29.158290]  klist_remove+0x90/0x158
&lt;4&gt;[   29.158298]  device_release_driver_internal+0x20c/0x268
&lt;4&gt;[   29.158308]  device_release_driver+0x1c/0x30
&lt;4&gt;[   29.158316]  usb_driver_release_interface+0x70/0x88
&lt;4&gt;[   29.158325]  btusb_mtk_release_iso_intf+0x68/0xd8 [btusb (HASH:e8b6 5)]
&lt;4&gt;[   29.158347]  btusb_mtk_reset+0x5c/0x480 [btusb (HASH:e8b6 5)]
&lt;4&gt;[   29.158361]  hci_cmd_sync_work+0x10c/0x188 [bluetooth (HASH:a4fa 6)]
&lt;4&gt;[   29.158430]  process_scheduled_works+0x258/0x4e8
&lt;4&gt;[   29.158441]  worker_thread+0x300/0x428
&lt;4&gt;[   29.158448]  kthread+0x108/0x1d0
&lt;4&gt;[   29.158455]  ret_from_fork+0x10/0x20
&lt;0&gt;[   29.158467] Code: 91343000 940139d1 f9400268 927ff914 (f9401297)
&lt;4&gt;[   29.158474] ---[ end trace 0000000000000000 ]---
&lt;0&gt;[   29.167129] Kernel panic - not syncing: Oops: Fatal exception
&lt;2&gt;[   29.167144] SMP: stopping secondary CPUs
&lt;4&gt;[   29.167158] ------------[ cut here ]------------
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68306/">CVE-2025-68306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68306">CVE-2025-68306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255145">SUSE bug 1255145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68307</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68307" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68307" ref_url="https://www.suse.com/security/cve/CVE-2025-68307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs

The driver lacks the cleanup of failed transfers of URBs. This reduces the
number of available URBs per error by 1. This leads to reduced performance
and ultimately to a complete stop of the transmission.

If the sending of a bulk URB fails do proper cleanup:
- increase netdev stats
- mark the echo_sbk as free
- free the driver's context and do accounting
- wake the send queue
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68307/">CVE-2025-68307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68307">CVE-2025-68307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255146">SUSE bug 1255146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68308</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68308" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68308" ref_url="https://www.suse.com/security/cve/CVE-2025-68308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: kvaser_usb: leaf: Fix potential infinite loop in command parsers

The `kvaser_usb_leaf_wait_cmd()` and `kvaser_usb_leaf_read_bulk_callback`
functions contain logic to zero-length commands. These commands are used
to align data to the USB endpoint's wMaxPacketSize boundary.

The driver attempts to skip these placeholders by aligning the buffer
position `pos` to the next packet boundary using `round_up()` function.

However, if zero-length command is found exactly on a packet boundary
(i.e., `pos` is a multiple of wMaxPacketSize, including 0), `round_up`
function will return the unchanged value of `pos`. This prevents `pos`
to be increased, causing an infinite loop in the parsing logic.

This patch fixes this in the function by using `pos + 1` instead.
This ensures that even if `pos` is on a boundary, the calculation is
based on `pos + 1`, forcing `round_up()` to always return the next
aligned boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68308/">CVE-2025-68308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68308">CVE-2025-68308 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255149">SUSE bug 1255149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68311</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68311" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68311" ref_url="https://www.suse.com/security/cve/CVE-2025-68311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: serial: ip22zilog: Use platform device for probing

After commit 84a9582fd203 ("serial: core: Start managing serial controllers
to enable runtime PM") serial drivers need to provide a device in
struct uart_port.dev otherwise an oops happens. To fix this issue
for ip22zilog driver switch driver to a platform driver and setup
the serial device in sgi-ip22 code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68311/">CVE-2025-68311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68311">CVE-2025-68311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255161">SUSE bug 1255161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68312</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68312" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68312" ref_url="https://www.suse.com/security/cve/CVE-2025-68312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usbnet: Prevents free active kevent

The root cause of this issue are:
1. When probing the usbnet device, executing usbnet_link_change(dev, 0, 0);
put the kevent work in global workqueue. However, the kevent has not yet
been scheduled when the usbnet device is unregistered. Therefore, executing
free_netdev() results in the "free active object (kevent)" error reported
here.

2. Another factor is that when calling usbnet_disconnect()-&gt;unregister_netdev(),
if the usbnet device is up, ndo_stop() is executed to cancel the kevent.
However, because the device is not up, ndo_stop() is not executed.

The solution to this problem is to cancel the kevent before executing
free_netdev().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68312/">CVE-2025-68312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68312">CVE-2025-68312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255171">SUSE bug 1255171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68313</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68313" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68313" ref_url="https://www.suse.com/security/cve/CVE-2025-68313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/CPU/AMD: Add RDSEED fix for Zen5

There's an issue with RDSEED's 16-bit and 32-bit register output
variants on Zen5 which return a random value of 0 "at a rate inconsistent
with randomness while incorrectly signaling success (CF=1)". Search the
web for AMD-SB-7055 for more detail.

Add a fix glue which checks microcode revisions.

  [ bp: Add microcode revisions checking, rewrite. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68313/">CVE-2025-68313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68313">CVE-2025-68313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255415">SUSE bug 1255415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68317</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68317" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68317" ref_url="https://www.suse.com/security/cve/CVE-2025-68317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/zctx: check chained notif contexts

Send zc only links ubuf_info for requests coming from the same context.
There are some ambiguous syz reports, so let's check the assumption on
notification completion.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68317/">CVE-2025-68317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68317">CVE-2025-68317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255354">SUSE bug 1255354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68318</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68318" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68318" ref_url="https://www.suse.com/security/cve/CVE-2025-68318" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: thead: th1520-ap: set all AXI clocks to CLK_IS_CRITICAL

The AXI crossbar of TH1520 has no proper timeout handling, which means
gating AXI clocks can easily lead to bus timeout and thus system hang.

Set all AXI clock gates to CLK_IS_CRITICAL. All these clock gates are
ungated by default on system reset.

In addition, convert all current CLK_IGNORE_UNUSED usage to
CLK_IS_CRITICAL to prevent unwanted clock gating.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68318/">CVE-2025-68318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68318">CVE-2025-68318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255355">SUSE bug 1255355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68320</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68320" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68320" ref_url="https://www.suse.com/security/cve/CVE-2025-68320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lan966x: Fix sleeping in atomic context

The following warning was seen when we try to connect using ssh to the device.

BUG: sleeping function called from invalid context at kernel/locking/mutex.c:575
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 104, name: dropbear
preempt_count: 1, expected: 0
INFO: lockdep is turned off.
CPU: 0 UID: 0 PID: 104 Comm: dropbear Tainted: G        W           6.18.0-rc2-00399-g6f1ab1b109b9-dirty #530 NONE
Tainted: [W]=WARN
Hardware name: Generic DT based system
Call trace:
 unwind_backtrace from show_stack+0x10/0x14
 show_stack from dump_stack_lvl+0x7c/0xac
 dump_stack_lvl from __might_resched+0x16c/0x2b0
 __might_resched from __mutex_lock+0x64/0xd34
 __mutex_lock from mutex_lock_nested+0x1c/0x24
 mutex_lock_nested from lan966x_stats_get+0x5c/0x558
 lan966x_stats_get from dev_get_stats+0x40/0x43c
 dev_get_stats from dev_seq_printf_stats+0x3c/0x184
 dev_seq_printf_stats from dev_seq_show+0x10/0x30
 dev_seq_show from seq_read_iter+0x350/0x4ec
 seq_read_iter from seq_read+0xfc/0x194
 seq_read from proc_reg_read+0xac/0x100
 proc_reg_read from vfs_read+0xb0/0x2b0
 vfs_read from ksys_read+0x6c/0xec
 ksys_read from ret_fast_syscall+0x0/0x1c
Exception stack(0xf0b11fa8 to 0xf0b11ff0)
1fa0:                   00000001 00001000 00000008 be9048d8 00001000 00000001
1fc0: 00000001 00001000 00000008 00000003 be905920 0000001e 00000000 00000001
1fe0: 0005404c be9048c0 00018684 b6ec2cd8

It seems that we are using a mutex in a atomic context which is wrong.
Change the mutex with a spinlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68320/">CVE-2025-68320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68320">CVE-2025-68320 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255172">SUSE bug 1255172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68322</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68322" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68322" ref_url="https://www.suse.com/security/cve/CVE-2025-68322" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

parisc: Avoid crash due to unaligned access in unwinder

Guenter Roeck reported this kernel crash on his emulated B160L machine:

Starting network: udhcpc: started, v1.36.1
 Backtrace:
  [&lt;104320d4&gt;] unwind_once+0x1c/0x5c
  [&lt;10434a00&gt;] walk_stackframe.isra.0+0x74/0xb8
  [&lt;10434a6c&gt;] arch_stack_walk+0x28/0x38
  [&lt;104e5efc&gt;] stack_trace_save+0x48/0x5c
  [&lt;105d1bdc&gt;] set_track_prepare+0x44/0x6c
  [&lt;105d9c80&gt;] ___slab_alloc+0xfc4/0x1024
  [&lt;105d9d38&gt;] __slab_alloc.isra.0+0x58/0x90
  [&lt;105dc80c&gt;] kmem_cache_alloc_noprof+0x2ac/0x4a0
  [&lt;105b8e54&gt;] __anon_vma_prepare+0x60/0x280
  [&lt;105a823c&gt;] __vmf_anon_prepare+0x68/0x94
  [&lt;105a8b34&gt;] do_wp_page+0x8cc/0xf10
  [&lt;105aad88&gt;] handle_mm_fault+0x6c0/0xf08
  [&lt;10425568&gt;] do_page_fault+0x110/0x440
  [&lt;10427938&gt;] handle_interruption+0x184/0x748
  [&lt;11178398&gt;] schedule+0x4c/0x190
  BUG: spinlock recursion on CPU#0, ifconfig/2420
  lock: terminate_lock.2+0x0/0x1c, .magic: dead4ead, .owner: ifconfig/2420, .owner_cpu: 0

While creating the stack trace, the unwinder uses the stack pointer to guess
the previous frame to read the previous stack pointer from memory.  The crash
happens, because the unwinder tries to read from unaligned memory and as such
triggers the unalignment trap handler which then leads to the spinlock
recursion and finally to a deadlock.

Fix it by checking the alignment before accessing the memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68322/">CVE-2025-68322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68322">CVE-2025-68322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255348">SUSE bug 1255348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68325</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68325" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68325" ref_url="https://www.suse.com/security/cve/CVE-2025-68325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop

In cake_drop(), qdisc_tree_reduce_backlog() is used to update the qlen
and backlog of the qdisc hierarchy. Its caller, cake_enqueue(), assumes
that the parent qdisc will enqueue the current packet. However, this
assumption breaks when cake_enqueue() returns NET_XMIT_CN: the parent
qdisc stops enqueuing current packet, leaving the tree qlen/backlog
accounting inconsistent. This mismatch can lead to a NULL dereference
(e.g., when the parent Qdisc is qfq_qdisc).

This patch computes the qlen/backlog delta in a more robust way by
observing the difference before and after the series of cake_drop()
calls, and then compensates the qdisc tree accounting if cake_enqueue()
returns NET_XMIT_CN.

To ensure correct compensation when ACK thinning is enabled, a new
variable is introduced to keep qlen unchanged.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68325/">CVE-2025-68325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68325">CVE-2025-68325 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255417">SUSE bug 1255417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68326</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68326" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68326" ref_url="https://www.suse.com/security/cve/CVE-2025-68326" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/guc: Fix stack_depot usage

Add missing stack_depot_init() call when CONFIG_DRM_XE_DEBUG_GUC is
enabled to fix the following call stack:

	[] BUG: kernel NULL pointer dereference, address: 0000000000000000
	[] Workqueue:  drm_sched_run_job_work [gpu_sched]
	[] RIP: 0010:stack_depot_save_flags+0x172/0x870
	[] Call Trace:
	[]  &lt;TASK&gt;
	[]  fast_req_track+0x58/0xb0 [xe]

(cherry picked from commit 64fdf496a6929a0a194387d2bb5efaf5da2b542f)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68326/">CVE-2025-68326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68326">CVE-2025-68326 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255479">SUSE bug 1255479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68327</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68327" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68327" ref_url="https://www.suse.com/security/cve/CVE-2025-68327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: renesas_usbhs: Fix synchronous external abort on unbind

A synchronous external abort occurs on the Renesas RZ/G3S SoC if unbind is
executed after the configuration sequence described above:

modprobe usb_f_ecm
modprobe libcomposite
modprobe configfs
cd /sys/kernel/config/usb_gadget
mkdir -p g1
cd g1
echo "0x1d6b" &gt; idVendor
echo "0x0104" &gt; idProduct
mkdir -p strings/0x409
echo "0123456789" &gt; strings/0x409/serialnumber
echo "Renesas." &gt; strings/0x409/manufacturer
echo "Ethernet Gadget" &gt; strings/0x409/product
mkdir -p functions/ecm.usb0
mkdir -p configs/c.1
mkdir -p configs/c.1/strings/0x409
echo "ECM" &gt; configs/c.1/strings/0x409/configuration

if [ ! -L configs/c.1/ecm.usb0 ]; then
        ln -s functions/ecm.usb0 configs/c.1
fi

echo 11e20000.usb &gt; UDC
echo 11e20000.usb &gt; /sys/bus/platform/drivers/renesas_usbhs/unbind

The displayed trace is as follows:

 Internal error: synchronous external abort: 0000000096000010 [#1] SMP
 CPU: 0 UID: 0 PID: 188 Comm: sh Tainted: G M 6.17.0-rc7-next-20250922-00010-g41050493b2bd #55 PREEMPT
 Tainted: [M]=MACHINE_CHECK
 Hardware name: Renesas SMARC EVK version 2 based on r9a08g045s33 (DT)
 pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : usbhs_sys_function_pullup+0x10/0x40 [renesas_usbhs]
 lr : usbhsg_update_pullup+0x3c/0x68 [renesas_usbhs]
 sp : ffff8000838b3920
 x29: ffff8000838b3920 x28: ffff00000d585780 x27: 0000000000000000
 x26: 0000000000000000 x25: 0000000000000000 x24: ffff00000c3e3810
 x23: ffff00000d5e5c80 x22: ffff00000d5e5d40 x21: 0000000000000000
 x20: 0000000000000000 x19: ffff00000d5e5c80 x18: 0000000000000020
 x17: 2e30303230316531 x16: 312d7968703a7968 x15: 3d454d414e5f4344
 x14: 000000000000002c x13: 0000000000000000 x12: 0000000000000000
 x11: ffff00000f358f38 x10: ffff00000f358db0 x9 : ffff00000b41f418
 x8 : 0101010101010101 x7 : 7f7f7f7f7f7f7f7f x6 : fefefeff6364626d
 x5 : 8080808000000000 x4 : 000000004b5ccb9d x3 : 0000000000000000
 x2 : 0000000000000000 x1 : ffff800083790000 x0 : ffff00000d5e5c80
 Call trace:
 usbhs_sys_function_pullup+0x10/0x40 [renesas_usbhs] (P)
 usbhsg_pullup+0x4c/0x7c [renesas_usbhs]
 usb_gadget_disconnect_locked+0x48/0xd4
 gadget_unbind_driver+0x44/0x114
 device_remove+0x4c/0x80
 device_release_driver_internal+0x1c8/0x224
 device_release_driver+0x18/0x24
 bus_remove_device+0xcc/0x10c
 device_del+0x14c/0x404
 usb_del_gadget+0x88/0xc0
 usb_del_gadget_udc+0x18/0x30
 usbhs_mod_gadget_remove+0x24/0x44 [renesas_usbhs]
 usbhs_mod_remove+0x20/0x30 [renesas_usbhs]
 usbhs_remove+0x98/0xdc [renesas_usbhs]
 platform_remove+0x20/0x30
 device_remove+0x4c/0x80
 device_release_driver_internal+0x1c8/0x224
 device_driver_detach+0x18/0x24
 unbind_store+0xb4/0xb8
 drv_attr_store+0x24/0x38
 sysfs_kf_write+0x7c/0x94
 kernfs_fop_write_iter+0x128/0x1b8
 vfs_write+0x2ac/0x350
 ksys_write+0x68/0xfc
 __arm64_sys_write+0x1c/0x28
 invoke_syscall+0x48/0x110
 el0_svc_common.constprop.0+0xc0/0xe0
 do_el0_svc+0x1c/0x28
 el0_svc+0x34/0xf0
 el0t_64_sync_handler+0xa0/0xe4
 el0t_64_sync+0x198/0x19c
 Code: 7100003f 1a9f07e1 531c6c22 f9400001 (79400021)
 ---[ end trace 0000000000000000 ]---
 note: sh[188] exited with irqs disabled
 note: sh[188] exited with preempt_count 1

The issue occurs because usbhs_sys_function_pullup(), which accesses the IP
registers, is executed after the USBHS clocks have been disabled. The
problem is reproducible on the Renesas RZ/G3S SoC starting with the
addition of module stop in the clock enable/disable APIs. With module stop
functionality enabled, a bus error is expected if a master accesses a
module whose clock has been stopped and module stop activated.

Disable the IP clocks at the end of remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68327/">CVE-2025-68327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68327">CVE-2025-68327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255488">SUSE bug 1255488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68328</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68328" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68328" ref_url="https://www.suse.com/security/cve/CVE-2025-68328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: stratix10-svc: fix bug in saving controller data

Fix the incorrect usage of platform_set_drvdata and dev_set_drvdata. They
both are of the same data and overrides each other. This resulted in the
rmmod of the svc driver to fail and throw a kernel panic for kthread_stop
and fifo free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68328/">CVE-2025-68328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68328">CVE-2025-68328 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255489">SUSE bug 1255489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68329</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68329" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68329" ref_url="https://www.suse.com/security/cve/CVE-2025-68329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs

When a VMA is split (e.g., by partial munmap or MAP_FIXED), the kernel
calls vm_ops-&gt;close on each portion. For trace buffer mappings, this
results in ring_buffer_unmap() being called multiple times while
ring_buffer_map() was only called once.

This causes ring_buffer_unmap() to return -ENODEV on subsequent calls
because user_mapped is already 0, triggering a WARN_ON.

Trace buffer mappings cannot support partial mappings because the ring
buffer structure requires the complete buffer including the meta page.

Fix this by adding a may_split callback that returns -EINVAL to prevent
VMA splits entirely.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68329/">CVE-2025-68329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68329">CVE-2025-68329 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255490">SUSE bug 1255490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68330</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68330" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68330" ref_url="https://www.suse.com/security/cve/CVE-2025-68330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: accel: bmc150: Fix irq assumption regression

The code in bmc150-accel-core.c unconditionally calls
bmc150_accel_set_interrupt() in the iio_buffer_setup_ops,
such as on the runtime PM resume path giving a kernel
splat like this if the device has no interrupts:

Unable to handle kernel NULL pointer dereference at virtual
  address 00000001 when read

PC is at bmc150_accel_set_interrupt+0x98/0x194
LR is at __pm_runtime_resume+0x5c/0x64
(...)
Call trace:
bmc150_accel_set_interrupt from bmc150_accel_buffer_postenable+0x40/0x108
bmc150_accel_buffer_postenable from __iio_update_buffers+0xbe0/0xcbc
__iio_update_buffers from enable_store+0x84/0xc8
enable_store from kernfs_fop_write_iter+0x154/0x1b4

This bug seems to have been in the driver since the beginning,
but it only manifests recently, I do not know why.

Store the IRQ number in the state struct, as this is a common
pattern in other drivers, then use this to determine if we have
IRQ support or not.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68330/">CVE-2025-68330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68330">CVE-2025-68330 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255493">SUSE bug 1255493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68331</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68331" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68331" ref_url="https://www.suse.com/security/cve/CVE-2025-68331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer

When a UAS device is unplugged during data transfer, there is
a probability of a system panic occurring. The root cause is
an access to an invalid memory address during URB callback handling.
Specifically, this happens when the dma_direct_unmap_sg() function
is called within the usb_hcd_unmap_urb_for_dma() interface, but the
sg-&gt;dma_address field is 0 and the sg data structure has already been
freed.

The SCSI driver sends transfer commands by invoking uas_queuecommand_lck()
in uas.c, using the uas_submit_urbs() function to submit requests to USB.
Within the uas_submit_urbs() implementation, three URBs (sense_urb,
data_urb, and cmd_urb) are sequentially submitted. Device removal may
occur at any point during uas_submit_urbs execution, which may result
in URB submission failure. However, some URBs might have been successfully
submitted before the failure, and uas_submit_urbs will return the -ENODEV
error code in this case. The current error handling directly calls
scsi_done(). In the SCSI driver, this eventually triggers scsi_complete()
to invoke scsi_end_request() for releasing the sgtable. The successfully
submitted URBs, when being unlinked to giveback, call
usb_hcd_unmap_urb_for_dma() in hcd.c, leading to exceptions during sg
unmapping operations since the sg data structure has already been freed.

This patch modifies the error condition check in the uas_submit_urbs()
function. When a UAS device is removed but one or more URBs have already
been successfully submitted to USB, it avoids immediately invoking
scsi_done() and save the cmnd to devinfo-&gt;cmnd array. If the successfully
submitted URBs is completed before devinfo-&gt;resetting being set, then
the scsi_done() function will be called within uas_try_complete() after
all pending URB operations are finalized. Otherwise, the scsi_done()
function will be called within uas_zap_pending(), which is executed after
usb_kill_anchored_urbs().

The error handling only takes effect when uas_queuecommand_lck() calls
uas_submit_urbs() and returns the error value -ENODEV . In this case,
the device is disconnected, and the flow proceeds to uas_disconnect(),
where uas_zap_pending() is invoked to call uas_try_complete().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68331/">CVE-2025-68331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68331">CVE-2025-68331 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255495">SUSE bug 1255495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68332</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68332" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68332" ref_url="https://www.suse.com/security/cve/CVE-2025-68332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: c6xdigio: Fix invalid PNP driver unregistration

The Comedi low-level driver "c6xdigio" seems to be for a parallel port
connected device.  When the Comedi core calls the driver's Comedi
"attach" handler `c6xdigio_attach()` to configure a Comedi to use this
driver, it tries to enable the parallel port PNP resources by
registering a PNP driver with `pnp_register_driver()`, but ignores the
return value.  (The `struct pnp_driver` it uses has only the `name` and
`id_table` members filled in.)  The driver's Comedi "detach" handler
`c6xdigio_detach()` unconditionally unregisters the PNP driver with
`pnp_unregister_driver()`.

It is possible for `c6xdigio_attach()` to return an error before it
calls `pnp_register_driver()` and it is possible for the call to
`pnp_register_driver()` to return an error (that is ignored).  In both
cases, the driver should not be calling `pnp_unregister_driver()` as it
does in `c6xdigio_detach()`.  (Note that `c6xdigio_detach()` will be
called by the Comedi core if `c6xdigio_attach()` returns an error, or if
the Comedi core decides to detach the Comedi device from the driver for
some other reason.)

The unconditional call to `pnp_unregister_driver()` without a previous
successful call to `pnp_register_driver()` will cause
`driver_unregister()` to issue a warning "Unexpected driver
unregister!".  This was detected by Syzbot [1].

Also, the PNP driver registration and unregistration should be done at
module init and exit time, respectively, not when attaching or detaching
Comedi devices to the driver.  (There might be more than one Comedi
device being attached to the driver, although that is unlikely.)

Change the driver to do the PNP driver registration at module init time,
and the unregistration at module exit time.  Since `c6xdigio_detach()`
now only calls `comedi_legacy_detach()`, remove the function and change
the Comedi driver "detach" handler to `comedi_legacy_detach`.

-------------------------------------------
[1] Syzbot sample crash report:
Unexpected driver unregister!
WARNING: CPU: 0 PID: 5970 at drivers/base/driver.c:273 driver_unregister drivers/base/driver.c:273 [inline]
WARNING: CPU: 0 PID: 5970 at drivers/base/driver.c:273 driver_unregister+0x90/0xb0 drivers/base/driver.c:270
Modules linked in:
CPU: 0 UID: 0 PID: 5970 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
RIP: 0010:driver_unregister drivers/base/driver.c:273 [inline]
RIP: 0010:driver_unregister+0x90/0xb0 drivers/base/driver.c:270
Code: 48 89 ef e8 c2 e6 82 fc 48 89 df e8 3a 93 ff ff 5b 5d e9 c3 6d d9 fb e8 be 6d d9 fb 90 48 c7 c7 e0 f8 1f 8c e8 51 a2 97 fb 90 &lt;0f&gt; 0b 90 90 5b 5d e9 a5 6d d9 fb e8 e0 f4 41 fc eb 94 e8 d9 f4 41
RSP: 0018:ffffc9000373f9a0 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffffffff8ff24720 RCX: ffffffff817b6ee8
RDX: ffff88807c932480 RSI: ffffffff817b6ef5 RDI: 0000000000000001
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffffffff8ff24660
R13: dffffc0000000000 R14: 0000000000000000 R15: ffff88814cca0000
FS:  000055556dab1500(0000) GS:ffff8881249d9000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055f77f285cd0 CR3: 000000007d871000 CR4: 00000000003526f0
Call Trace:
 &lt;TASK&gt;
 comedi_device_detach_locked+0x12f/0xa50 drivers/comedi/drivers.c:207
 comedi_device_detach+0x67/0xb0 drivers/comedi/drivers.c:215
 comedi_device_attach+0x43d/0x900 drivers/comedi/drivers.c:1011
 do_devconfig_ioctl+0x1b1/0x710 drivers/comedi/comedi_fops.c:872
 comedi_unlocked_ioctl+0x165d/0x2f00 drivers/comedi/comedi_fops.c:2178
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:597 [inline]
 __se_sys_ioctl fs/ioctl.c:583 [inline]
 __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:583
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_sys
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68332/">CVE-2025-68332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68332">CVE-2025-68332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255483">SUSE bug 1255483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68333</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68333" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68333" ref_url="https://www.suse.com/security/cve/CVE-2025-68333" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched_ext: Fix possible deadlock in the deferred_irq_workfn()

For PREEMPT_RT=y kernels, the deferred_irq_workfn() is executed in
the per-cpu irq_work/* task context and not disable-irq, if the rq
returned by container_of() is current CPU's rq, the following scenarios
may occur:

lock(&amp;rq-&gt;__lock);
&lt;Interrupt&gt;
  lock(&amp;rq-&gt;__lock);

This commit use IRQ_WORK_INIT_HARD() to replace init_irq_work() to
initialize rq-&gt;scx.deferred_irq_work, make the deferred_irq_workfn()
is always invoked in hard-irq context.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68333/">CVE-2025-68333 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68333">CVE-2025-68333 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255510">SUSE bug 1255510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68334</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68334" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68334" ref_url="https://www.suse.com/security/cve/CVE-2025-68334" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86/amd/pmc: Add support for Van Gogh SoC

The ROG Xbox Ally (non-X) SoC features a similar architecture to the
Steam Deck. While the Steam Deck supports S3 (s2idle causes a crash),
this support was dropped by the Xbox Ally which only S0ix suspend.

Since the handler is missing here, this causes the device to not suspend
and the AMD GPU driver to crash while trying to resume afterwards due to
a power hang.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68334/">CVE-2025-68334 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68334">CVE-2025-68334 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255511">SUSE bug 1255511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68335</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68335" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68335" ref_url="https://www.suse.com/security/cve/CVE-2025-68335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel()

Syzbot identified an issue [1] in pcl818_ai_cancel(), which stems from
the fact that in case of early device detach via pcl818_detach(),
subdevice dev-&gt;read_subdev may not have initialized its pointer to
&amp;struct comedi_async as intended. Thus, any such dereferencing of
&amp;s-&gt;async-&gt;cmd will lead to general protection fault and kernel crash.

Mitigate this problem by removing a call to pcl818_ai_cancel() from
pcl818_detach() altogether. This way, if the subdevice setups its
support for async commands, everything async-related will be
handled via subdevice's own -&gt;cancel() function in
comedi_device_detach_locked() even before pcl818_detach(). If no
support for asynchronous commands is provided, there is no need
to cancel anything either.

[1] Syzbot crash:
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]
CPU: 1 UID: 0 PID: 6050 Comm: syz.0.18 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
RIP: 0010:pcl818_ai_cancel+0x69/0x3f0 drivers/comedi/drivers/pcl818.c:762
...
Call Trace:
 &lt;TASK&gt;
 pcl818_detach+0x66/0xd0 drivers/comedi/drivers/pcl818.c:1115
 comedi_device_detach_locked+0x178/0x750 drivers/comedi/drivers.c:207
 do_devconfig_ioctl drivers/comedi/comedi_fops.c:848 [inline]
 comedi_unlocked_ioctl+0xcde/0x1020 drivers/comedi/comedi_fops.c:2178
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:597 [inline]
...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68335/">CVE-2025-68335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68335">CVE-2025-68335 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255480">SUSE bug 1255480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68337</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68337" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68337" ref_url="https://www.suse.com/security/cve/CVE-2025-68337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted

There's issue when file system corrupted:
------------[ cut here ]------------
kernel BUG at fs/jbd2/transaction.c:1289!
Oops: invalid opcode: 0000 [#1] SMP KASAN PTI
CPU: 5 UID: 0 PID: 2031 Comm: mkdir Not tainted 6.18.0-rc1-next
RIP: 0010:jbd2_journal_get_create_access+0x3b6/0x4d0
RSP: 0018:ffff888117aafa30 EFLAGS: 00010202
RAX: 0000000000000000 RBX: ffff88811a86b000 RCX: ffffffff89a63534
RDX: 1ffff110200ec602 RSI: 0000000000000004 RDI: ffff888100763010
RBP: ffff888100763000 R08: 0000000000000001 R09: ffff888100763028
R10: 0000000000000003 R11: 0000000000000000 R12: 0000000000000000
R13: ffff88812c432000 R14: ffff88812c608000 R15: ffff888120bfc000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f91d6970c99 CR3: 00000001159c4000 CR4: 00000000000006f0
Call Trace:
 &lt;TASK&gt;
 __ext4_journal_get_create_access+0x42/0x170
 ext4_getblk+0x319/0x6f0
 ext4_bread+0x11/0x100
 ext4_append+0x1e6/0x4a0
 ext4_init_new_dir+0x145/0x1d0
 ext4_mkdir+0x326/0x920
 vfs_mkdir+0x45c/0x740
 do_mkdirat+0x234/0x2f0
 __x64_sys_mkdir+0xd6/0x120
 do_syscall_64+0x5f/0xfa0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

The above issue occurs with us in errors=continue mode when accompanied by
storage failures. There have been many inconsistencies in the file system
data.
In the case of file system data inconsistency, for example, if the block
bitmap of a referenced block is not set, it can lead to the situation where
a block being committed is allocated and used again. As a result, the
following condition will not be satisfied then trigger BUG_ON. Of course,
it is entirely possible to construct a problematic image that can trigger
this BUG_ON through specific operations. In fact, I have constructed such
an image and easily reproduced this issue.
Therefore, J_ASSERT() holds true only under ideal conditions, but it may
not necessarily be satisfied in exceptional scenarios. Using J_ASSERT()
directly in abnormal situations would cause the system to crash, which is
clearly not what we want. So here we directly trigger a JBD abort instead
of immediately invoking BUG_ON.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68337/">CVE-2025-68337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68337">CVE-2025-68337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255482">SUSE bug 1255482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68338</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68338" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68338" ref_url="https://www.suse.com/security/cve/CVE-2025-68338" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: microchip: Don't free uninitialized ksz_irq

If something goes wrong at setup, ksz_irq_free() can be called on
uninitialized ksz_irq (for example when ksz_ptp_irq_setup() fails). It
leads to freeing uninitialized IRQ numbers and/or domains.

Use dsa_switch_for_each_user_port_continue_reverse() in the error path
to iterate only over the fully initialized ports.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-01"/>
	<updated date="2026-04-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68338/">CVE-2025-68338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68338">CVE-2025-68338 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255504">SUSE bug 1255504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68339</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68339" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68339" ref_url="https://www.suse.com/security/cve/CVE-2025-68339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm/fore200e: Fix possible data race in fore200e_open()

Protect access to fore200e-&gt;available_cell_rate with rate_mtx lock in the
error handling path of fore200e_open() to prevent a data race.

The field fore200e-&gt;available_cell_rate is a shared resource used to track
available bandwidth. It is concurrently accessed by fore200e_open(),
fore200e_close(), and fore200e_change_qos().

In fore200e_open(), the lock rate_mtx is correctly held when subtracting
vcc-&gt;qos.txtp.max_pcr from available_cell_rate to reserve bandwidth.
However, if the subsequent call to fore200e_activate_vcin() fails, the
function restores the reserved bandwidth by adding back to
available_cell_rate without holding the lock.

This introduces a race condition because available_cell_rate is a global
device resource shared across all VCCs. If the error path in
fore200e_open() executes concurrently with operations like
fore200e_close() or fore200e_change_qos() on other VCCs, a
read-modify-write race occurs.

Specifically, the error path reads the rate without the lock. If another
CPU acquires the lock and modifies the rate (e.g., releasing bandwidth in
fore200e_close()) between this read and the subsequent write, the error
path will overwrite the concurrent update with a stale value. This results
in incorrect bandwidth accounting.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68339/">CVE-2025-68339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68339">CVE-2025-68339 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255505">SUSE bug 1255505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68340</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68340" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68340" ref_url="https://www.suse.com/security/cve/CVE-2025-68340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

team: Move team device type change at the end of team_port_add

Attempting to add a port device that is already up will expectedly fail,
but not before modifying the team device header_ops.

In the case of the syzbot reproducer the gre0 device is
already in state UP when it attempts to add it as a
port device of team0, this fails but before that
header_ops-&gt;create of team0 is changed from eth_header to ipgre_header
in the call to team_dev_type_check_change.

Later when we end up in ipgre_header() struct ip_tunnel* points to nonsense
as the private data of the device still holds a struct team.

Example sequence of iproute2 commands to reproduce the hang/BUG():
ip link add dev team0 type team
ip link add dev gre0 type gre
ip link set dev gre0 up
ip link set dev gre0 master team0
ip link set dev team0 up
ping -I team0 1.1.1.1

Move team_dev_type_check_change down where all other checks have passed
as it changes the dev type with no way to restore it in case
one of the checks that follow it fail.

Also make sure to preserve the origial mtu assignment:
  - If port_dev is not the same type as dev, dev takes mtu from port_dev
  - If port_dev is the same type as dev, port_dev takes mtu from dev

This is done by adding a conditional before the call to dev_set_mtu
to prevent it from assigning port_dev-&gt;mtu = dev-&gt;mtu and instead
letting team_dev_type_check_change assign dev-&gt;mtu = port_dev-&gt;mtu.
The conditional is needed because the patch moves the call to
team_dev_type_check_change past dev_set_mtu.

Testing:
  - team device driver in-tree selftests
  - Add/remove various devices as slaves of team device
  - syzbot
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68340/">CVE-2025-68340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68340">CVE-2025-68340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255507">SUSE bug 1255507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68341</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68341" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68341" ref_url="https://www.suse.com/security/cve/CVE-2025-68341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

veth: reduce XDP no_direct return section to fix race

As explain in commit fa349e396e48 ("veth: Fix race with AF_XDP exposing
old or uninitialized descriptors") for veth there is a chance after
napi_complete_done() that another CPU can manage start another NAPI
instance running veth_pool(). For NAPI this is correctly handled as the
napi_schedule_prep() check will prevent multiple instances from getting
scheduled, but for the remaining code in veth_pool() this can run
concurrent with the newly started NAPI instance.

The problem/race is that xdp_clear_return_frame_no_direct() isn't
designed to be nested.

Prior to commit 401cb7dae813 ("net: Reference bpf_redirect_info via
task_struct on PREEMPT_RT.") the temporary BPF net context
bpf_redirect_info was stored per CPU, where this wasn't an issue. Since
this commit the BPF context is stored in 'current' task_struct. When
running veth in threaded-NAPI mode, then the kthread becomes the storage
area. Now a race exists between two concurrent veth_pool() function calls
one exiting NAPI and one running new NAPI, both using the same BPF net
context.

Race is when another CPU gets within the xdp_set_return_frame_no_direct()
section before exiting veth_pool() calls the clear-function
xdp_clear_return_frame_no_direct().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68341/">CVE-2025-68341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68341">CVE-2025-68341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255506">SUSE bug 1255506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68342</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68342" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68342" ref_url="https://www.suse.com/security/cve/CVE-2025-68342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing data

The URB received in gs_usb_receive_bulk_callback() contains a struct
gs_host_frame. The length of the data after the header depends on the
gs_host_frame hf::flags and the active device features (e.g. time
stamping).

Introduce a new function gs_usb_get_minimum_length() and check that we have
at least received the required amount of data before accessing it. Only
copy the data to that skb that has actually been received.

[mkl: rename gs_usb_get_minimum_length() -&gt; +gs_usb_get_minimum_rx_length()]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68342/">CVE-2025-68342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68342">CVE-2025-68342 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255508">SUSE bug 1255508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68343</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68343" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68343" ref_url="https://www.suse.com/security/cve/CVE-2025-68343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing header

The driver expects to receive a struct gs_host_frame in
gs_usb_receive_bulk_callback().

Use struct_group to describe the header of the struct gs_host_frame and
check that we have at least received the header before accessing any
members of it.

To resubmit the URB, do not dereference the pointer chain
"dev-&gt;parent-&gt;hf_size_rx" but use "parent-&gt;hf_size_rx" instead. Since
"urb-&gt;context" contains "parent", it is always defined, while "dev" is not
defined if the URB it too short.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68343/">CVE-2025-68343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68343">CVE-2025-68343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255509">SUSE bug 1255509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68344</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68344" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68344" ref_url="https://www.suse.com/security/cve/CVE-2025-68344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: wavefront: Fix integer overflow in sample size validation

The wavefront_send_sample() function has an integer overflow issue
when validating sample size. The header-&gt;size field is u32 but gets
cast to int for comparison with dev-&gt;freemem

Fix by using unsigned comparison to avoid integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68344/">CVE-2025-68344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68344">CVE-2025-68344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255816">SUSE bug 1255816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68345</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68345" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68345" ref_url="https://www.suse.com/security/cve/CVE-2025-68345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi()

The acpi_get_first_physical_node() function can return NULL, in which
case the get_device() function also returns NULL, but this value is
then dereferenced without checking,so add a check to prevent a crash.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68345/">CVE-2025-68345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68345">CVE-2025-68345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255601">SUSE bug 1255601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68346</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68346" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68346" ref_url="https://www.suse.com/security/cve/CVE-2025-68346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: dice: fix buffer overflow in detect_stream_formats()

The function detect_stream_formats() reads the stream_count value directly
from a FireWire device without validating it. This can lead to
out-of-bounds writes when a malicious device provides a stream_count value
greater than MAX_STREAMS.

Fix by applying the same validation to both TX and RX stream counts in
detect_stream_formats().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68346/">CVE-2025-68346 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68346">CVE-2025-68346 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255603">SUSE bug 1255603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68347</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68347" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68347" ref_url="https://www.suse.com/security/cve/CVE-2025-68347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events

The DSP event handling code in hwdep_read() could write more bytes to
the user buffer than requested, when a user provides a buffer smaller
than the event header size (8 bytes).

Fix by using min_t() to clamp the copy size, This ensures we never copy
more than the user requested.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-30"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68347/">CVE-2025-68347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68347">CVE-2025-68347 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255706">SUSE bug 1255706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68348</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68348" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68348" ref_url="https://www.suse.com/security/cve/CVE-2025-68348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix memory leak in __blkdev_issue_zero_pages

Move the fatal signal check before bio_alloc() to prevent a memory
leak when BLKDEV_ZERO_KILLABLE is set and a fatal signal is pending.

Previously, the bio was allocated before checking for a fatal signal.
If a signal was pending, the code would break out of the loop without
freeing or chaining the just-allocated bio, causing a memory leak.

This matches the pattern already used in __blkdev_issue_write_zeroes()
where the signal check precedes the allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68348/">CVE-2025-68348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68348">CVE-2025-68348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255694">SUSE bug 1255694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68349</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68349" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68349" ref_url="https://www.suse.com/security/cve/CVE-2025-68349" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002541.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid

Fixes a crash when layout is null during this call stack:

write_inode
    -&gt; nfs4_write_inode
        -&gt; pnfs_layoutcommit_inode

pnfs_set_layoutcommit relies on the lseg refcount to keep the layout
around. Need to clear NFS_INO_LAYOUTCOMMIT otherwise we might attempt
to reference a null layout.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68349/">CVE-2025-68349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68349">CVE-2025-68349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255544">SUSE bug 1255544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68350</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68350" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68350" ref_url="https://www.suse.com/security/cve/CVE-2025-68350" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: fix divide-by-zero in exfat_allocate_bitmap

The variable max_ra_count can be 0 in exfat_allocate_bitmap(),
which causes a divide-by-zero error in the subsequent modulo operation
(i % max_ra_count), leading to a system crash.
When max_ra_count is 0, it means that readahead is not used. This patch
load the bitmap without readahead.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68350/">CVE-2025-68350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68350">CVE-2025-68350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255625">SUSE bug 1255625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68351</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68351" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68351" ref_url="https://www.suse.com/security/cve/CVE-2025-68351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: fix refcount leak in exfat_find

Fix refcount leaks in `exfat_find` related to `exfat_get_dentry_set`.

Function `exfat_get_dentry_set` would increase the reference counter of
`es-&gt;bh` on success. Therefore, `exfat_put_dentry_set` must be called
after `exfat_get_dentry_set` to ensure refcount consistency. This patch
relocate two checks to avoid possible leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-26"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68351/">CVE-2025-68351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68351">CVE-2025-68351 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255567">SUSE bug 1255567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68352</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68352" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68352" ref_url="https://www.suse.com/security/cve/CVE-2025-68352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: ch341: fix out-of-bounds memory access in ch341_transfer_one

Discovered by Atuin - Automated Vulnerability Discovery Engine.

The 'len' variable is calculated as 'min(32, trans-&gt;len + 1)',
which includes the 1-byte command header.

When copying data from 'trans-&gt;tx_buf' to 'ch341-&gt;tx_buf + 1', using 'len'
as the length is incorrect because:

1. It causes an out-of-bounds read from 'trans-&gt;tx_buf' (which has size
   'trans-&gt;len', i.e., 'len - 1' in this context).
2. It can cause an out-of-bounds write to 'ch341-&gt;tx_buf' if 'len' is
   CH341_PACKET_LENGTH (32). Writing 32 bytes to ch341-&gt;tx_buf + 1
   overflows the buffer.

Fix this by copying 'len - 1' bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68352/">CVE-2025-68352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68352">CVE-2025-68352 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255541">SUSE bug 1255541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68353</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68353" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68353" ref_url="https://www.suse.com/security/cve/CVE-2025-68353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: vxlan: prevent NULL deref in vxlan_xmit_one

Neither sock4 nor sock6 pointers are guaranteed to be non-NULL in
vxlan_xmit_one, e.g. if the iface is brought down. This can lead to the
following NULL dereference:

  BUG: kernel NULL pointer dereference, address: 0000000000000010
  Oops: Oops: 0000 [#1] SMP NOPTI
  RIP: 0010:vxlan_xmit_one+0xbb3/0x1580
  Call Trace:
   vxlan_xmit+0x429/0x610
   dev_hard_start_xmit+0x55/0xa0
   __dev_queue_xmit+0x6d0/0x7f0
   ip_finish_output2+0x24b/0x590
   ip_output+0x63/0x110

Mentioned commits changed the code path in vxlan_xmit_one and as a side
effect the sock4/6 pointer validity checks in vxlan(6)_get_route were
lost. Fix this by adding back checks.

Since both commits being fixed were released in the same version (v6.7)
and are strongly related, bundle the fixes in a single commit.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68353/">CVE-2025-68353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68353">CVE-2025-68353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255533">SUSE bug 1255533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68354</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68354" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68354" ref_url="https://www.suse.com/security/cve/CVE-2025-68354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex

regulator_supply_alias_list was accessed without any locking in
regulator_supply_alias(), regulator_register_supply_alias(), and
regulator_unregister_supply_alias(). Concurrent registration,
unregistration and lookups can race, leading to:

1 use-after-free if an alias entry is removed while being read,
2 duplicate entries when two threads register the same alias,
3 inconsistent alias mappings observed by consumers.

Protect all traversals, insertions and deletions on
regulator_supply_alias_list with the existing regulator_list_mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68354/">CVE-2025-68354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68354">CVE-2025-68354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255553">SUSE bug 1255553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68355</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68355" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68355" ref_url="https://www.suse.com/security/cve/CVE-2025-68355" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix exclusive map memory leak

When excl_prog_hash is 0 and excl_prog_hash_size is non-zero, the map also
needs to be freed. Otherwise, the map memory will not be reclaimed, just
like the memory leak problem reported by syzbot [1].

syzbot reported:
BUG: memory leak
  backtrace (crc 7b9fb9b4):
    map_create+0x322/0x11e0 kernel/bpf/syscall.c:1512
    __sys_bpf+0x3556/0x3610 kernel/bpf/syscall.c:6131
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68355/">CVE-2025-68355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68355">CVE-2025-68355 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255599">SUSE bug 1255599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68356</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68356" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68356" ref_url="https://www.suse.com/security/cve/CVE-2025-68356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Prevent recursive memory reclaim

Function new_inode() returns a new inode with inode-&gt;i_mapping-&gt;gfp_mask
set to GFP_HIGHUSER_MOVABLE.  This value includes the __GFP_FS flag, so
allocations in that address space can recurse into filesystem memory
reclaim.  We don't want that to happen because it can consume a
significant amount of stack memory.

Worse than that is that it can also deadlock: for example, in several
places, gfs2_unstuff_dinode() is called inside filesystem transactions.
This calls filemap_grab_folio(), which can allocate a new folio, which
can trigger memory reclaim.  If memory reclaim recurses into the
filesystem and starts another transaction, a deadlock will ensue.

To fix these kinds of problems, prevent memory reclaim from recursing
into filesystem code by making sure that the gfp_mask of inode address
spaces doesn't include __GFP_FS.

The "meta" and resource group address spaces were already using GFP_NOFS
as their gfp_mask (which doesn't include __GFP_FS).  The default value
of GFP_HIGHUSER_MOVABLE is less restrictive than GFP_NOFS, though.  To
avoid being overly limiting, use the default value and only knock off
the __GFP_FS flag.  I'm not sure if this will actually make a
difference, but it also shouldn't hurt.

This patch is loosely based on commit ad22c7a043c2 ("xfs: prevent stack
overflows from page cache allocation").

Fixes xfstest generic/273.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68356/">CVE-2025-68356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68356">CVE-2025-68356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255593">SUSE bug 1255593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68357</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68357" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68357" ref_url="https://www.suse.com/security/cve/CVE-2025-68357" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iomap: allocate s_dio_done_wq for async reads as well

Since commit 222f2c7c6d14 ("iomap: always run error completions in user
context"), read error completions are deferred to s_dio_done_wq.  This
means the workqueue also needs to be allocated for async reads.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68357/">CVE-2025-68357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68357">CVE-2025-68357 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255525">SUSE bug 1255525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68359</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68359" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68359" ref_url="https://www.suse.com/security/cve/CVE-2025-68359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix double free of qgroup record after failure to add delayed ref head

In the previous code it was possible to incur into a double kfree()
scenario when calling add_delayed_ref_head(). This could happen if the
record was reported to already exist in the
btrfs_qgroup_trace_extent_nolock() call, but then there was an error
later on add_delayed_ref_head(). In this case, since
add_delayed_ref_head() returned an error, the caller went to free the
record. Since add_delayed_ref_head() couldn't set this kfree'd pointer
to NULL, then kfree() would have acted on a non-NULL 'record' object
which was pointing to memory already freed by the callee.

The problem comes from the fact that the responsibility to kfree the
object is on both the caller and the callee at the same time. Hence, the
fix for this is to shift the ownership of the 'qrecord' object out of
the add_delayed_ref_head(). That is, we will never attempt to kfree()
the given object inside of this function, and will expect the caller to
act on the 'qrecord' object on its own. The only exception where the
'qrecord' object cannot be kfree'd is if it was inserted into the
tracing logic, for which we already have the 'qrecord_inserted_ret'
boolean to account for this. Hence, the caller has to kfree the object
only if add_delayed_ref_head() reports not to have inserted it on the
tracing logic.

As a side-effect of the above, we must guarantee that
'qrecord_inserted_ret' is properly initialized at the start of the
function, not at the end, and then set when an actual insert
happens. This way we avoid 'qrecord_inserted_ret' having an invalid
value on an early exit.

The documentation from the add_delayed_ref_head() has also been updated
to reflect on the exact ownership of the 'qrecord' object.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68359/">CVE-2025-68359 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68359">CVE-2025-68359 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255542">SUSE bug 1255542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68360</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68360" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68360" ref_url="https://www.suse.com/security/cve/CVE-2025-68360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: wed: use proper wed reference in mt76 wed driver callabacks

MT7996 driver can use both wed and wed_hif2 devices to offload traffic
from/to the wireless NIC. In the current codebase we assume to always
use the primary wed device in wed callbacks resulting in the following
crash if the hw runs wed_hif2 (e.g. 6GHz link).

[  297.455876] Unable to handle kernel read from unreadable memory at virtual address 000000000000080a
[  297.464928] Mem abort info:
[  297.467722]   ESR = 0x0000000096000005
[  297.471461]   EC = 0x25: DABT (current EL), IL = 32 bits
[  297.476766]   SET = 0, FnV = 0
[  297.479809]   EA = 0, S1PTW = 0
[  297.482940]   FSC = 0x05: level 1 translation fault
[  297.487809] Data abort info:
[  297.490679]   ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000
[  297.496156]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[  297.501196]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[  297.506500] user pgtable: 4k pages, 39-bit VAs, pgdp=0000000107480000
[  297.512927] [000000000000080a] pgd=08000001097fb003, p4d=08000001097fb003, pud=08000001097fb003, pmd=0000000000000000
[  297.523532] Internal error: Oops: 0000000096000005 [#1] SMP
[  297.715393] CPU: 2 UID: 0 PID: 45 Comm: kworker/u16:2 Tainted: G           O       6.12.50 #0
[  297.723908] Tainted: [O]=OOT_MODULE
[  297.727384] Hardware name: Banana Pi BPI-R4 (2x SFP+) (DT)
[  297.732857] Workqueue: nf_ft_offload_del nf_flow_rule_route_ipv6 [nf_flow_table]
[  297.740254] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  297.747205] pc : mt76_wed_offload_disable+0x64/0xa0 [mt76]
[  297.752688] lr : mtk_wed_flow_remove+0x58/0x80
[  297.757126] sp : ffffffc080fe3ae0
[  297.760430] x29: ffffffc080fe3ae0 x28: ffffffc080fe3be0 x27: 00000000deadbef7
[  297.767557] x26: ffffff80c5ebca00 x25: 0000000000000001 x24: ffffff80c85f4c00
[  297.774683] x23: ffffff80c1875b78 x22: ffffffc080d42cd0 x21: ffffffc080660018
[  297.781809] x20: ffffff80c6a076d0 x19: ffffff80c6a043c8 x18: 0000000000000000
[  297.788935] x17: 0000000000000000 x16: 0000000000000001 x15: 0000000000000000
[  297.796060] x14: 0000000000000019 x13: ffffff80c0ad8ec0 x12: 00000000fa83b2da
[  297.803185] x11: ffffff80c02700c0 x10: ffffff80c0ad8ec0 x9 : ffffff81fef96200
[  297.810311] x8 : ffffff80c02700c0 x7 : ffffff80c02700d0 x6 : 0000000000000002
[  297.817435] x5 : 0000000000000400 x4 : 0000000000000000 x3 : 0000000000000000
[  297.824561] x2 : 0000000000000001 x1 : 0000000000000800 x0 : ffffff80c6a063c8
[  297.831686] Call trace:
[  297.834123]  mt76_wed_offload_disable+0x64/0xa0 [mt76]
[  297.839254]  mtk_wed_flow_remove+0x58/0x80
[  297.843342]  mtk_flow_offload_cmd+0x434/0x574
[  297.847689]  mtk_wed_setup_tc_block_cb+0x30/0x40
[  297.852295]  nf_flow_offload_ipv6_hook+0x7f4/0x964 [nf_flow_table]
[  297.858466]  nf_flow_rule_route_ipv6+0x438/0x4a4 [nf_flow_table]
[  297.864463]  process_one_work+0x174/0x300
[  297.868465]  worker_thread+0x278/0x430
[  297.872204]  kthread+0xd8/0xdc
[  297.875251]  ret_from_fork+0x10/0x20
[  297.878820] Code: 928b5ae0 8b000273 91400a60 f943fa61 (79401421)
[  297.884901] ---[ end trace 0000000000000000 ]---

Fix the issue detecting the proper wed reference to use running wed
callabacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68360/">CVE-2025-68360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68360">CVE-2025-68360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255536">SUSE bug 1255536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68361</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68361" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68361" ref_url="https://www.suse.com/security/cve/CVE-2025-68361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: limit the level of fs stacking for file-backed mounts

Otherwise, it could cause potential kernel stack overflow (e.g., EROFS
mounting itself).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68361/">CVE-2025-68361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68361">CVE-2025-68361 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255526">SUSE bug 1255526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68362</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68362" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68362" ref_url="https://www.suse.com/security/cve/CVE-2025-68362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb()

The rtl8187_rx_cb() calculates the rx descriptor header address
by subtracting its size from the skb tail pointer.
However, it does not validate if the received packet
(skb-&gt;len from urb-&gt;actual_length) is large enough to contain this
header.

If a truncated packet is received, this will lead to a buffer
underflow, reading memory before the start of the skb data area,
and causing a kernel panic.

Add length checks for both rtl8187 and rtl8187b descriptor headers
before attempting to access them, dropping the packet cleanly if the
check fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68362/">CVE-2025-68362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68362">CVE-2025-68362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255611">SUSE bug 1255611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68363</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68363" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68363" ref_url="https://www.suse.com/security/cve/CVE-2025-68363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Check skb-&gt;transport_header is set in bpf_skb_check_mtu

The bpf_skb_check_mtu helper needs to use skb-&gt;transport_header when
the BPF_MTU_CHK_SEGS flag is used:

	bpf_skb_check_mtu(skb, ifindex, &amp;mtu_len, 0, BPF_MTU_CHK_SEGS)

The transport_header is not always set. There is a WARN_ON_ONCE
report when CONFIG_DEBUG_NET is enabled + skb-&gt;gso_size is set +
bpf_prog_test_run is used:

WARNING: CPU: 1 PID: 2216 at ./include/linux/skbuff.h:3071
 skb_gso_validate_network_len
 bpf_skb_check_mtu
 bpf_prog_3920e25740a41171_tc_chk_segs_flag # A test in the next patch
 bpf_test_run
 bpf_prog_test_run_skb

For a normal ingress skb (not test_run), skb_reset_transport_header
is performed but there is plan to avoid setting it as described in
commit 2170a1f09148 ("net: no longer reset transport_header in __netif_receive_skb_core()").

This patch fixes the bpf helper by checking
skb_transport_header_was_set(). The check is done just before
skb-&gt;transport_header is used, to avoid breaking the existing bpf prog.
The WARN_ON_ONCE is limited to bpf_prog_test_run, so targeting bpf-next.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68363/">CVE-2025-68363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68363">CVE-2025-68363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255552">SUSE bug 1255552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68366</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68366" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68366" ref_url="https://www.suse.com/security/cve/CVE-2025-68366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nbd: defer config unlock in nbd_genl_connect

There is one use-after-free warning when running NBD_CMD_CONNECT and
NBD_CLEAR_SOCK:

nbd_genl_connect
  nbd_alloc_and_init_config // config_refs=1
  nbd_start_device // config_refs=2
  set NBD_RT_HAS_CONFIG_REF			open nbd // config_refs=3
  recv_work done // config_refs=2
						NBD_CLEAR_SOCK // config_refs=1
						close nbd // config_refs=0
  refcount_inc -&gt; uaf

------------[ cut here ]------------
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 24 PID: 1014 at lib/refcount.c:25 refcount_warn_saturate+0x12e/0x290
 nbd_genl_connect+0x16d0/0x1ab0
 genl_family_rcv_msg_doit+0x1f3/0x310
 genl_rcv_msg+0x44a/0x790

The issue can be easily reproduced by adding a small delay before
refcount_inc(&amp;nbd-&gt;config_refs) in nbd_genl_connect():

        mutex_unlock(&amp;nbd-&gt;config_lock);
        if (!ret) {
                set_bit(NBD_RT_HAS_CONFIG_REF, &amp;config-&gt;runtime_flags);
+               printk("before sleep\n");
+               mdelay(5 * 1000);
+               printk("after sleep\n");
                refcount_inc(&amp;nbd-&gt;config_refs);
                nbd_connect_reply(info, nbd-&gt;index);
        }
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68366/">CVE-2025-68366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68366">CVE-2025-68366 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255622">SUSE bug 1255622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68367</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68367" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68367" ref_url="https://www.suse.com/security/cve/CVE-2025-68367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse

The following warning appears when running syzkaller, and this issue also
exists in the mainline code.

 ------------[ cut here ]------------
 list_add double add: new=ffffffffa57eee28, prev=ffffffffa57eee28, next=ffffffffa5e63100.
 WARNING: CPU: 0 PID: 1491 at lib/list_debug.c:35 __list_add_valid_or_report+0xf7/0x130
 Modules linked in:
 CPU: 0 PID: 1491 Comm: syz.1.28 Not tainted 6.6.0+ #3
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
 RIP: 0010:__list_add_valid_or_report+0xf7/0x130
 RSP: 0018:ff1100010dfb7b78 EFLAGS: 00010282
 RAX: 0000000000000000 RBX: ffffffffa57eee18 RCX: ffffffff97fc9817
 RDX: 0000000000040000 RSI: ffa0000002383000 RDI: 0000000000000001
 RBP: ffffffffa57eee28 R08: 0000000000000001 R09: ffe21c0021bf6f2c
 R10: 0000000000000001 R11: 6464615f7473696c R12: ffffffffa5e63100
 R13: ffffffffa57eee28 R14: ffffffffa57eee28 R15: ff1100010dfb7d48
 FS:  00007fb14398b640(0000) GS:ff11000119600000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000000 CR3: 000000010d096005 CR4: 0000000000773ef0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 80000000
 Call Trace:
  &lt;TASK&gt;
  input_register_handler+0xb3/0x210
  mac_hid_start_emulation+0x1c5/0x290
  mac_hid_toggle_emumouse+0x20a/0x240
  proc_sys_call_handler+0x4c2/0x6e0
  new_sync_write+0x1b1/0x2d0
  vfs_write+0x709/0x950
  ksys_write+0x12a/0x250
  do_syscall_64+0x5a/0x110
  entry_SYSCALL_64_after_hwframe+0x78/0xe2

The WARNING occurs when two processes concurrently write to the mac-hid
emulation sysctl, causing a race condition in mac_hid_toggle_emumouse().
Both processes read old_val=0, then both try to register the input handler,
leading to a double list_add of the same handler.

  CPU0                             CPU1
  -------------------------        -------------------------
  vfs_write() //write 1            vfs_write()  //write 1
    proc_sys_write()                 proc_sys_write()
      mac_hid_toggle_emumouse()          mac_hid_toggle_emumouse()
        old_val = *valp // old_val=0
                                           old_val = *valp // old_val=0
                                           mutex_lock_killable()
                                           proc_dointvec() // *valp=1
                                           mac_hid_start_emulation()
                                             input_register_handler()
                                           mutex_unlock()
        mutex_lock_killable()
        proc_dointvec()
        mac_hid_start_emulation()
          input_register_handler() //Trigger Warning
        mutex_unlock()

Fix this by moving the old_val read inside the mutex lock region.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68367/">CVE-2025-68367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68367">CVE-2025-68367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255547">SUSE bug 1255547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68368</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68368" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68368" ref_url="https://www.suse.com/security/cve/CVE-2025-68368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: init bioset in mddev_init

IO operations may be needed before md_run(), such as updating metadata
after writing sysfs. Without bioset, this triggers a NULL pointer
dereference as below:

 BUG: kernel NULL pointer dereference, address: 0000000000000020
 Call Trace:
  md_update_sb+0x658/0xe00
  new_level_store+0xc5/0x120
  md_attr_store+0xc9/0x1e0
  sysfs_kf_write+0x6f/0xa0
  kernfs_fop_write_iter+0x141/0x2a0
  vfs_write+0x1fc/0x5a0
  ksys_write+0x79/0x180
  __x64_sys_write+0x1d/0x30
  x64_sys_call+0x2818/0x2880
  do_syscall_64+0xa9/0x580
  entry_SYSCALL_64_after_hwframe+0x4b/0x53

Reproducer
```
  mdadm -CR /dev/md0 -l1 -n2 /dev/sd[cd]
  echo inactive &gt; /sys/block/md0/md/array_state
  echo 10 &gt; /sys/block/md0/md/new_level
```

mddev_init() can only be called once per mddev, no need to test if bioset
has been initialized anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68368/">CVE-2025-68368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68368">CVE-2025-68368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255527">SUSE bug 1255527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68369</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68369" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68369" ref_url="https://www.suse.com/security/cve/CVE-2025-68369" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ntfs3: init run lock for extend inode

After setting the inode mode of $Extend to a regular file, executing the
truncate system call will enter the do_truncate() routine, causing the
run_lock uninitialized error reported by syzbot.

Prior to patch 4e8011ffec79, if the inode mode of $Extend was not set to
a regular file, the do_truncate() routine would not be entered.

Add the run_lock initialization when loading $Extend.

syzbot reported:
INFO: trying to register non-static key.
Call Trace:
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 assign_lock_key+0x133/0x150 kernel/locking/lockdep.c:984
 register_lock_class+0x105/0x320 kernel/locking/lockdep.c:1299
 __lock_acquire+0x99/0xd20 kernel/locking/lockdep.c:5112
 lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
 down_write+0x96/0x1f0 kernel/locking/rwsem.c:1590
 ntfs_set_size+0x140/0x200 fs/ntfs3/inode.c:860
 ntfs_extend+0x1d9/0x970 fs/ntfs3/file.c:387
 ntfs_setattr+0x2e8/0xbe0 fs/ntfs3/file.c:808
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68369/">CVE-2025-68369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68369">CVE-2025-68369 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255535">SUSE bug 1255535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68370</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68370" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68370" ref_url="https://www.suse.com/security/cve/CVE-2025-68370" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

coresight: tmc: add the handle of the event to the path

The handle is essential for retrieving the AUX_EVENT of each CPU and is
required in perf mode. It has been added to the coresight_path so that
dependent devices can access it from the path when needed.

The existing bug can be reproduced with:
perf record -e cs_etm//k -C 0-9 dd if=/dev/zero of=/dev/null

Showing an oops as follows:
Unable to handle kernel paging request at virtual address 000f6e84934ed19e

Call trace:
 tmc_etr_get_buffer+0x30/0x80 [coresight_tmc] (P)
 catu_enable_hw+0xbc/0x3d0 [coresight_catu]
 catu_enable+0x70/0xe0 [coresight_catu]
 coresight_enable_path+0xb0/0x258 [coresight]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68370/">CVE-2025-68370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68370">CVE-2025-68370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255534">SUSE bug 1255534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68371</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68371" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68371" ref_url="https://www.suse.com/security/cve/CVE-2025-68371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: smartpqi: Fix device resources accessed after device removal

Correct possible race conditions during device removal.

Previously, a scheduled work item to reset a LUN could still execute
after the device was removed, leading to use-after-free and other
resource access issues.

This race condition occurs because the abort handler may schedule a LUN
reset concurrently with device removal via sdev_destroy(), leading to
use-after-free and improper access to freed resources.

  - Check in the device reset handler if the device is still present in
    the controller's SCSI device list before running; if not, the reset
    is skipped.

  - Cancel any pending TMF work that has not started in sdev_destroy().

  - Ensure device freeing in sdev_destroy() is done while holding the
    LUN reset mutex to avoid races with ongoing resets.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68371/">CVE-2025-68371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68371">CVE-2025-68371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255572">SUSE bug 1255572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68372</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68372" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68372" ref_url="https://www.suse.com/security/cve/CVE-2025-68372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nbd: defer config put in recv_work

There is one uaf issue in recv_work when running NBD_CLEAR_SOCK and
NBD_CMD_RECONFIGURE:
  nbd_genl_connect     // conf_ref=2 (connect and recv_work A)
  nbd_open	       // conf_ref=3
  recv_work A done     // conf_ref=2
  NBD_CLEAR_SOCK       // conf_ref=1
  nbd_genl_reconfigure // conf_ref=2 (trigger recv_work B)
  close nbd	       // conf_ref=1
  recv_work B
    config_put         // conf_ref=0
    atomic_dec(&amp;config-&gt;recv_threads); -&gt; UAF

Or only running NBD_CLEAR_SOCK:
  nbd_genl_connect   // conf_ref=2
  nbd_open 	     // conf_ref=3
  NBD_CLEAR_SOCK     // conf_ref=2
  close nbd
    nbd_release
      config_put     // conf_ref=1
  recv_work
    config_put 	     // conf_ref=0
    atomic_dec(&amp;config-&gt;recv_threads); -&gt; UAF

Commit 87aac3a80af5 ("nbd: call nbd_config_put() before notifying the
waiter") moved nbd_config_put() to run before waking up the waiter in
recv_work, in order to ensure that nbd_start_device_ioctl() would not
be woken up while nbd-&gt;task_recv was still uncleared.

However, in nbd_start_device_ioctl(), after being woken up it explicitly
calls flush_workqueue() to make sure all current works are finished.
Therefore, there is no need to move the config put ahead of the wakeup.

Move nbd_config_put() to the end of recv_work, so that the reference is
held for the whole lifetime of the worker thread. This makes sure the
config cannot be freed while recv_work is still running, even if clear
+ reconfigure interleave.

In addition, we don't need to worry about recv_work dropping the last
nbd_put (which causes deadlock):

path A (netlink with NBD_CFLAG_DESTROY_ON_DISCONNECT):
  connect  // nbd_refs=1 (trigger recv_work)
  open nbd // nbd_refs=2
  NBD_CLEAR_SOCK
  close nbd
    nbd_release
      nbd_disconnect_and_put
        flush_workqueue // recv_work done
      nbd_config_put
        nbd_put // nbd_refs=1
      nbd_put // nbd_refs=0
        queue_work

path B (netlink without NBD_CFLAG_DESTROY_ON_DISCONNECT):
  connect  // nbd_refs=2 (trigger recv_work)
  open nbd // nbd_refs=3
  NBD_CLEAR_SOCK // conf_refs=2
  close nbd
    nbd_release
      nbd_config_put // conf_refs=1
      nbd_put // nbd_refs=2
  recv_work done // conf_refs=0, nbd_refs=1
  rmmod // nbd_refs=0

Depends-on: e2daec488c57 ("nbd: Fix hungtask when nbd_config_put")
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68372/">CVE-2025-68372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68372">CVE-2025-68372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255537">SUSE bug 1255537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68373</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68373" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68373" ref_url="https://www.suse.com/security/cve/CVE-2025-68373" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: avoid repeated calls to del_gendisk

There is a uaf problem which is found by case 23rdev-lifetime:

Oops: general protection fault, probably for non-canonical address 0xdead000000000122
RIP: 0010:bdi_unregister+0x4b/0x170
Call Trace:
 &lt;TASK&gt;
 __del_gendisk+0x356/0x3e0
 mddev_unlock+0x351/0x360
 rdev_attr_store+0x217/0x280
 kernfs_fop_write_iter+0x14a/0x210
 vfs_write+0x29e/0x550
 ksys_write+0x74/0xf0
 do_syscall_64+0xbb/0x380
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7ff5250a177e

The sequence is:
1. rdev remove path gets reconfig_mutex
2. rdev remove path release reconfig_mutex in mddev_unlock
3. md stop calls do_md_stop and sets MD_DELETED
4. rdev remove path calls del_gendisk because MD_DELETED is set
5. md stop path release reconfig_mutex and calls del_gendisk again

So there is a race condition we should resolve. This patch adds a
flag MD_DO_DELETE to avoid the race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68373/">CVE-2025-68373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68373">CVE-2025-68373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255610">SUSE bug 1255610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68374</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68374" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68374" ref_url="https://www.suse.com/security/cve/CVE-2025-68374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: fix rcu protection in md_wakeup_thread

We attempted to use RCU to protect the pointer 'thread', but directly
passed the value when calling md_wakeup_thread(). This means that the
RCU pointer has been acquired before rcu_read_lock(), which renders
rcu_read_lock() ineffective and could lead to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68374/">CVE-2025-68374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68374">CVE-2025-68374 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255530">SUSE bug 1255530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68375</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68375" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68375" ref_url="https://www.suse.com/security/cve/CVE-2025-68375" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86: Fix NULL event access and potential PEBS record loss

When intel_pmu_drain_pebs_icl() is called to drain PEBS records, the
perf_event_overflow() could be called to process the last PEBS record.

While perf_event_overflow() could trigger the interrupt throttle and
stop all events of the group, like what the below call-chain shows.

perf_event_overflow()
  -&gt; __perf_event_overflow()
    -&gt;__perf_event_account_interrupt()
      -&gt; perf_event_throttle_group()
        -&gt; perf_event_throttle()
          -&gt; event-&gt;pmu-&gt;stop()
            -&gt; x86_pmu_stop()

The side effect of stopping the events is that all corresponding event
pointers in cpuc-&gt;events[] array are cleared to NULL.

Assume there are two PEBS events (event a and event b) in a group. When
intel_pmu_drain_pebs_icl() calls perf_event_overflow() to process the
last PEBS record of PEBS event a, interrupt throttle is triggered and
all pointers of event a and event b are cleared to NULL. Then
intel_pmu_drain_pebs_icl() tries to process the last PEBS record of
event b and encounters NULL pointer access.

To avoid this issue, move cpuc-&gt;events[] clearing from x86_pmu_stop()
to x86_pmu_del(). It's safe since cpuc-&gt;active_mask or
cpuc-&gt;pebs_enabled is always checked before access the event pointer
from cpuc-&gt;events[].
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68375/">CVE-2025-68375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68375">CVE-2025-68375 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255575">SUSE bug 1255575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68376</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68376" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68376" ref_url="https://www.suse.com/security/cve/CVE-2025-68376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

coresight: ETR: Fix ETR buffer use-after-free issue

When ETR is enabled as CS_MODE_SYSFS, if the buffer size is changed
and enabled again, currently sysfs_buf will point to the newly
allocated memory(buf_new) and free the old memory(buf_old). But the
etr_buf that is being used by the ETR remains pointed to buf_old, not
updated to buf_new. In this case, it will result in a memory
use-after-free issue.

Fix this by checking ETR's mode before updating and releasing buf_old,
if the mode is CS_MODE_SYSFS, then skip updating and releasing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68376/">CVE-2025-68376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68376">CVE-2025-68376 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255529">SUSE bug 1255529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68377</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68377" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68377" ref_url="https://www.suse.com/security/cve/CVE-2025-68377" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ns: initialize ns_list_node for initial namespaces

Make sure that the list is always initialized for initial namespaces.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-26"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68377/">CVE-2025-68377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68377">CVE-2025-68377 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255592">SUSE bug 1255592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68378</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68378" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68378" ref_url="https://www.suse.com/security/cve/CVE-2025-68378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix stackmap overflow check in __bpf_get_stackid()

Syzkaller reported a KASAN slab-out-of-bounds write in __bpf_get_stackid()
when copying stack trace data. The issue occurs when the perf trace
 contains more stack entries than the stack map bucket can hold,
 leading to an out-of-bounds write in the bucket's data array.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68378/">CVE-2025-68378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68378">CVE-2025-68378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255614">SUSE bug 1255614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68379</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68379" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68379" ref_url="https://www.suse.com/security/cve/CVE-2025-68379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix null deref on srq-&gt;rq.queue after resize failure

A NULL pointer dereference can occur in rxe_srq_chk_attr() when
ibv_modify_srq() is invoked twice in succession under certain error
conditions. The first call may fail in rxe_queue_resize(), which leads
rxe_srq_from_attr() to set srq-&gt;rq.queue = NULL. The second call then
triggers a crash (null deref) when accessing
srq-&gt;rq.queue-&gt;buf-&gt;index_mask.

Call Trace:
&lt;TASK&gt;
rxe_modify_srq+0x170/0x480 [rdma_rxe]
? __pfx_rxe_modify_srq+0x10/0x10 [rdma_rxe]
? uverbs_try_lock_object+0x4f/0xa0 [ib_uverbs]
? rdma_lookup_get_uobject+0x1f0/0x380 [ib_uverbs]
ib_uverbs_modify_srq+0x204/0x290 [ib_uverbs]
? __pfx_ib_uverbs_modify_srq+0x10/0x10 [ib_uverbs]
? tryinc_node_nr_active+0xe6/0x150
? uverbs_fill_udata+0xed/0x4f0 [ib_uverbs]
ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x2c0/0x470 [ib_uverbs]
? __pfx_ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x10/0x10 [ib_uverbs]
? uverbs_fill_udata+0xed/0x4f0 [ib_uverbs]
ib_uverbs_run_method+0x55a/0x6e0 [ib_uverbs]
? __pfx_ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x10/0x10 [ib_uverbs]
ib_uverbs_cmd_verbs+0x54d/0x800 [ib_uverbs]
? __pfx_ib_uverbs_cmd_verbs+0x10/0x10 [ib_uverbs]
? __pfx___raw_spin_lock_irqsave+0x10/0x10
? __pfx_do_vfs_ioctl+0x10/0x10
? ioctl_has_perm.constprop.0.isra.0+0x2c7/0x4c0
? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10
ib_uverbs_ioctl+0x13e/0x220 [ib_uverbs]
? __pfx_ib_uverbs_ioctl+0x10/0x10 [ib_uverbs]
__x64_sys_ioctl+0x138/0x1c0
do_syscall_64+0x82/0x250
? fdget_pos+0x58/0x4c0
? ksys_write+0xf3/0x1c0
? __pfx_ksys_write+0x10/0x10
? do_syscall_64+0xc8/0x250
? __pfx_vm_mmap_pgoff+0x10/0x10
? fget+0x173/0x230
? fput+0x2a/0x80
? ksys_mmap_pgoff+0x224/0x4c0
? do_syscall_64+0xc8/0x250
? do_user_addr_fault+0x37b/0xfe0
? clear_bhb_loop+0x50/0xa0
? clear_bhb_loop+0x50/0xa0
? clear_bhb_loop+0x50/0xa0
entry_SYSCALL_64_after_hwframe+0x76/0x7e
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68379/">CVE-2025-68379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68379">CVE-2025-68379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255695">SUSE bug 1255695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68380</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68380" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68380" ref_url="https://www.suse.com/security/cve/CVE-2025-68380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix peer HE MCS assignment

In ath11k_wmi_send_peer_assoc_cmd(), peer's transmit MCS is sent to
firmware as receive MCS while peer's receive MCS sent as transmit MCS,
which goes against firmwire's definition.

While connecting to a misbehaved AP that advertises 0xffff (meaning not
supported) for 160 MHz transmit MCS map, firmware crashes due to 0xffff
is assigned to he_mcs-&gt;rx_mcs_set field.

	Ext Tag: HE Capabilities
	    [...]
	    Supported HE-MCS and NSS Set
		[...]
	        Rx and Tx MCS Maps 160 MHz
		    [...]
	            Tx HE-MCS Map 160 MHz: 0xffff

Swap the assignment to fix this issue.

As the HE rate control mask is meant to limit our own transmit MCS, it
needs to go via he_mcs-&gt;rx_mcs_set field. With the aforementioned swapping
done, change is needed as well to apply it to the peer's receive MCS.

Tested-on: WCN6855 hw2.1 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.41
Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68380/">CVE-2025-68380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68380">CVE-2025-68380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255580">SUSE bug 1255580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68468</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68468" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68468" ref_url="https://www.suse.com/security/cve/CVE-2025-68468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024497.html" source="SUSE-SU"/>
    <description>
    Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending unsolicited announcements containing CNAME resource records pointing it to resource records with short TTLs. As soon as they expire avahi-daemon crashes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68468/">CVE-2025-68468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68468">CVE-2025-68468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256499">SUSE bug 1256499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010040025" comment="avahi-0.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040032" comment="libavahi-client3-0.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040033" comment="libavahi-common3-0.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040034" comment="libavahi-core7-0.8-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68471</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68471" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68471" ref_url="https://www.suse.com/security/cve/CVE-2025-68471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024497.html" source="SUSE-SU"/>
    <description>
    Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending 2 unsolicited announcements with CNAME resource records 2 seconds apart.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68471/">CVE-2025-68471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68471">CVE-2025-68471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256500">SUSE bug 1256500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010040025" comment="avahi-0.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040032" comment="libavahi-client3-0.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040033" comment="libavahi-common3-0.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040034" comment="libavahi-core7-0.8-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68615</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68615" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68615" ref_url="https://www.suse.com/security/cve/CVE-2025-68615" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0696" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003171.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0750" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002405.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0812" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0227-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025112.html" source="SUSE-SU"/>
    <description>
    net-snmp is a SNMP application library, tools and daemon. Prior to versions 5.9.5 and 5.10.pre2, a specially crafted packet to an net-snmp snmptrapd daemon can cause a buffer overflow and the daemon to crash. This issue has been patched in versions 5.9.5 and 5.10.pre2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68615/">CVE-2025-68615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68615">CVE-2025-68615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255491">SUSE bug 1255491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050013" comment="libsnmp40-5.9.4-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050014" comment="snmp-mibs-5.9.4-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68724</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68724" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68724" ref_url="https://www.suse.com/security/cve/CVE-2025-68724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id

Use check_add_overflow() to guard against potential integer overflows
when adding the binary blob lengths and the size of an asymmetric_key_id
structure and return ERR_PTR(-EOVERFLOW) accordingly. This prevents a
possible buffer overflow when copying data from potentially malicious
X.509 certificate fields that can be arbitrarily large, such as ASN.1
INTEGER serial numbers, issuer names, etc.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68724/">CVE-2025-68724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68724">CVE-2025-68724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255550">SUSE bug 1255550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68725</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68725" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68725" ref_url="https://www.suse.com/security/cve/CVE-2025-68725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Do not let BPF test infra emit invalid GSO types to stack

Yinhao et al. reported that their fuzzer tool was able to trigger a
skb_warn_bad_offload() from netif_skb_features() -&gt; gso_features_check().
When a BPF program - triggered via BPF test infra - pushes the packet
to the loopback device via bpf_clone_redirect() then mentioned offload
warning can be seen. GSO-related features are then rightfully disabled.

We get into this situation due to convert___skb_to_skb() setting
gso_segs and gso_size but not gso_type. Technically, it makes sense
that this warning triggers since the GSO properties are malformed due
to the gso_type. Potentially, the gso_type could be marked non-trustworthy
through setting it at least to SKB_GSO_DODGY without any other specific
assumptions, but that also feels wrong given we should not go further
into the GSO engine in the first place.

The checks were added in 121d57af308d ("gso: validate gso_type in GSO
handlers") because there were malicious (syzbot) senders that combine
a protocol with a non-matching gso_type. If we would want to drop such
packets, gso_features_check() currently only returns feature flags via
netif_skb_features(), so one location for potentially dropping such skbs
could be validate_xmit_unreadable_skb(), but then otoh it would be
an additional check in the fast-path for a very corner case. Given
bpf_clone_redirect() is the only place where BPF test infra could emit
such packets, lets reject them right there.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68725/">CVE-2025-68725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68725">CVE-2025-68725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255569">SUSE bug 1255569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68726</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68726" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68726" ref_url="https://www.suse.com/security/cve/CVE-2025-68726" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: aead - Fix reqsize handling

Commit afddce13ce81d ("crypto: api - Add reqsize to crypto_alg")
introduced cra_reqsize field in crypto_alg struct to replace type
specific reqsize fields. It looks like this was introduced specifically
for ahash and acomp from the commit description as subsequent commits
add necessary changes in these alg frameworks.

However, this is being recommended for use in all crypto algs
instead of setting reqsize using crypto_*_set_reqsize(). Using
cra_reqsize in aead algorithms, hence, causes memory corruptions and
crashes as the underlying functions in the algorithm framework have not
been updated to set the reqsize properly from cra_reqsize. [1]

Add proper set_reqsize calls in the aead init function to properly
initialize reqsize for these algorithms in the framework.

[1]: https://gist.github.com/Pratham-T/24247446f1faf4b7843e4014d5089f6b
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68726/">CVE-2025-68726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68726">CVE-2025-68726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255598">SUSE bug 1255598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68729</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68729" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68729" ref_url="https://www.suse.com/security/cve/CVE-2025-68729" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Fix MSDU buffer types handling in RX error path

Currently, packets received on the REO exception ring from
unassociated peers are of MSDU buffer type, while the driver expects
link descriptor type packets. These packets are not parsed further due
to a return check on packet type in ath12k_hal_desc_reo_parse_err(),
but the associated skb is not freed. This may lead to kernel
crashes and buffer leaks.

Hence to fix, update the RX error handler to explicitly drop
MSDU buffer type packets received on the REO exception ring.
This prevents further processing of invalid packets and ensures
stability in the RX error handling path.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68729/">CVE-2025-68729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68729">CVE-2025-68729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255692">SUSE bug 1255692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68731</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68731" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68731" ref_url="https://www.suse.com/security/cve/CVE-2025-68731" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

accel/amdxdna: Fix an integer overflow in aie2_query_ctx_status_array()

The unpublished smatch static checker reported a warning.

drivers/accel/amdxdna/aie2_pci.c:904 aie2_query_ctx_status_array()
warn: potential user controlled sizeof overflow
'args-&gt;num_element * args-&gt;element_size' '1-u32max(user) * 1-u32max(user)'

Even this will not cause a real issue, it is better to put a reasonable
limitation for element_size and num_element. Add condition to make sure
the input element_size &lt;= 4K and num_element &lt;= 1K.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-30"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68731/">CVE-2025-68731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68731">CVE-2025-68731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255696">SUSE bug 1255696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68732</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68732" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68732" ref_url="https://www.suse.com/security/cve/CVE-2025-68732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpu: host1x: Fix race in syncpt alloc/free

Fix race condition between host1x_syncpt_alloc()
and host1x_syncpt_put() by using kref_put_mutex()
instead of kref_put() + manual mutex locking.

This ensures no thread can acquire the
syncpt_mutex after the refcount drops to zero
but before syncpt_release acquires it.
This prevents races where syncpoints could
be allocated while still being cleaned up
from a previous release.

Remove explicit mutex locking in syncpt_release
as kref_put_mutex() handles this atomically.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-30"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68732/">CVE-2025-68732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68732">CVE-2025-68732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255688">SUSE bug 1255688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255689">SUSE bug 1255689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68734</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68734" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68734" ref_url="https://www.suse.com/security/cve/CVE-2025-68734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe()

In hfcsusb_probe(), the memory allocated for ctrl_urb gets leaked when
setup_instance() fails with an error code. Fix that by freeing the urb
before freeing the hw structure. Also change the error paths to use the
goto ladder style.

Compile tested only. Issue found using a prototype static analysis tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-20"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68734/">CVE-2025-68734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68734">CVE-2025-68734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255538">SUSE bug 1255538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68735</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68735" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68735" ref_url="https://www.suse.com/security/cve/CVE-2025-68735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panthor: Prevent potential UAF in group creation

This commit prevents the possibility of a use after free issue in the
GROUP_CREATE ioctl function, which arose as pointer to the group is
accessed in that ioctl function after storing it in the Xarray.
A malicious userspace can second guess the handle of a group and try
to call GROUP_DESTROY ioctl from another thread around the same time
as GROUP_CREATE ioctl.

To prevent the use after free exploit, this commit uses a mark on an
entry of group pool Xarray which is added just before returning from
the GROUP_CREATE ioctl function. The mark is checked for all ioctls
that specify the group handle and so userspace won't be abe to delete
a group that isn't marked yet.

v2: Add R-bs and fixes tags
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68735/">CVE-2025-68735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68735">CVE-2025-68735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255811">SUSE bug 1255811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256251">SUSE bug 1256251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68736</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68736" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68736" ref_url="https://www.suse.com/security/cve/CVE-2025-68736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

landlock: Fix handling of disconnected directories

Disconnected files or directories can appear when they are visible and
opened from a bind mount, but have been renamed or moved from the source
of the bind mount in a way that makes them inaccessible from the mount
point (i.e. out of scope).

Previously, access rights tied to files or directories opened through a
disconnected directory were collected by walking the related hierarchy
down to the root of the filesystem, without taking into account the
mount point because it couldn't be found. This could lead to
inconsistent access results, potential access right widening, and
hard-to-debug renames, especially since such paths cannot be printed.

For a sandboxed task to create a disconnected directory, it needs to
have write access (i.e. FS_MAKE_REG, FS_REMOVE_FILE, and FS_REFER) to
the underlying source of the bind mount, and read access to the related
mount point.   Because a sandboxed task cannot acquire more access
rights than those defined by its Landlock domain, this could lead to
inconsistent access rights due to missing permissions that should be
inherited from the mount point hierarchy, while inheriting permissions
from the filesystem hierarchy hidden by this mount point instead.

Landlock now handles files and directories opened from disconnected
directories by taking into account the filesystem hierarchy when the
mount point is not found in the hierarchy walk, and also always taking
into account the mount point from which these disconnected directories
were opened.  This ensures that a rename is not allowed if it would
widen access rights [1].

The rationale is that, even if disconnected hierarchies might not be
visible or accessible to a sandboxed task, relying on the collected
access rights from them improves the guarantee that access rights will
not be widened during a rename because of the access right comparison
between the source and the destination (see LANDLOCK_ACCESS_FS_REFER).
It may look like this would grant more access on disconnected files and
directories, but the security policies are always enforced for all the
evaluated hierarchies.  This new behavior should be less surprising to
users and safer from an access control perspective.

Remove a wrong WARN_ON_ONCE() canary in collect_domain_accesses() and
fix the related comment.

Because opened files have their access rights stored in the related file
security properties, there is no impact for disconnected or unlinked
files.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68736/">CVE-2025-68736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68736">CVE-2025-68736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255698">SUSE bug 1255698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68737</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68737" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68737" ref_url="https://www.suse.com/security/cve/CVE-2025-68737" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64/pageattr: Propagate return value from __change_memory_common

The rodata=on security measure requires that any code path which does
vmalloc -&gt; set_memory_ro/set_memory_rox must protect the linear map alias
too. Therefore, if such a call fails, we must abort set_memory_* and caller
must take appropriate action; currently we are suppressing the error, and
there is a real chance of such an error arising post commit a166563e7ec3
("arm64: mm: support large block mapping when rodata=full"). Therefore,
propagate any error to the caller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-30"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68737/">CVE-2025-68737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68737">CVE-2025-68737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255699">SUSE bug 1255699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68738</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68738" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68738" ref_url="https://www.suse.com/security/cve/CVE-2025-68738" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7996: fix null pointer deref in mt7996_conf_tx()

If a link does not have an assigned channel yet, mt7996_vif_link returns
NULL. We still need to store the updated queue settings in that case, and
apply them later.
Move the location of the queue params to within struct mt7996_vif_link.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-30"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68738/">CVE-2025-68738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68738">CVE-2025-68738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255700">SUSE bug 1255700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68739</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68739" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68739" ref_url="https://www.suse.com/security/cve/CVE-2025-68739" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM / devfreq: hisi: Fix potential UAF in OPP handling

Ensure all required data is acquired before calling dev_pm_opp_put(opp)
to maintain correct resource acquisition and release order.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-30"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68739/">CVE-2025-68739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68739">CVE-2025-68739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255701">SUSE bug 1255701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68740</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68740" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68740" ref_url="https://www.suse.com/security/cve/CVE-2025-68740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ima: Handle error code returned by ima_filter_rule_match()

In ima_match_rules(), if ima_filter_rule_match() returns -ENOENT due to
the rule being NULL, the function incorrectly skips the 'if (!rc)' check
and sets 'result = true'. The LSM rule is considered a match, causing
extra files to be measured by IMA.

This issue can be reproduced in the following scenario:
After unloading the SELinux policy module via 'semodule -d', if an IMA
measurement is triggered before ima_lsm_rules is updated,
in ima_match_rules(), the first call to ima_filter_rule_match() returns
-ESTALE. This causes the code to enter the 'if (rc == -ESTALE &amp;&amp;
!rule_reinitialized)' block, perform ima_lsm_copy_rule() and retry. In
ima_lsm_copy_rule(), since the SELinux module has been removed, the rule
becomes NULL, and the second call to ima_filter_rule_match() returns
-ENOENT. This bypasses the 'if (!rc)' check and results in a false match.

Call trace:
  selinux_audit_rule_match+0x310/0x3b8
  security_audit_rule_match+0x60/0xa0
  ima_match_rules+0x2e4/0x4a0
  ima_match_policy+0x9c/0x1e8
  ima_get_action+0x48/0x60
  process_measurement+0xf8/0xa98
  ima_bprm_check+0x98/0xd8
  security_bprm_check+0x5c/0x78
  search_binary_handler+0x6c/0x318
  exec_binprm+0x58/0x1b8
  bprm_execve+0xb8/0x130
  do_execveat_common.isra.0+0x1a8/0x258
  __arm64_sys_execve+0x48/0x68
  invoke_syscall+0x50/0x128
  el0_svc_common.constprop.0+0xc8/0xf0
  do_el0_svc+0x24/0x38
  el0_svc+0x44/0x200
  el0t_64_sync_handler+0x100/0x130
  el0t_64_sync+0x3c8/0x3d0

Fix this by changing 'if (!rc)' to 'if (rc &lt;= 0)' to ensure that error
codes like -ENOENT do not bypass the check and accidentally result in a
successful match.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68740/">CVE-2025-68740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68740">CVE-2025-68740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255812">SUSE bug 1255812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68741</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68741" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68741" ref_url="https://www.suse.com/security/cve/CVE-2025-68741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix improper freeing of purex item

In qla2xxx_process_purls_iocb(), an item is allocated via
qla27xx_copy_multiple_pkt(), which internally calls
qla24xx_alloc_purex_item().

The qla24xx_alloc_purex_item() function may return a pre-allocated item
from a per-adapter pool for small allocations, instead of dynamically
allocating memory with kzalloc().

An error handling path in qla2xxx_process_purls_iocb() incorrectly uses
kfree() to release the item. If the item was from the pre-allocated
pool, calling kfree() on it is a bug that can lead to memory corruption.

Fix this by using the correct deallocation function,
qla24xx_free_purex_item(), which properly handles both dynamically
allocated and pre-allocated items.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68741/">CVE-2025-68741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68741">CVE-2025-68741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255703">SUSE bug 1255703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68742</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68742" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68742" ref_url="https://www.suse.com/security/cve/CVE-2025-68742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix invalid prog-&gt;stats access when update_effective_progs fails

Syzkaller triggers an invalid memory access issue following fault
injection in update_effective_progs. The issue can be described as
follows:

__cgroup_bpf_detach
  update_effective_progs
    compute_effective_progs
      bpf_prog_array_alloc &lt;-- fault inject
  purge_effective_progs
    /* change to dummy_bpf_prog */
    array-&gt;items[index] = &amp;dummy_bpf_prog.prog

---softirq start---
__do_softirq
  ...
    __cgroup_bpf_run_filter_skb
      __bpf_prog_run_save_cb
        bpf_prog_run
          stats = this_cpu_ptr(prog-&gt;stats)
          /* invalid memory access */
          flags = u64_stats_update_begin_irqsave(&amp;stats-&gt;syncp)
---softirq end---

  static_branch_dec(&amp;cgroup_bpf_enabled_key[atype])

The reason is that fault injection caused update_effective_progs to fail
and then changed the original prog into dummy_bpf_prog.prog in
purge_effective_progs. Then a softirq came, and accessing the members of
dummy_bpf_prog.prog in the softirq triggers invalid mem access.

To fix it, skip updating stats when stats is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68742/">CVE-2025-68742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68742">CVE-2025-68742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255707">SUSE bug 1255707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68743</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68743" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68743" ref_url="https://www.suse.com/security/cve/CVE-2025-68743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mshv: Fix create memory region overlap check

The current check is incorrect; it only checks if the beginning or end
of a region is within an existing region. This doesn't account for
userspace specifying a region that begins before and ends after an
existing region.

Change the logic to a range intersection check against gfns and uaddrs
for each region.

Remove mshv_partition_region_by_uaddr() as it is no longer used.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68743/">CVE-2025-68743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68743">CVE-2025-68743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255708">SUSE bug 1255708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68744</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68744" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68744" ref_url="https://www.suse.com/security/cve/CVE-2025-68744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Free special fields when update [lru_,]percpu_hash maps

As [lru_,]percpu_hash maps support BPF_KPTR_{REF,PERCPU}, missing
calls to 'bpf_obj_free_fields()' in 'pcpu_copy_value()' could cause the
memory referenced by BPF_KPTR_{REF,PERCPU} fields to be held until the
map gets freed.

Fix this by calling 'bpf_obj_free_fields()' after
'copy_map_value[,_long]()' in 'pcpu_copy_value()'.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68744/">CVE-2025-68744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68744">CVE-2025-68744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255709">SUSE bug 1255709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68745</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68745" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68745" ref_url="https://www.suse.com/security/cve/CVE-2025-68745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Clear cmds after chip reset

Commit aefed3e5548f ("scsi: qla2xxx: target: Fix offline port handling
and host reset handling") caused two problems:

1. Commands sent to FW, after chip reset got stuck and never freed as FW
   is not going to respond to them anymore.

2. BUG_ON(cmd-&gt;sg_mapped) in qlt_free_cmd().  Commit 26f9ce53817a
   ("scsi: qla2xxx: Fix missed DMA unmap for aborted commands")
   attempted to fix this, but introduced another bug under different
   circumstances when two different CPUs were racing to call
   qlt_unmap_sg() at the same time: BUG_ON(!valid_dma_direction(dir)) in
   dma_unmap_sg_attrs().

So revert "scsi: qla2xxx: Fix missed DMA unmap for aborted commands" and
partially revert "scsi: qla2xxx: target: Fix offline port handling and
host reset handling" at __qla2x00_abort_all_cmds.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68745/">CVE-2025-68745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68745">CVE-2025-68745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255721">SUSE bug 1255721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68746</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68746" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68746" ref_url="https://www.suse.com/security/cve/CVE-2025-68746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: tegra210-quad: Fix timeout handling

When the CPU that the QSPI interrupt handler runs on (typically CPU 0)
is excessively busy, it can lead to rare cases of the IRQ thread not
running before the transfer timeout is reached.

While handling the timeouts, any pending transfers are cleaned up and
the message that they correspond to is marked as failed, which leaves
the curr_xfer field pointing at stale memory.

To avoid this, clear curr_xfer to NULL upon timeout and check for this
condition when the IRQ thread is finally run.

While at it, also make sure to clear interrupts on failure so that new
interrupts can be run.

A better, more involved, fix would move the interrupt clearing into a
hard IRQ handler. Ideally we would also want to signal that the IRQ
thread no longer needs to be run after the timeout is hit to avoid the
extra check for a valid transfer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-30"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68746/">CVE-2025-68746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68746">CVE-2025-68746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255722">SUSE bug 1255722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68747</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68747" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68747" ref_url="https://www.suse.com/security/cve/CVE-2025-68747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panthor: Fix UAF on kernel BO VA nodes

If the MMU is down, panthor_vm_unmap_range() might return an error.
We expect the page table to be updated still, and if the MMU is blocked,
the rest of the GPU should be blocked too, so no risk of accessing
physical memory returned to the system (which the current code doesn't
cover for anyway).

Proceed with the rest of the cleanup instead of bailing out and leaving
the va_node inserted in the drm_mm, which leads to UAF when other
adjacent nodes are removed from the drm_mm tree.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-30"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68747/">CVE-2025-68747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68747">CVE-2025-68747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255723">SUSE bug 1255723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257628">SUSE bug 1257628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68748</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68748" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68748" ref_url="https://www.suse.com/security/cve/CVE-2025-68748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panthor: Fix UAF race between device unplug and FW event processing

The function panthor_fw_unplug() will free the FW memory sections.
The problem is that there could still be pending FW events which are yet
not handled at this point. process_fw_events_work() can in this case try
to access said freed memory.

Simply call disable_work_sync() to both drain and prevent future
invocation of process_fw_events_work().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68748/">CVE-2025-68748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68748">CVE-2025-68748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255813">SUSE bug 1255813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68749</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68749" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68749" ref_url="https://www.suse.com/security/cve/CVE-2025-68749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

accel/ivpu: Fix race condition when unbinding BOs

Fix 'Memory manager not clean during takedown' warning that occurs
when ivpu_gem_bo_free() removes the BO from the BOs list before it
gets unmapped. Then file_priv_unbind() triggers a warning in
drm_mm_takedown() during context teardown.

Protect the unmapping sequence with bo_list_lock to ensure the BO is
always fully unmapped when removed from the list. This ensures the BO
is either fully unmapped at context teardown time or present on the
list and unmapped by file_priv_unbind().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-31"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68749/">CVE-2025-68749 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68749">CVE-2025-68749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255724">SUSE bug 1255724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68750</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68750" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68750" ref_url="https://www.suse.com/security/cve/CVE-2025-68750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: potential integer overflow in usbg_make_tpg()

The variable tpgt in usbg_make_tpg() is defined as unsigned long and is
assigned to tpgt-&gt;tport_tpgt, which is defined as u16. This may cause an
integer overflow when tpgt is greater than USHRT_MAX (65535). I
haven't tried to trigger it myself, but it is possible to trigger it
by calling usbg_make_tpg() with a large value for tpgt.

I modified the type of tpgt to match tpgt-&gt;tport_tpgt and adjusted the
relevant code accordingly.

This patch is similar to commit 59c816c1f24d ("vhost/scsi: potential
memory corruption").
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-01"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68750/">CVE-2025-68750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68750">CVE-2025-68750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255814">SUSE bug 1255814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68751</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68751" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68751" ref_url="https://www.suse.com/security/cve/CVE-2025-68751" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/fpu: Fix false-positive kmsan report in fpu_vstl()

A false-positive kmsan report is detected when running ping command.

An inline assembly instruction 'vstl' can write varied amount of bytes
depending on value of 'index' argument. If 'index' &gt; 0, 'vstl' writes
at least 2 bytes.

clang generates kmsan write helper call depending on inline assembly
constraints. Constraints are evaluated compile-time, but value of
'index' argument is known only at runtime.

clang currently generates call to __msan_instrument_asm_store with 1 byte
as size. Manually call kmsan function to indicate correct amount of bytes
written and fix false-positive report.

This change fixes following kmsan reports:

[   36.563119] =====================================================
[   36.563594] BUG: KMSAN: uninit-value in virtqueue_add+0x35c6/0x7c70
[   36.563852]  virtqueue_add+0x35c6/0x7c70
[   36.564016]  virtqueue_add_outbuf+0xa0/0xb0
[   36.564266]  start_xmit+0x288c/0x4a20
[   36.564460]  dev_hard_start_xmit+0x302/0x900
[   36.564649]  sch_direct_xmit+0x340/0xea0
[   36.564894]  __dev_queue_xmit+0x2e94/0x59b0
[   36.565058]  neigh_resolve_output+0x936/0xb40
[   36.565278]  __neigh_update+0x2f66/0x3a60
[   36.565499]  neigh_update+0x52/0x60
[   36.565683]  arp_process+0x1588/0x2de0
[   36.565916]  NF_HOOK+0x1da/0x240
[   36.566087]  arp_rcv+0x3e4/0x6e0
[   36.566306]  __netif_receive_skb_list_core+0x1374/0x15a0
[   36.566527]  netif_receive_skb_list_internal+0x1116/0x17d0
[   36.566710]  napi_complete_done+0x376/0x740
[   36.566918]  virtnet_poll+0x1bae/0x2910
[   36.567130]  __napi_poll+0xf4/0x830
[   36.567294]  net_rx_action+0x97c/0x1ed0
[   36.567556]  handle_softirqs+0x306/0xe10
[   36.567731]  irq_exit_rcu+0x14c/0x2e0
[   36.567910]  do_io_irq+0xd4/0x120
[   36.568139]  io_int_handler+0xc2/0xe8
[   36.568299]  arch_cpu_idle+0xb0/0xc0
[   36.568540]  arch_cpu_idle+0x76/0xc0
[   36.568726]  default_idle_call+0x40/0x70
[   36.568953]  do_idle+0x1d6/0x390
[   36.569486]  cpu_startup_entry+0x9a/0xb0
[   36.569745]  rest_init+0x1ea/0x290
[   36.570029]  start_kernel+0x95e/0xb90
[   36.570348]  startup_continue+0x2e/0x40
[   36.570703]
[   36.570798] Uninit was created at:
[   36.571002]  kmem_cache_alloc_node_noprof+0x9e8/0x10e0
[   36.571261]  kmalloc_reserve+0x12a/0x470
[   36.571553]  __alloc_skb+0x310/0x860
[   36.571844]  __ip_append_data+0x483e/0x6a30
[   36.572170]  ip_append_data+0x11c/0x1e0
[   36.572477]  raw_sendmsg+0x1c8c/0x2180
[   36.572818]  inet_sendmsg+0xe6/0x190
[   36.573142]  __sys_sendto+0x55e/0x8e0
[   36.573392]  __s390x_sys_socketcall+0x19ae/0x2ba0
[   36.573571]  __do_syscall+0x12e/0x240
[   36.573823]  system_call+0x6e/0x90
[   36.573976]
[   36.574017] Byte 35 of 98 is uninitialized
[   36.574082] Memory access of size 98 starts at 0000000007aa0012
[   36.574218]
[   36.574325] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.17.0-dirty #16 NONE
[   36.574541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.574617] Hardware name: IBM 3931 A01 703 (KVM/Linux)
[   36.574755] =====================================================

[   63.532541] =====================================================
[   63.533639] BUG: KMSAN: uninit-value in virtqueue_add+0x35c6/0x7c70
[   63.533989]  virtqueue_add+0x35c6/0x7c70
[   63.534940]  virtqueue_add_outbuf+0xa0/0xb0
[   63.535861]  start_xmit+0x288c/0x4a20
[   63.536708]  dev_hard_start_xmit+0x302/0x900
[   63.537020]  sch_direct_xmit+0x340/0xea0
[   63.537997]  __dev_queue_xmit+0x2e94/0x59b0
[   63.538819]  neigh_resolve_output+0x936/0xb40
[   63.539793]  ip_finish_output2+0x1ee2/0x2200
[   63.540784]  __ip_finish_output+0x272/0x7a0
[   63.541765]  ip_finish_output+0x4e/0x5e0
[   63.542791]  ip_output+0x166/0x410
[   63.543771]  ip_push_pending_frames+0x1a2/0x470
[   63.544753]  raw_sendmsg+0x1f06/0x2180
[   63.545033]  inet_sendmsg+0xe6/0x190
[   63.546006]  __sys_sendto+0x55e/0x8e0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68751/">CVE-2025-68751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68751">CVE-2025-68751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255945">SUSE bug 1255945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68752</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68752" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68752" ref_url="https://www.suse.com/security/cve/CVE-2025-68752" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: Implement settime64 with -EOPNOTSUPP

ptp_clock_settime() assumes every ptp_clock has implemented settime64().
Stub it with -EOPNOTSUPP to prevent a NULL dereference.

The fix is similar to commit 329d050bbe63 ("gve: Implement settime64
with -EOPNOTSUPP").
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/S:U/UI:N/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68752/">CVE-2025-68752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68752">CVE-2025-68752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256237">SUSE bug 1256237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68753</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68753" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68753" ref_url="https://www.suse.com/security/cve/CVE-2025-68753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: firewire-motu: add bounds check in put_user loop for DSP events

In the DSP event handling code, a put_user() loop copies event data.
When the user buffer size is not aligned to 4 bytes, it could overwrite
beyond the buffer boundary.

Fix by adding a bounds check before put_user().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68753/">CVE-2025-68753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68753">CVE-2025-68753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256238">SUSE bug 1256238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68754</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68754" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68754" ref_url="https://www.suse.com/security/cve/CVE-2025-68754" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rtc: amlogic-a4: fix double free caused by devm

The clock obtained via devm_clk_get_enabled() is automatically managed
by devres and will be disabled and freed on driver detach. Manually
calling clk_disable_unprepare() in error path and remove function
causes double free.

Remove the redundant clk_disable_unprepare() calls from the probe
error path and aml_rtc_remove(), allowing the devm framework to
automatically manage the clock lifecycle.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68754/">CVE-2025-68754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68754">CVE-2025-68754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256240">SUSE bug 1256240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68755</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68755" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68755" ref_url="https://www.suse.com/security/cve/CVE-2025-68755" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: most: remove broken i2c driver

The MOST I2C driver has been completely broken for five years without
anyone noticing so remove the driver from staging.

Specifically, commit 723de0f9171e ("staging: most: remove device from
interface structure") started requiring drivers to set the interface
device pointer before registration, but the I2C driver was never updated
which results in a NULL pointer dereference if anyone ever tries to
probe it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68755/">CVE-2025-68755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68755">CVE-2025-68755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255940">SUSE bug 1255940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68757</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68757" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68757" ref_url="https://www.suse.com/security/cve/CVE-2025-68757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vgem-fence: Fix potential deadlock on release

A timer that expires a vgem fence automatically in 10 seconds is now
released with timer_delete_sync() from fence-&gt;ops.release() called on last
dma_fence_put().  In some scenarios, it can run in IRQ context, which is
not safe unless TIMER_IRQSAFE is used.  One potentially risky scenario was
demonstrated in Intel DRM CI trybot, BAT run on machine bat-adlp-6, while
working on new IGT subtests syncobj_timeline@stress-* as user space
replacements of some problematic test cases of a dma-fence-chain selftest
[1].

[117.004338] ================================
[117.004340] WARNING: inconsistent lock state
[117.004342] 6.17.0-rc7-CI_DRM_17270-g7644974e648c+ #1 Tainted: G S   U
[117.004346] --------------------------------
[117.004347] inconsistent {HARDIRQ-ON-W} -&gt; {IN-HARDIRQ-W} usage.
[117.004349] swapper/0/0 [HC1[1]:SC1[1]:HE0:SE0] takes:
[117.004352] ffff888138f86aa8 ((&amp;fence-&gt;timer)){?.-.}-{0:0}, at: __timer_delete_sync+0x4b/0x190
[117.004361] {HARDIRQ-ON-W} state was registered at:
[117.004363]   lock_acquire+0xc4/0x2e0
[117.004366]   call_timer_fn+0x80/0x2a0
[117.004368]   __run_timers+0x231/0x310
[117.004370]   run_timer_softirq+0x76/0xe0
[117.004372]   handle_softirqs+0xd4/0x4d0
[117.004375]   __irq_exit_rcu+0x13f/0x160
[117.004377]   irq_exit_rcu+0xe/0x20
[117.004379]   sysvec_apic_timer_interrupt+0xa0/0xc0
[117.004382]   asm_sysvec_apic_timer_interrupt+0x1b/0x20
[117.004385]   cpuidle_enter_state+0x12b/0x8a0
[117.004388]   cpuidle_enter+0x2e/0x50
[117.004393]   call_cpuidle+0x22/0x60
[117.004395]   do_idle+0x1fd/0x260
[117.004398]   cpu_startup_entry+0x29/0x30
[117.004401]   start_secondary+0x12d/0x160
[117.004404]   common_startup_64+0x13e/0x141
[117.004407] irq event stamp: 2282669
[117.004409] hardirqs last  enabled at (2282668): [&lt;ffffffff8289db71&gt;] _raw_spin_unlock_irqrestore+0x51/0x80
[117.004414] hardirqs last disabled at (2282669): [&lt;ffffffff82882021&gt;] sysvec_irq_work+0x11/0xc0
[117.004419] softirqs last  enabled at (2254702): [&lt;ffffffff8289fd00&gt;] __do_softirq+0x10/0x18
[117.004423] softirqs last disabled at (2254725): [&lt;ffffffff813d4ddf&gt;] __irq_exit_rcu+0x13f/0x160
[117.004426]
other info that might help us debug this:
[117.004429]  Possible unsafe locking scenario:
[117.004432]        CPU0
[117.004433]        ----
[117.004434]   lock((&amp;fence-&gt;timer));
[117.004436]   &lt;Interrupt&gt;
[117.004438]     lock((&amp;fence-&gt;timer));
[117.004440]
 *** DEADLOCK ***
[117.004443] 1 lock held by swapper/0/0:
[117.004445]  #0: ffffc90000003d50 ((&amp;fence-&gt;timer)){?.-.}-{0:0}, at: call_timer_fn+0x7a/0x2a0
[117.004450]
stack backtrace:
[117.004453] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G S   U              6.17.0-rc7-CI_DRM_17270-g7644974e648c+ #1 PREEMPT(voluntary)
[117.004455] Tainted: [S]=CPU_OUT_OF_SPEC, [U]=USER
[117.004455] Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 01/20/2023
[117.004456] Call Trace:
[117.004456]  &lt;IRQ&gt;
[117.004457]  dump_stack_lvl+0x91/0xf0
[117.004460]  dump_stack+0x10/0x20
[117.004461]  print_usage_bug.part.0+0x260/0x360
[117.004463]  mark_lock+0x76e/0x9c0
[117.004465]  ? register_lock_class+0x48/0x4a0
[117.004467]  __lock_acquire+0xbc3/0x2860
[117.004469]  lock_acquire+0xc4/0x2e0
[117.004470]  ? __timer_delete_sync+0x4b/0x190
[117.004472]  ? __timer_delete_sync+0x4b/0x190
[117.004473]  __timer_delete_sync+0x68/0x190
[117.004474]  ? __timer_delete_sync+0x4b/0x190
[117.004475]  timer_delete_sync+0x10/0x20
[117.004476]  vgem_fence_release+0x19/0x30 [vgem]
[117.004478]  dma_fence_release+0xc1/0x3b0
[117.004480]  ? dma_fence_release+0xa1/0x3b0
[117.004481]  dma_fence_chain_release+0xe7/0x130
[117.004483]  dma_fence_release+0xc1/0x3b0
[117.004484]  ? _raw_spin_unlock_irqrestore+0x27/0x80
[117.004485]  dma_fence_chain_irq_work+0x59/0x80
[117.004487]  irq_work_single+0x75/0xa0
[117.004490]  irq_work_r
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68757/">CVE-2025-68757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68757">CVE-2025-68757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255943">SUSE bug 1255943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68758</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68758" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68758" ref_url="https://www.suse.com/security/cve/CVE-2025-68758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

backlight: led-bl: Add devlink to supplier LEDs

LED Backlight is a consumer of one or multiple LED class devices, but
devlink is currently unable to create correct supplier-producer links when
the supplier is a class device. It creates instead a link where the
supplier is the parent of the expected device.

One consequence is that removal order is not correctly enforced.

Issues happen for example with the following sections in a device tree
overlay:

    // An LED driver chip
    pca9632@62 {
        compatible = "nxp,pca9632";
        reg = &lt;0x62&gt;;

	// ...

        addon_led_pwm: led-pwm@3 {
            reg = &lt;3&gt;;
            label = "addon:led:pwm";
        };
    };

    backlight-addon {
        compatible = "led-backlight";
        leds = &lt;&amp;addon_led_pwm&gt;;
        brightness-levels = &lt;255&gt;;
        default-brightness-level = &lt;255&gt;;
    };

In this example, the devlink should be created between the backlight-addon
(consumer) and the pca9632@62 (supplier). Instead it is created between the
backlight-addon (consumer) and the parent of the pca9632@62, which is
typically the I2C bus adapter.

On removal of the above overlay, the LED driver can be removed before the
backlight device, resulting in:

    Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010
    ...
    Call trace:
     led_put+0xe0/0x140
     devm_led_release+0x6c/0x98

Another way to reproduce the bug without any device tree overlays is
unbinding the LED class device (pca9632@62) before unbinding the consumer
(backlight-addon):

  echo 11-0062 &gt;/sys/bus/i2c/drivers/leds-pca963x/unbind
  echo ...backlight-dock &gt;/sys/bus/platform/drivers/led-backlight/unbind

Fix by adding a devlink between the consuming led-backlight device and the
supplying LED device, as other drivers and subsystems do as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68758/">CVE-2025-68758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68758">CVE-2025-68758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255944">SUSE bug 1255944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68759</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68759" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68759" ref_url="https://www.suse.com/security/cve/CVE-2025-68759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring()

In rtl8180_init_rx_ring(), memory is allocated for skb packets and DMA
allocations in a loop. When an allocation fails, the previously
successful allocations are not freed on exit.

Fix that by jumping to err_free_rings label on error, which calls
rtl8180_free_rx_ring() to free the allocations. Remove the free of
rx_ring in rtl8180_init_rx_ring() error path, and set the freed
priv-&gt;rx_buf entry to null, to avoid double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68759/">CVE-2025-68759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68759">CVE-2025-68759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255934">SUSE bug 1255934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68760</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68760" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68760" ref_url="https://www.suse.com/security/cve/CVE-2025-68760" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/amd: Fix potential out-of-bounds read in iommu_mmio_show

In iommu_mmio_write(), it validates the user-provided offset with the
check: `iommu-&gt;dbg_mmio_offset &gt; iommu-&gt;mmio_phys_end - 4`.
This assumes a 4-byte access. However, the corresponding
show handler, iommu_mmio_show(), uses readq() to perform an 8-byte
(64-bit) read.

If a user provides an offset equal to `mmio_phys_end - 4`, the check
passes, and will lead to a 4-byte out-of-bounds read.

Fix this by adjusting the boundary check to use sizeof(u64), which
corresponds to the size of the readq() operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68760/">CVE-2025-68760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68760">CVE-2025-68760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255935">SUSE bug 1255935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68761</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68761" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68761" ref_url="https://www.suse.com/security/cve/CVE-2025-68761" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hfs: fix potential use after free in hfs_correct_next_unused_CNID()

This code calls hfs_bnode_put(node) which drops the refcount and then
dreferences "node" on the next line.  It's only safe to use "node"
when we're holding a reference so flip these two lines around.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68761/">CVE-2025-68761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68761">CVE-2025-68761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255936">SUSE bug 1255936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68762</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68762" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68762" ref_url="https://www.suse.com/security/cve/CVE-2025-68762" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: netpoll: initialize work queue before error checks

Prevent a kernel warning when netconsole setup fails on devices with
IFF_DISABLE_NETPOLL flag. The warning (at kernel/workqueue.c:4242 in
__flush_work) occurs because the cleanup path tries to cancel an
uninitialized work queue.

When __netpoll_setup() encounters a device with IFF_DISABLE_NETPOLL,
it fails early and calls skb_pool_flush() for cleanup. This function
calls cancel_work_sync(&amp;np-&gt;refill_wq), but refill_wq hasn't been
initialized yet, triggering the warning.

Move INIT_WORK() to the beginning of __netpoll_setup(), ensuring the
work queue is properly initialized before any potential failure points.
This allows the cleanup path to safely cancel the work queue regardless
of where the setup fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68762/">CVE-2025-68762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68762">CVE-2025-68762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255937">SUSE bug 1255937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68763</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68763" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68763" ref_url="https://www.suse.com/security/cve/CVE-2025-68763" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: starfive - Correctly handle return of sg_nents_for_len

The return value of sg_nents_for_len was assigned to an unsigned long
in starfive_hash_digest, causing negative error codes to be converted
to large positive integers.

Add error checking for sg_nents_for_len and return immediately on
failure to prevent potential buffer overflows.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68763/">CVE-2025-68763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68763">CVE-2025-68763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255929">SUSE bug 1255929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68764</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68764" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68764" ref_url="https://www.suse.com/security/cve/CVE-2025-68764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags

When a filesystem is being automounted, it needs to preserve the
user-set superblock mount options, such as the "ro" flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68764/">CVE-2025-68764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68764">CVE-2025-68764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255930">SUSE bug 1255930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68765</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68765" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68765" ref_url="https://www.suse.com/security/cve/CVE-2025-68765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add()

In mt7615_mcu_wtbl_sta_add(), an skb sskb is allocated. If the
subsequent call to mt76_connac_mcu_alloc_wtbl_req() fails, the function
returns an error without freeing sskb, leading to a memory leak.

Fix this by calling dev_kfree_skb() on sskb in the error handling path
to ensure it is properly released.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68765/">CVE-2025-68765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68765">CVE-2025-68765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255931">SUSE bug 1255931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68766</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68766" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68766" ref_url="https://www.suse.com/security/cve/CVE-2025-68766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()

If irq_domain_translate_twocell() sets "hwirq" to &gt;= MCHP_EIC_NIRQ (2) then
it results in an out of bounds access.

The code checks for invalid values, but doesn't set the error code.  Return
-EINVAL in that case, instead of returning success.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68766/">CVE-2025-68766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68766">CVE-2025-68766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255932">SUSE bug 1255932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68767</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68767" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68767" ref_url="https://www.suse.com/security/cve/CVE-2025-68767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hfsplus: Verify inode mode when loading from disk

syzbot is reporting that S_IFMT bits of inode-&gt;i_mode can become bogus when
the S_IFMT bits of the 16bits "mode" field loaded from disk are corrupted.

According to [1], the permissions field was treated as reserved in Mac OS
8 and 9. According to [2], the reserved field was explicitly initialized
with 0, and that field must remain 0 as long as reserved. Therefore, when
the "mode" field is not 0 (i.e. no longer reserved), the file must be
S_IFDIR if dir == 1, and the file must be one of S_IFREG/S_IFLNK/S_IFCHR/
S_IFBLK/S_IFIFO/S_IFSOCK if dir == 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68767/">CVE-2025-68767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68767">CVE-2025-68767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256580">SUSE bug 1256580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68768</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68768" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68768" ref_url="https://www.suse.com/security/cve/CVE-2025-68768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

inet: frags: flush pending skbs in fqdir_pre_exit()

We have been seeing occasional deadlocks on pernet_ops_rwsem since
September in NIPA. The stuck task was usually modprobe (often loading
a driver like ipvlan), trying to take the lock as a Writer.
lockdep does not track readers for rwsems so the read wasn't obvious
from the reports.

On closer inspection the Reader holding the lock was conntrack looping
forever in nf_conntrack_cleanup_net_list(). Based on past experience
with occasional NIPA crashes I looked thru the tests which run before
the crash and noticed that the crash follows ip_defrag.sh. An immediate
red flag. Scouring thru (de)fragmentation queues reveals skbs sitting
around, holding conntrack references.

The problem is that since conntrack depends on nf_defrag_ipv6,
nf_defrag_ipv6 will load first. Since nf_defrag_ipv6 loads first its
netns exit hooks run _after_ conntrack's netns exit hook.

Flush all fragment queue SKBs during fqdir_pre_exit() to release
conntrack references before conntrack cleanup runs. Also flush
the queues in timer expiry handlers when they discover fqdir-&gt;dead
is set, in case packet sneaks in while we're running the pre_exit
flush.

The commit under Fixes is not exactly the culprit, but I think
previously the timer firing would eventually unblock the spinning
conntrack.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68768/">CVE-2025-68768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68768">CVE-2025-68768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256579">SUSE bug 1256579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68769</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68769" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68769" ref_url="https://www.suse.com/security/cve/CVE-2025-68769" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix return value of f2fs_recover_fsync_data()

With below scripts, it will trigger panic in f2fs:

mkfs.f2fs -f /dev/vdd
mount /dev/vdd /mnt/f2fs
touch /mnt/f2fs/foo
sync
echo 111 &gt;&gt; /mnt/f2fs/foo
f2fs_io fsync /mnt/f2fs/foo
f2fs_io shutdown 2 /mnt/f2fs
umount /mnt/f2fs
mount -o ro,norecovery /dev/vdd /mnt/f2fs
or
mount -o ro,disable_roll_forward /dev/vdd /mnt/f2fs

F2FS-fs (vdd): f2fs_recover_fsync_data: recovery fsync data, check_only: 0
F2FS-fs (vdd): Mounted with checkpoint version = 7f5c361f
F2FS-fs (vdd): Stopped filesystem due to reason: 0
F2FS-fs (vdd): f2fs_recover_fsync_data: recovery fsync data, check_only: 1
Filesystem f2fs get_tree() didn't set fc-&gt;root, returned 1
------------[ cut here ]------------
kernel BUG at fs/super.c:1761!
Oops: invalid opcode: 0000 [#1] SMP PTI
CPU: 3 UID: 0 PID: 722 Comm: mount Not tainted 6.18.0-rc2+ #721 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
RIP: 0010:vfs_get_tree.cold+0x18/0x1a
Call Trace:
 &lt;TASK&gt;
 fc_mount+0x13/0xa0
 path_mount+0x34e/0xc50
 __x64_sys_mount+0x121/0x150
 do_syscall_64+0x84/0x800
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7fa6cc126cfe

The root cause is we missed to handle error number returned from
f2fs_recover_fsync_data() when mounting image w/ ro,norecovery or
ro,disable_roll_forward mount option, result in returning a positive
error number to vfs_get_tree(), fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68769/">CVE-2025-68769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68769">CVE-2025-68769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256578">SUSE bug 1256578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68770</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68770" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68770" ref_url="https://www.suse.com/security/cve/CVE-2025-68770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Fix XDP_TX path

For XDP_TX action in bnxt_rx_xdp(), clearing of the event flags is not
correct.  __bnxt_poll_work() -&gt; bnxt_rx_pkt() -&gt; bnxt_rx_xdp() may be
looping within NAPI and some event flags may be set in earlier
iterations.  In particular, if BNXT_TX_EVENT is set earlier indicating
some XDP_TX packets are ready and pending, it will be cleared if it is
XDP_TX action again.  Normally, we will set BNXT_TX_EVENT again when we
successfully call __bnxt_xmit_xdp().  But if the TX ring has no more
room, the flag will not be set.  This will cause the TX producer to be
ahead but the driver will not hit the TX doorbell.

For multi-buf XDP_TX, there is no need to clear the event flags and set
BNXT_AGG_EVENT.  The BNXT_AGG_EVENT flag should have been set earlier in
bnxt_rx_pkt().

The visible symptom of this is that the RX ring associated with the
TX XDP ring will eventually become empty and all packets will be dropped.
Because this condition will cause the driver to not refill the RX ring
seeing that the TX ring has forever pending XDP_TX packets.

The fix is to only clear BNXT_RX_EVENT when we have successfully
called __bnxt_xmit_xdp().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68770/">CVE-2025-68770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68770">CVE-2025-68770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256584">SUSE bug 1256584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68771</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68771" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68771" ref_url="https://www.suse.com/security/cve/CVE-2025-68771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix kernel BUG in ocfs2_find_victim_chain

syzbot reported a kernel BUG in ocfs2_find_victim_chain() because the
`cl_next_free_rec` field of the allocation chain list (next free slot in
the chain list) is 0, triggring the BUG_ON(!cl-&gt;cl_next_free_rec)
condition in ocfs2_find_victim_chain() and panicking the kernel.

To fix this, an if condition is introduced in ocfs2_claim_suballoc_bits(),
just before calling ocfs2_find_victim_chain(), the code block in it being
executed when either of the following conditions is true:

1. `cl_next_free_rec` is equal to 0, indicating that there are no free
chains in the allocation chain list
2. `cl_next_free_rec` is greater than `cl_count` (the total number of
chains in the allocation chain list)

Either of them being true is indicative of the fact that there are no
chains left for usage.

This is addressed using ocfs2_error(), which prints
the error log for debugging purposes, rather than panicking the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68771/">CVE-2025-68771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68771">CVE-2025-68771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256582">SUSE bug 1256582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68772</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68772" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68772" ref_url="https://www.suse.com/security/cve/CVE-2025-68772" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to avoid updating compression context during writeback

Bai, Shuangpeng &lt;sjb7183@psu.edu&gt; reported a bug as below:

Oops: divide error: 0000 [#1] SMP KASAN PTI
CPU: 0 UID: 0 PID: 11441 Comm: syz.0.46 Not tainted 6.17.0 #1 PREEMPT(full)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
RIP: 0010:f2fs_all_cluster_page_ready+0x106/0x550 fs/f2fs/compress.c:857
Call Trace:
 &lt;TASK&gt;
 f2fs_write_cache_pages fs/f2fs/data.c:3078 [inline]
 __f2fs_write_data_pages fs/f2fs/data.c:3290 [inline]
 f2fs_write_data_pages+0x1c19/0x3600 fs/f2fs/data.c:3317
 do_writepages+0x38e/0x640 mm/page-writeback.c:2634
 filemap_fdatawrite_wbc mm/filemap.c:386 [inline]
 __filemap_fdatawrite_range mm/filemap.c:419 [inline]
 file_write_and_wait_range+0x2ba/0x3e0 mm/filemap.c:794
 f2fs_do_sync_file+0x6e6/0x1b00 fs/f2fs/file.c:294
 generic_write_sync include/linux/fs.h:3043 [inline]
 f2fs_file_write_iter+0x76e/0x2700 fs/f2fs/file.c:5259
 new_sync_write fs/read_write.c:593 [inline]
 vfs_write+0x7e9/0xe00 fs/read_write.c:686
 ksys_write+0x19d/0x2d0 fs/read_write.c:738
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xf7/0x470 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

The bug was triggered w/ below race condition:

fsync				setattr			ioctl
- f2fs_do_sync_file
 - file_write_and_wait_range
  - f2fs_write_cache_pages
  : inode is non-compressed
  : cc.cluster_size =
    F2FS_I(inode)-&gt;i_cluster_size = 0
   - tag_pages_for_writeback
				- f2fs_setattr
				 - truncate_setsize
				 - f2fs_truncate
							- f2fs_fileattr_set
							 - f2fs_setflags_common
							  - set_compress_context
							  : F2FS_I(inode)-&gt;i_cluster_size = 4
							  : set_inode_flag(inode, FI_COMPRESSED_FILE)
   - f2fs_compressed_file
   : return true
   - f2fs_all_cluster_page_ready
   : "pgidx % cc-&gt;cluster_size" trigger dividing 0 issue

Let's change as below to fix this issue:
- introduce a new atomic type variable .writeback in structure f2fs_inode_info
to track the number of threads which calling f2fs_write_cache_pages().
- use .i_sem lock to protect .writeback update.
- check .writeback before update compression context in f2fs_setflags_common()
to avoid race w/ -&gt;writepages.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68772/">CVE-2025-68772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68772">CVE-2025-68772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256581">SUSE bug 1256581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68773</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68773" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68773" ref_url="https://www.suse.com/security/cve/CVE-2025-68773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: fsl-cpm: Check length parity before switching to 16 bit mode

Commit fc96ec826bce ("spi: fsl-cpm: Use 16 bit mode for large transfers
with even size") failed to make sure that the size is really even
before switching to 16 bit mode. Until recently the problem went
unnoticed because kernfs uses a pre-allocated bounce buffer of size
PAGE_SIZE for reading EEPROM.

But commit 8ad6249c51d0 ("eeprom: at25: convert to spi-mem API")
introduced an additional dynamically allocated bounce buffer whose size
is exactly the size of the transfer, leading to a buffer overrun in
the fsl-cpm driver when that size is odd.

Add the missing length parity verification and remain in 8 bit mode
when the length is not even.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68773/">CVE-2025-68773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68773">CVE-2025-68773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256586">SUSE bug 1256586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68774</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68774" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68774" ref_url="https://www.suse.com/security/cve/CVE-2025-68774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hfsplus: fix missing hfs_bnode_get() in __hfs_bnode_create

When sync() and link() are called concurrently, both threads may
enter hfs_bnode_find() without finding the node in the hash table
and proceed to create it.

Thread A:
  hfsplus_write_inode()
    -&gt; hfsplus_write_system_inode()
      -&gt; hfs_btree_write()
        -&gt; hfs_bnode_find(tree, 0)
          -&gt; __hfs_bnode_create(tree, 0)

Thread B:
  hfsplus_create_cat()
    -&gt; hfs_brec_insert()
      -&gt; hfs_bnode_split()
        -&gt; hfs_bmap_alloc()
          -&gt; hfs_bnode_find(tree, 0)
            -&gt; __hfs_bnode_create(tree, 0)

In this case, thread A creates the bnode, sets refcnt=1, and hashes it.
Thread B also tries to create the same bnode, notices it has already
been inserted, drops its own instance, and uses the hashed one without
getting the node.

```

	node2 = hfs_bnode_findhash(tree, cnid);
	if (!node2) {                                 &lt;- Thread A
		hash = hfs_bnode_hash(cnid);
		node-&gt;next_hash = tree-&gt;node_hash[hash];
		tree-&gt;node_hash[hash] = node;
		tree-&gt;node_hash_cnt++;
	} else {                                      &lt;- Thread B
		spin_unlock(&amp;tree-&gt;hash_lock);
		kfree(node);
		wait_event(node2-&gt;lock_wq,
			!test_bit(HFS_BNODE_NEW, &amp;node2-&gt;flags));
		return node2;
	}
```

However, hfs_bnode_find() requires each call to take a reference.
Here both threads end up setting refcnt=1. When they later put the node,
this triggers:

BUG_ON(!atomic_read(&amp;node-&gt;refcnt))

In this scenario, Thread B in fact finds the node in the hash table
rather than creating a new one, and thus must take a reference.

Fix this by calling hfs_bnode_get() when reusing a bnode newly created by
another thread to ensure the refcount is updated correctly.

A similar bug was fixed in HFS long ago in commit
a9dc087fd3c4 ("fix missing hfs_bnode_get() in __hfs_bnode_create")
but the same issue remained in HFS+ until now.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68774/">CVE-2025-68774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68774">CVE-2025-68774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256585">SUSE bug 1256585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68775</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68775" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68775" ref_url="https://www.suse.com/security/cve/CVE-2025-68775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/handshake: duplicate handshake cancellations leak socket

When a handshake request is cancelled it is removed from the
handshake_net-&gt;hn_requests list, but it is still present in the
handshake_rhashtbl until it is destroyed.

If a second cancellation request arrives for the same handshake request,
then remove_pending() will return false... and assuming
HANDSHAKE_F_REQ_COMPLETED isn't set in req-&gt;hr_flags, we'll continue
processing through the out_true label, where we put another reference on
the sock and a refcount underflow occurs.

This can happen for example if a handshake times out - particularly if
the SUNRPC client sends the AUTH_TLS probe to the server but doesn't
follow it up with the ClientHello due to a problem with tlshd.  When the
timeout is hit on the server, the server will send a FIN, which triggers
a cancellation request via xs_reset_transport().  When the timeout is
hit on the client, another cancellation request happens via
xs_tls_handshake_sync().

Add a test_and_set_bit(HANDSHAKE_F_REQ_COMPLETED) in the pending cancel
path so duplicate cancels can be detected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68775/">CVE-2025-68775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68775">CVE-2025-68775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256665">SUSE bug 1256665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256666">SUSE bug 1256666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68776</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68776" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68776" ref_url="https://www.suse.com/security/cve/CVE-2025-68776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/hsr: fix NULL pointer dereference in prp_get_untagged_frame()

prp_get_untagged_frame() calls __pskb_copy() to create frame-&gt;skb_std
but doesn't check if the allocation failed. If __pskb_copy() returns
NULL, skb_clone() is called with a NULL pointer, causing a crash:

Oops: general protection fault, probably for non-canonical address 0xdffffc000000000f: 0000 [#1] SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000078-0x000000000000007f]
CPU: 0 UID: 0 PID: 5625 Comm: syz.1.18 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:skb_clone+0xd7/0x3a0 net/core/skbuff.c:2041
Code: 03 42 80 3c 20 00 74 08 4c 89 f7 e8 23 29 05 f9 49 83 3e 00 0f 85 a0 01 00 00 e8 94 dd 9d f8 48 8d 6b 7e 49 89 ee 49 c1 ee 03 &lt;43&gt; 0f b6 04 26 84 c0 0f 85 d1 01 00 00 44 0f b6 7d 00 41 83 e7 0c
RSP: 0018:ffffc9000d00f200 EFLAGS: 00010207
RAX: ffffffff892235a1 RBX: 0000000000000000 RCX: ffff88803372a480
RDX: 0000000000000000 RSI: 0000000000000820 RDI: 0000000000000000
RBP: 000000000000007e R08: ffffffff8f7d0f77 R09: 1ffffffff1efa1ee
R10: dffffc0000000000 R11: fffffbfff1efa1ef R12: dffffc0000000000
R13: 0000000000000820 R14: 000000000000000f R15: ffff88805144cc00
FS:  0000555557f6d500(0000) GS:ffff88808d72f000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555581d35808 CR3: 000000005040e000 CR4: 0000000000352ef0
Call Trace:
 &lt;TASK&gt;
 hsr_forward_do net/hsr/hsr_forward.c:-1 [inline]
 hsr_forward_skb+0x1013/0x2860 net/hsr/hsr_forward.c:741
 hsr_handle_frame+0x6ce/0xa70 net/hsr/hsr_slave.c:84
 __netif_receive_skb_core+0x10b9/0x4380 net/core/dev.c:5966
 __netif_receive_skb_one_core net/core/dev.c:6077 [inline]
 __netif_receive_skb+0x72/0x380 net/core/dev.c:6192
 netif_receive_skb_internal net/core/dev.c:6278 [inline]
 netif_receive_skb+0x1cb/0x790 net/core/dev.c:6337
 tun_rx_batched+0x1b9/0x730 drivers/net/tun.c:1485
 tun_get_user+0x2b65/0x3e90 drivers/net/tun.c:1953
 tun_chr_write_iter+0x113/0x200 drivers/net/tun.c:1999
 new_sync_write fs/read_write.c:593 [inline]
 vfs_write+0x5c9/0xb30 fs/read_write.c:686
 ksys_write+0x145/0x250 fs/read_write.c:738
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f0449f8e1ff
Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48
RSP: 002b:00007ffd7ad94c90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007f044a1e5fa0 RCX: 00007f0449f8e1ff
RDX: 000000000000003e RSI: 0000200000000500 RDI: 00000000000000c8
RBP: 00007ffd7ad94d20 R08: 0000000000000000 R09: 0000000000000000
R10: 000000000000003e R11: 0000000000000293 R12: 0000000000000001
R13: 00007f044a1e5fa0 R14: 00007f044a1e5fa0 R15: 0000000000000003
 &lt;/TASK&gt;

Add a NULL check immediately after __pskb_copy() to handle allocation
failures gracefully.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68776/">CVE-2025-68776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68776">CVE-2025-68776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256659">SUSE bug 1256659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68777</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68777" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68777" ref_url="https://www.suse.com/security/cve/CVE-2025-68777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: ti_am335x_tsc - fix off-by-one error in wire_order validation

The current validation 'wire_order[i] &gt; ARRAY_SIZE(config_pins)' allows
wire_order[i] to equal ARRAY_SIZE(config_pins), which causes out-of-bounds
access when used as index in 'config_pins[wire_order[i]]'.

Since config_pins has 4 elements (indices 0-3), the valid range for
wire_order should be 0-3. Fix the off-by-one error by using &gt;= instead
of &gt; in the validation check.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68777/">CVE-2025-68777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68777">CVE-2025-68777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256655">SUSE bug 1256655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68778</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68778" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68778" ref_url="https://www.suse.com/security/cve/CVE-2025-68778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: don't log conflicting inode if it's a dir moved in the current transaction

We can't log a conflicting inode if it's a directory and it was moved
from one parent directory to another parent directory in the current
transaction, as this can result an attempt to have a directory with
two hard links during log replay, one for the old parent directory and
another for the new parent directory.

The following scenario triggers that issue:

1) We have directories "dir1" and "dir2" created in a past transaction.
   Directory "dir1" has inode A as its parent directory;

2) We move "dir1" to some other directory;

3) We create a file with the name "dir1" in directory inode A;

4) We fsync the new file. This results in logging the inode of the new file
   and the inode for the directory "dir1" that was previously moved in the
   current transaction. So the log tree has the INODE_REF item for the
   new location of "dir1";

5) We move the new file to some other directory. This results in updating
   the log tree to included the new INODE_REF for the new location of the
   file and removes the INODE_REF for the old location. This happens
   during the rename when we call btrfs_log_new_name();

6) We fsync the file, and that persists the log tree changes done in the
   previous step (btrfs_log_new_name() only updates the log tree in
   memory);

7) We have a power failure;

8) Next time the fs is mounted, log replay happens and when processing
   the inode for directory "dir1" we find a new INODE_REF and add that
   link, but we don't remove the old link of the inode since we have
   not logged the old parent directory of the directory inode "dir1".

As a result after log replay finishes when we trigger writeback of the
subvolume tree's extent buffers, the tree check will detect that we have
a directory a hard link count of 2 and we get a mount failure.
The errors and stack traces reported in dmesg/syslog are like this:

   [ 3845.729764] BTRFS info (device dm-0): start tree-log replay
   [ 3845.730304] page: refcount:3 mapcount:0 mapping:000000005c8a3027 index:0x1d00 pfn:0x11510c
   [ 3845.731236] memcg:ffff9264c02f4e00
   [ 3845.731751] aops:btree_aops [btrfs] ino:1
   [ 3845.732300] flags: 0x17fffc00000400a(uptodate|private|writeback|node=0|zone=2|lastcpupid=0x1ffff)
   [ 3845.733346] raw: 017fffc00000400a 0000000000000000 dead000000000122 ffff9264d978aea8
   [ 3845.734265] raw: 0000000000001d00 ffff92650e6d4738 00000003ffffffff ffff9264c02f4e00
   [ 3845.735305] page dumped because: eb page dump
   [ 3845.735981] BTRFS critical (device dm-0): corrupt leaf: root=5 block=30408704 slot=6 ino=257, invalid nlink: has 2 expect no more than 1 for dir
   [ 3845.737786] BTRFS info (device dm-0): leaf 30408704 gen 10 total ptrs 17 free space 14881 owner 5
   [ 3845.737789] BTRFS info (device dm-0): refs 4 lock_owner 0 current 30701
   [ 3845.737792] 	item 0 key (256 INODE_ITEM 0) itemoff 16123 itemsize 160
   [ 3845.737794] 		inode generation 3 transid 9 size 16 nbytes 16384
   [ 3845.737795] 		block group 0 mode 40755 links 1 uid 0 gid 0
   [ 3845.737797] 		rdev 0 sequence 2 flags 0x0
   [ 3845.737798] 		atime 1764259517.0
   [ 3845.737800] 		ctime 1764259517.572889464
   [ 3845.737801] 		mtime 1764259517.572889464
   [ 3845.737802] 		otime 1764259517.0
   [ 3845.737803] 	item 1 key (256 INODE_REF 256) itemoff 16111 itemsize 12
   [ 3845.737805] 		index 0 name_len 2
   [ 3845.737807] 	item 2 key (256 DIR_ITEM 2363071922) itemoff 16077 itemsize 34
   [ 3845.737808] 		location key (257 1 0) type 2
   [ 3845.737810] 		transid 9 data_len 0 name_len 4
   [ 3845.737811] 	item 3 key (256 DIR_ITEM 2676584006) itemoff 16043 itemsize 34
   [ 3845.737813] 		location key (258 1 0) type 2
   [ 3845.737814] 		transid 9 data_len 0 name_len 4
   [ 3845.737815] 	item 4 key (256 DIR_INDEX 2) itemoff 16009 itemsize 34
   [ 3845.737816] 		location key (257 1 0) type 2
   [
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68778/">CVE-2025-68778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68778">CVE-2025-68778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256683">SUSE bug 1256683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68779</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68779" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68779" ref_url="https://www.suse.com/security/cve/CVE-2025-68779" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Avoid unregistering PSP twice

PSP is unregistered twice in:
_mlx5e_remove -&gt; mlx5e_psp_unregister
mlx5e_nic_cleanup -&gt; mlx5e_psp_unregister

This leads to a refcount underflow in some conditions:
------------[ cut here ]------------
refcount_t: underflow; use-after-free.
WARNING: CPU: 2 PID: 1694 at lib/refcount.c:28 refcount_warn_saturate+0xd8/0xe0
[...]
 mlx5e_psp_unregister+0x26/0x50 [mlx5_core]
 mlx5e_nic_cleanup+0x26/0x90 [mlx5_core]
 mlx5e_remove+0xe6/0x1f0 [mlx5_core]
 auxiliary_bus_remove+0x18/0x30
 device_release_driver_internal+0x194/0x1f0
 bus_remove_device+0xc6/0x130
 device_del+0x159/0x3c0
 mlx5_rescan_drivers_locked+0xbc/0x2a0 [mlx5_core]
[...]

Do not directly remove psp from the _mlx5e_remove path, the PSP cleanup
happens as part of profile cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68779/">CVE-2025-68779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68779">CVE-2025-68779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256676">SUSE bug 1256676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68781</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68781" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68781" ref_url="https://www.suse.com/security/cve/CVE-2025-68781" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: phy: fsl-usb: Fix use-after-free in delayed work during device removal

The delayed work item otg_event is initialized in fsl_otg_conf() and
scheduled under two conditions:
1. When a host controller binds to the OTG controller.
2. When the USB ID pin state changes (cable insertion/removal).

A race condition occurs when the device is removed via fsl_otg_remove():
the fsl_otg instance may be freed while the delayed work is still pending
or executing. This leads to use-after-free when the work function
fsl_otg_event() accesses the already freed memory.

The problematic scenario:

(detach thread)            | (delayed work)
fsl_otg_remove()           |
  kfree(fsl_otg_dev) //FREE| fsl_otg_event()
                           |   og = container_of(...) //USE
                           |   og-&gt; //USE

Fix this by calling disable_delayed_work_sync() in fsl_otg_remove()
before deallocating the fsl_otg structure. This ensures the delayed work
is properly canceled and completes execution prior to memory deallocation.

This bug was identified through static analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68781/">CVE-2025-68781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68781">CVE-2025-68781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256686">SUSE bug 1256686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256687">SUSE bug 1256687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68783</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68783" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68783" ref_url="https://www.suse.com/security/cve/CVE-2025-68783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-mixer: us16x08: validate meter packet indices

get_meter_levels_from_urb() parses the 64-byte meter packets sent by
the device and fills the per-channel arrays meter_level[],
comp_level[] and master_level[] in struct snd_us16x08_meter_store.

Currently the function derives the channel index directly from the
meter packet (MUB2(meter_urb, s) - 1) and uses it to index those
arrays without validating the range. If the packet contains a
negative or out-of-range channel number, the driver may write past
the end of these arrays.

Introduce a local channel variable and validate it before updating the
arrays. We reject negative indices, limit meter_level[] and
comp_level[] to SND_US16X08_MAX_CHANNELS, and guard master_level[]
updates with ARRAY_SIZE(master_level).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68783/">CVE-2025-68783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68783">CVE-2025-68783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256650">SUSE bug 1256650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68784</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68784" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68784" ref_url="https://www.suse.com/security/cve/CVE-2025-68784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: fix a UAF problem in xattr repair

The xchk_setup_xattr_buf function can allocate a new value buffer, which
means that any reference to ab-&gt;value before the call could become a
dangling pointer.  Fix this by moving an assignment to after the buffer
setup.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-68784/">CVE-2025-68784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68784">CVE-2025-68784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256793">SUSE bug 1256793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68785</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68785" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68785" ref_url="https://www.suse.com/security/cve/CVE-2025-68785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix middle attribute validation in push_nsh() action

The push_nsh() action structure looks like this:

 OVS_ACTION_ATTR_PUSH_NSH(OVS_KEY_ATTR_NSH(OVS_NSH_KEY_ATTR_BASE,...))

The outermost OVS_ACTION_ATTR_PUSH_NSH attribute is OK'ed by the
nla_for_each_nested() inside __ovs_nla_copy_actions().  The innermost
OVS_NSH_KEY_ATTR_BASE/MD1/MD2 are OK'ed by the nla_for_each_nested()
inside nsh_key_put_from_nlattr().  But nothing checks if the attribute
in the middle is OK.  We don't even check that this attribute is the
OVS_KEY_ATTR_NSH.  We just do a double unwrap with a pair of nla_data()
calls - first time directly while calling validate_push_nsh() and the
second time as part of the nla_for_each_nested() macro, which isn't
safe, potentially causing invalid memory access if the size of this
attribute is incorrect.  The failure may not be noticed during
validation due to larger netlink buffer, but cause trouble later during
action execution where the buffer is allocated exactly to the size:

 BUG: KASAN: slab-out-of-bounds in nsh_hdr_from_nlattr+0x1dd/0x6a0 [openvswitch]
 Read of size 184 at addr ffff88816459a634 by task a.out/22624

 CPU: 8 UID: 0 PID: 22624 6.18.0-rc7+ #115 PREEMPT(voluntary)
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x51/0x70
  print_address_description.constprop.0+0x2c/0x390
  kasan_report+0xdd/0x110
  kasan_check_range+0x35/0x1b0
  __asan_memcpy+0x20/0x60
  nsh_hdr_from_nlattr+0x1dd/0x6a0 [openvswitch]
  push_nsh+0x82/0x120 [openvswitch]
  do_execute_actions+0x1405/0x2840 [openvswitch]
  ovs_execute_actions+0xd5/0x3b0 [openvswitch]
  ovs_packet_cmd_execute+0x949/0xdb0 [openvswitch]
  genl_family_rcv_msg_doit+0x1d6/0x2b0
  genl_family_rcv_msg+0x336/0x580
  genl_rcv_msg+0x9f/0x130
  netlink_rcv_skb+0x11f/0x370
  genl_rcv+0x24/0x40
  netlink_unicast+0x73e/0xaa0
  netlink_sendmsg+0x744/0xbf0
  __sys_sendto+0x3d6/0x450
  do_syscall_64+0x79/0x2c0
  entry_SYSCALL_64_after_hwframe+0x76/0x7e
  &lt;/TASK&gt;

Let's add some checks that the attribute is properly sized and it's
the only one attribute inside the action.  Technically, there is no
real reason for OVS_KEY_ATTR_NSH to be there, as we know that we're
pushing an NSH header already, it just creates extra nesting, but
that's how uAPI works today.  So, keeping as it is.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68785/">CVE-2025-68785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68785">CVE-2025-68785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256640">SUSE bug 1256640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68786</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68786" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68786" ref_url="https://www.suse.com/security/cve/CVE-2025-68786" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: skip lock-range check on equal size to avoid size==0 underflow

When size equals the current i_size (including 0), the code used to call
check_lock_range(filp, i_size, size - 1, WRITE), which computes `size - 1`
and can underflow for size==0. Skip the equal case.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68786/">CVE-2025-68786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68786">CVE-2025-68786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256639">SUSE bug 1256639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68788</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68788" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68788" ref_url="https://www.suse.com/security/cve/CVE-2025-68788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fsnotify: do not generate ACCESS/MODIFY events on child for special files

inotify/fanotify do not allow users with no read access to a file to
subscribe to events (e.g. IN_ACCESS/IN_MODIFY), but they do allow the
same user to subscribe for watching events on children when the user
has access to the parent directory (e.g. /dev).

Users with no read access to a file but with read access to its parent
directory can still stat the file and see if it was accessed/modified
via atime/mtime change.

The same is not true for special files (e.g. /dev/null). Users will not
generally observe atime/mtime changes when other users read/write to
special files, only when someone sets atime/mtime via utimensat().

Align fsnotify events with this stat behavior and do not generate
ACCESS/MODIFY events to parent watchers on read/write of special files.
The events are still generated to parent watchers on utimensat(). This
closes some side-channels that could be possibly used for information
exfiltration [1].

[1] https://snee.la/pdf/pubs/file-notification-attacks.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68788/">CVE-2025-68788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68788">CVE-2025-68788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256638">SUSE bug 1256638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68789</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68789" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68789" ref_url="https://www.suse.com/security/cve/CVE-2025-68789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-68789/">CVE-2025-68789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68789">CVE-2025-68789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256781">SUSE bug 1256781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68790</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68790" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68790" ref_url="https://www.suse.com/security/cve/CVE-2025-68790" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix double unregister of HCA_PORTS component

Clear hca_devcom_comp in device's private data after unregistering it in
LAG teardown. Otherwise a slightly lagging second pass through
mlx5_unload_one() might try to unregister it again and trip over
use-after-free.

On s390 almost all PCI level recovery events trigger two passes through
mxl5_unload_one() - one through the poll_health() method and one through
mlx5_pci_err_detected() as callback from generic PCI error recovery.
While testing PCI error recovery paths with more kernel debug features
enabled, this issue reproducibly led to kernel panics with the following
call chain:

 Unable to handle kernel pointer dereference in virtual kernel address space
 Failing address: 6b6b6b6b6b6b6000 TEID: 6b6b6b6b6b6b6803 ESOP-2 FSI
 Fault in home space mode while using kernel ASCE.
 AS:00000000705c4007 R3:0000000000000024
 Oops: 0038 ilc:3 [#1]SMP

 CPU: 14 UID: 0 PID: 156 Comm: kmcheck Kdump: loaded Not tainted
      6.18.0-20251130.rc7.git0.16131a59cab1.300.fc43.s390x+debug #1 PREEMPT

 Krnl PSW : 0404e00180000000 0000020fc86aa1dc (__lock_acquire+0x5c/0x15f0)
            R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3
 Krnl GPRS: 0000000000000000 0000020f00000001 6b6b6b6b6b6b6c33 0000000000000000
            0000000000000000 0000000000000000 0000000000000001 0000000000000000
            0000000000000000 0000020fca28b820 0000000000000000 0000010a1ced8100
            0000010a1ced8100 0000020fc9775068 0000018fce14f8b8 0000018fce14f7f8
 Krnl Code: 0000020fc86aa1cc: e3b003400004        lg      %r11,832
            0000020fc86aa1d2: a7840211           brc     8,0000020fc86aa5f4
           *0000020fc86aa1d6: c09000df0b25       larl    %r9,0000020fca28b820
           &gt;0000020fc86aa1dc: d50790002000       clc     0(8,%r9),0(%r2)
            0000020fc86aa1e2: a7840209           brc     8,0000020fc86aa5f4
            0000020fc86aa1e6: c0e001100401       larl    %r14,0000020fca8aa9e8
            0000020fc86aa1ec: c01000e25a00       larl    %r1,0000020fca2f55ec
            0000020fc86aa1f2: a7eb00e8           aghi    %r14,232

 Call Trace:
  __lock_acquire+0x5c/0x15f0
  lock_acquire.part.0+0xf8/0x270
  lock_acquire+0xb0/0x1b0
  down_write+0x5a/0x250
  mlx5_detach_device+0x42/0x110 [mlx5_core]
  mlx5_unload_one_devl_locked+0x50/0xc0 [mlx5_core]
  mlx5_unload_one+0x42/0x60 [mlx5_core]
  mlx5_pci_err_detected+0x94/0x150 [mlx5_core]
  zpci_event_attempt_error_recovery+0xcc/0x388
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68790/">CVE-2025-68790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68790">CVE-2025-68790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256637">SUSE bug 1256637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68791</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68791" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68791" ref_url="https://www.suse.com/security/cve/CVE-2025-68791" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fuse: missing copy_finish in fuse-over-io-uring argument copies

Fix a possible reference count leak of payload pages during
fuse argument copies.

[Joanne: simplified error cleanup]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68791/">CVE-2025-68791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68791">CVE-2025-68791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256658">SUSE bug 1256658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68792</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68792" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68792" ref_url="https://www.suse.com/security/cve/CVE-2025-68792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm2-sessions: Fix out of range indexing in name_size

'name_size' does not have any range checks, and it just directly indexes
with TPM_ALG_ID, which could lead into memory corruption at worst.

Address the issue by only processing known values and returning -EINVAL for
unrecognized values.

Make also 'tpm_buf_append_name' and 'tpm_buf_fill_hmac_session' fallible so
that errors are detected before causing any spurious TPM traffic.

End also the authorization session on failure in both of the functions, as
the session state would be then by definition corrupted.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68792/">CVE-2025-68792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68792">CVE-2025-68792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256656">SUSE bug 1256656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68793</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68793" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68793" ref_url="https://www.suse.com/security/cve/CVE-2025-68793" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix a job-&gt;pasid access race in gpu recovery

Avoid a possible UAF in GPU recovery due to a race between
the sched timeout callback and the tdr work queue.

The gpu recovery function calls drm_sched_stop() and
later drm_sched_start().  drm_sched_start() restarts
the tdr queue which will eventually free the job.  If
the tdr queue frees the job before time out callback
completes, the job will be freed and we'll get a UAF
when accessing the pasid.  Cache it early to avoid the
UAF.

Example KASAN trace:
[  493.058141] BUG: KASAN: slab-use-after-free in amdgpu_device_gpu_recover+0x968/0x990 [amdgpu]
[  493.067530] Read of size 4 at addr ffff88b0ce3f794c by task kworker/u128:1/323
[  493.074892]
[  493.076485] CPU: 9 UID: 0 PID: 323 Comm: kworker/u128:1 Tainted: G            E       6.16.0-1289896.2.zuul.bf4f11df81c1410bbe901c4373305a31 #1 PREEMPT(voluntary)
[  493.076493] Tainted: [E]=UNSIGNED_MODULE
[  493.076495] Hardware name: TYAN B8021G88V2HR-2T/S8021GM2NR-2T, BIOS V1.03.B10 04/01/2019
[  493.076500] Workqueue: amdgpu-reset-dev drm_sched_job_timedout [gpu_sched]
[  493.076512] Call Trace:
[  493.076515]  &lt;TASK&gt;
[  493.076518]  dump_stack_lvl+0x64/0x80
[  493.076529]  print_report+0xce/0x630
[  493.076536]  ? _raw_spin_lock_irqsave+0x86/0xd0
[  493.076541]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
[  493.076545]  ? amdgpu_device_gpu_recover+0x968/0x990 [amdgpu]
[  493.077253]  kasan_report+0xb8/0xf0
[  493.077258]  ? amdgpu_device_gpu_recover+0x968/0x990 [amdgpu]
[  493.077965]  amdgpu_device_gpu_recover+0x968/0x990 [amdgpu]
[  493.078672]  ? __pfx_amdgpu_device_gpu_recover+0x10/0x10 [amdgpu]
[  493.079378]  ? amdgpu_coredump+0x1fd/0x4c0 [amdgpu]
[  493.080111]  amdgpu_job_timedout+0x642/0x1400 [amdgpu]
[  493.080903]  ? pick_task_fair+0x24e/0x330
[  493.080910]  ? __pfx_amdgpu_job_timedout+0x10/0x10 [amdgpu]
[  493.081702]  ? _raw_spin_lock+0x75/0xc0
[  493.081708]  ? __pfx__raw_spin_lock+0x10/0x10
[  493.081712]  drm_sched_job_timedout+0x1b0/0x4b0 [gpu_sched]
[  493.081721]  ? __pfx__raw_spin_lock_irq+0x10/0x10
[  493.081725]  process_one_work+0x679/0xff0
[  493.081732]  worker_thread+0x6ce/0xfd0
[  493.081736]  ? __pfx_worker_thread+0x10/0x10
[  493.081739]  kthread+0x376/0x730
[  493.081744]  ? __pfx_kthread+0x10/0x10
[  493.081748]  ? __pfx__raw_spin_lock_irq+0x10/0x10
[  493.081751]  ? __pfx_kthread+0x10/0x10
[  493.081755]  ret_from_fork+0x247/0x330
[  493.081761]  ? __pfx_kthread+0x10/0x10
[  493.081764]  ret_from_fork_asm+0x1a/0x30
[  493.081771]  &lt;/TASK&gt;

(cherry picked from commit 20880a3fd5dd7bca1a079534cf6596bda92e107d)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68793/">CVE-2025-68793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68793">CVE-2025-68793 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256649">SUSE bug 1256649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68795</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68795" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68795" ref_url="https://www.suse.com/security/cve/CVE-2025-68795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethtool: Avoid overflowing userspace buffer on stats query

The ethtool -S command operates across three ioctl calls:
ETHTOOL_GSSET_INFO for the size, ETHTOOL_GSTRINGS for the names, and
ETHTOOL_GSTATS for the values.

If the number of stats changes between these calls (e.g., due to device
reconfiguration), userspace's buffer allocation will be incorrect,
potentially leading to buffer overflow.

Drivers are generally expected to maintain stable stat counts, but some
drivers (e.g., mlx5, bnx2x, bna, ksz884x) use dynamic counters, making
this scenario possible.

Some drivers try to handle this internally:
- bnad_get_ethtool_stats() returns early in case stats.n_stats is not
  equal to the driver's stats count.
- micrel/ksz884x also makes sure not to write anything beyond
  stats.n_stats and overflow the buffer.

However, both use stats.n_stats which is already assigned with the value
returned from get_sset_count(), hence won't solve the issue described
here.

Change ethtool_get_strings(), ethtool_get_stats(),
ethtool_get_phy_stats() to not return anything in case of a mismatch
between userspace's size and get_sset_size(), to prevent buffer
overflow.
The returned n_stats value will be equal to zero, to reflect that
nothing has been returned.

This could result in one of two cases when using upstream ethtool,
depending on when the size change is detected:
1. When detected in ethtool_get_strings():
    # ethtool -S eth2
    no stats available

2. When detected in get stats, all stats will be reported as zero.

Both cases are presumably transient, and a subsequent ethtool call
should succeed.

Other than the overflow avoidance, these two cases are very evident (no
output/cleared stats), which is arguably better than presenting
incorrect/shifted stats.
I also considered returning an error instead of a "silent" response, but
that seems more destructive towards userspace apps.

Notes:
- This patch does not claim to fix the inherent race, it only makes sure
  that we do not overflow the userspace buffer, and makes for a more
  predictable behavior.

- RTNL lock is held during each ioctl, the race window exists between
  the separate ioctl calls when the lock is released.

- Userspace ethtool always fills stats.n_stats, but it is likely that
  these stats ioctls are implemented in other userspace applications
  which might not fill it. The added code checks that it's not zero,
  to prevent any regressions.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68795/">CVE-2025-68795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68795">CVE-2025-68795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256688">SUSE bug 1256688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68796</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68796" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68796" ref_url="https://www.suse.com/security/cve/CVE-2025-68796" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to avoid updating zero-sized extent in extent cache

As syzbot reported:

F2FS-fs (loop0): __update_extent_tree_range: extent len is zero, type: 0, extent [0, 0, 0], age [0, 0]
------------[ cut here ]------------
kernel BUG at fs/f2fs/extent_cache.c:678!
Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI
CPU: 0 UID: 0 PID: 5336 Comm: syz.0.0 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:__update_extent_tree_range+0x13bc/0x1500 fs/f2fs/extent_cache.c:678
Call Trace:
 &lt;TASK&gt;
 f2fs_update_read_extent_cache_range+0x192/0x3e0 fs/f2fs/extent_cache.c:1085
 f2fs_do_zero_range fs/f2fs/file.c:1657 [inline]
 f2fs_zero_range+0x10c1/0x1580 fs/f2fs/file.c:1737
 f2fs_fallocate+0x583/0x990 fs/f2fs/file.c:2030
 vfs_fallocate+0x669/0x7e0 fs/open.c:342
 ioctl_preallocate fs/ioctl.c:289 [inline]
 file_ioctl+0x611/0x780 fs/ioctl.c:-1
 do_vfs_ioctl+0xb33/0x1430 fs/ioctl.c:576
 __do_sys_ioctl fs/ioctl.c:595 [inline]
 __se_sys_ioctl+0x82/0x170 fs/ioctl.c:583
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f07bc58eec9

In error path of f2fs_zero_range(), it may add a zero-sized extent
into extent cache, it should be avoided.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68796/">CVE-2025-68796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68796">CVE-2025-68796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256663">SUSE bug 1256663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68797</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68797" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68797" ref_url="https://www.suse.com/security/cve/CVE-2025-68797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

char: applicom: fix NULL pointer dereference in ac_ioctl

Discovered by Atuin - Automated Vulnerability Discovery Engine.

In ac_ioctl, the validation of IndexCard and the check for a valid
RamIO pointer are skipped when cmd is 6. However, the function
unconditionally executes readb(apbs[IndexCard].RamIO + VERS) at the
end.

If cmd is 6, IndexCard may reference a board that does not exist
(where RamIO is NULL), leading to a NULL pointer dereference.

Fix this by skipping the readb access when cmd is 6, as this
command is a global information query and does not target a specific
board context.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68797/">CVE-2025-68797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68797">CVE-2025-68797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256660">SUSE bug 1256660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68798</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68798" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68798" ref_url="https://www.suse.com/security/cve/CVE-2025-68798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/amd: Check event before enable to avoid GPF

On AMD machines cpuc-&gt;events[idx] can become NULL in a subtle race
condition with NMI-&gt;throttle-&gt;x86_pmu_stop().

Check event for NULL in amd_pmu_enable_all() before enable to avoid a GPF.
This appears to be an AMD only issue.

Syzkaller reported a GPF in amd_pmu_enable_all.

INFO: NMI handler (perf_event_nmi_handler) took too long to run: 13.143
    msecs
Oops: general protection fault, probably for non-canonical address
    0xdffffc0000000034: 0000  PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x00000000000001a0-0x00000000000001a7]
CPU: 0 UID: 0 PID: 328415 Comm: repro_36674776 Not tainted 6.12.0-rc1-syzk
RIP: 0010:x86_pmu_enable_event (arch/x86/events/perf_event.h:1195
    arch/x86/events/core.c:1430)
RSP: 0018:ffff888118009d60 EFLAGS: 00010012
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000034 RSI: 0000000000000000 RDI: 00000000000001a0
RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000002
R13: ffff88811802a440 R14: ffff88811802a240 R15: ffff8881132d8601
FS:  00007f097dfaa700(0000) GS:ffff888118000000(0000) GS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200001c0 CR3: 0000000103d56000 CR4: 00000000000006f0
Call Trace:
 &lt;IRQ&gt;
amd_pmu_enable_all (arch/x86/events/amd/core.c:760 (discriminator 2))
x86_pmu_enable (arch/x86/events/core.c:1360)
event_sched_out (kernel/events/core.c:1191 kernel/events/core.c:1186
    kernel/events/core.c:2346)
__perf_remove_from_context (kernel/events/core.c:2435)
event_function (kernel/events/core.c:259)
remote_function (kernel/events/core.c:92 (discriminator 1)
    kernel/events/core.c:72 (discriminator 1))
__flush_smp_call_function_queue (./arch/x86/include/asm/jump_label.h:27
    ./include/linux/jump_label.h:207 ./include/trace/events/csd.h:64
    kernel/smp.c:135 kernel/smp.c:540)
__sysvec_call_function_single (./arch/x86/include/asm/jump_label.h:27
    ./include/linux/jump_label.h:207
    ./arch/x86/include/asm/trace/irq_vectors.h:99 arch/x86/kernel/smp.c:272)
sysvec_call_function_single (arch/x86/kernel/smp.c:266 (discriminator 47)
    arch/x86/kernel/smp.c:266 (discriminator 47))
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68798/">CVE-2025-68798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68798">CVE-2025-68798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256689">SUSE bug 1256689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68799</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68799" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68799" ref_url="https://www.suse.com/security/cve/CVE-2025-68799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

caif: fix integer underflow in cffrml_receive()

The cffrml_receive() function extracts a length field from the packet
header and, when FCS is disabled, subtracts 2 from this length without
validating that len &gt;= 2.

If an attacker sends a malicious packet with a length field of 0 or 1
to an interface with FCS disabled, the subtraction causes an integer
underflow.

This can lead to memory exhaustion and kernel instability, potential
information disclosure if padding contains uninitialized kernel memory.

Fix this by validating that len &gt;= 2 before performing the subtraction.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68799/">CVE-2025-68799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68799">CVE-2025-68799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256643">SUSE bug 1256643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68800</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68800" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68800" ref_url="https://www.suse.com/security/cve/CVE-2025-68800" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3083" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002524.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003268.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats

Cited commit added a dedicated mutex (instead of RTNL) to protect the
multicast route list, so that it will not change while the driver
periodically traverses it in order to update the kernel about multicast
route stats that were queried from the device.

One instance of list entry deletion (during route replace) was missed
and it can result in a use-after-free [1].

Fix by acquiring the mutex before deleting the entry from the list and
releasing it afterwards.

[1]
BUG: KASAN: slab-use-after-free in mlxsw_sp_mr_stats_update+0x4a5/0x540 drivers/net/ethernet/mellanox/mlxsw/spectrum_mr.c:1006 [mlxsw_spectrum]
Read of size 8 at addr ffff8881523c2fa8 by task kworker/2:5/22043

CPU: 2 UID: 0 PID: 22043 Comm: kworker/2:5 Not tainted 6.18.0-rc1-custom-g1a3d6d7cd014 #1 PREEMPT(full)
Hardware name: Mellanox Technologies Ltd. MSN2010/SA002610, BIOS 5.6.5 08/24/2017
Workqueue: mlxsw_core mlxsw_sp_mr_stats_update [mlxsw_spectrum]
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xba/0x110
 print_report+0x174/0x4f5
 kasan_report+0xdf/0x110
 mlxsw_sp_mr_stats_update+0x4a5/0x540 drivers/net/ethernet/mellanox/mlxsw/spectrum_mr.c:1006 [mlxsw_spectrum]
 process_one_work+0x9cc/0x18e0
 worker_thread+0x5df/0xe40
 kthread+0x3b8/0x730
 ret_from_fork+0x3e9/0x560
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Allocated by task 29933:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x8f/0xa0
 mlxsw_sp_mr_route_add+0xd8/0x4770 [mlxsw_spectrum]
 mlxsw_sp_router_fibmr_event_work+0x371/0xad0 drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:7965 [mlxsw_spectrum]
 process_one_work+0x9cc/0x18e0
 worker_thread+0x5df/0xe40
 kthread+0x3b8/0x730
 ret_from_fork+0x3e9/0x560
 ret_from_fork_asm+0x1a/0x30

Freed by task 29933:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 __kasan_save_free_info+0x3b/0x70
 __kasan_slab_free+0x43/0x70
 kfree+0x14e/0x700
 mlxsw_sp_mr_route_add+0x2dea/0x4770 drivers/net/ethernet/mellanox/mlxsw/spectrum_mr.c:444 [mlxsw_spectrum]
 mlxsw_sp_router_fibmr_event_work+0x371/0xad0 drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:7965 [mlxsw_spectrum]
 process_one_work+0x9cc/0x18e0
 worker_thread+0x5df/0xe40
 kthread+0x3b8/0x730
 ret_from_fork+0x3e9/0x560
 ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68800/">CVE-2025-68800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68800">CVE-2025-68800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256646">SUSE bug 1256646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68801</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68801" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68801" ref_url="https://www.suse.com/security/cve/CVE-2025-68801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_router: Fix neighbour use-after-free

We sometimes observe use-after-free when dereferencing a neighbour [1].
The problem seems to be that the driver stores a pointer to the
neighbour, but without holding a reference on it. A reference is only
taken when the neighbour is used by a nexthop.

Fix by simplifying the reference counting scheme. Always take a
reference when storing a neighbour pointer in a neighbour entry. Avoid
taking a referencing when the neighbour is used by a nexthop as the
neighbour entry associated with the nexthop already holds a reference.

Tested by running the test that uncovered the problem over 300 times.
Without this patch the problem was reproduced after a handful of
iterations.

[1]
BUG: KASAN: slab-use-after-free in mlxsw_sp_neigh_entry_update+0x2d4/0x310
Read of size 8 at addr ffff88817f8e3420 by task ip/3929

CPU: 3 UID: 0 PID: 3929 Comm: ip Not tainted 6.18.0-rc4-virtme-g36b21a067510 #3 PREEMPT(full)
Hardware name: Nvidia SN5600/VMOD0013, BIOS 5.13 05/31/2023
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x6f/0xa0
 print_address_description.constprop.0+0x6e/0x300
 print_report+0xfc/0x1fb
 kasan_report+0xe4/0x110
 mlxsw_sp_neigh_entry_update+0x2d4/0x310
 mlxsw_sp_router_rif_gone_sync+0x35f/0x510
 mlxsw_sp_rif_destroy+0x1ea/0x730
 mlxsw_sp_inetaddr_port_vlan_event+0xa1/0x1b0
 __mlxsw_sp_inetaddr_lag_event+0xcc/0x130
 __mlxsw_sp_inetaddr_event+0xf5/0x3c0
 mlxsw_sp_router_netdevice_event+0x1015/0x1580
 notifier_call_chain+0xcc/0x150
 call_netdevice_notifiers_info+0x7e/0x100
 __netdev_upper_dev_unlink+0x10b/0x210
 netdev_upper_dev_unlink+0x79/0xa0
 vrf_del_slave+0x18/0x50
 do_set_master+0x146/0x7d0
 do_setlink.isra.0+0x9a0/0x2880
 rtnl_newlink+0x637/0xb20
 rtnetlink_rcv_msg+0x6fe/0xb90
 netlink_rcv_skb+0x123/0x380
 netlink_unicast+0x4a3/0x770
 netlink_sendmsg+0x75b/0xc90
 __sock_sendmsg+0xbe/0x160
 ____sys_sendmsg+0x5b2/0x7d0
 ___sys_sendmsg+0xfd/0x180
 __sys_sendmsg+0x124/0x1c0
 do_syscall_64+0xbb/0xfd0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
[...]

Allocated by task 109:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x7b/0x90
 __kmalloc_noprof+0x2c1/0x790
 neigh_alloc+0x6af/0x8f0
 ___neigh_create+0x63/0xe90
 mlxsw_sp_nexthop_neigh_init+0x430/0x7e0
 mlxsw_sp_nexthop_type_init+0x212/0x960
 mlxsw_sp_nexthop6_group_info_init.constprop.0+0x81f/0x1280
 mlxsw_sp_nexthop6_group_get+0x392/0x6a0
 mlxsw_sp_fib6_entry_create+0x46a/0xfd0
 mlxsw_sp_router_fib6_replace+0x1ed/0x5f0
 mlxsw_sp_router_fib6_event_work+0x10a/0x2a0
 process_one_work+0xd57/0x1390
 worker_thread+0x4d6/0xd40
 kthread+0x355/0x5b0
 ret_from_fork+0x1d4/0x270
 ret_from_fork_asm+0x11/0x20

Freed by task 154:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 __kasan_save_free_info+0x3b/0x60
 __kasan_slab_free+0x43/0x70
 kmem_cache_free_bulk.part.0+0x1eb/0x5e0
 kvfree_rcu_bulk+0x1f2/0x260
 kfree_rcu_work+0x130/0x1b0
 process_one_work+0xd57/0x1390
 worker_thread+0x4d6/0xd40
 kthread+0x355/0x5b0
 ret_from_fork+0x1d4/0x270
 ret_from_fork_asm+0x11/0x20

Last potentially related work creation:
 kasan_save_stack+0x30/0x50
 kasan_record_aux_stack+0x8c/0xa0
 kvfree_call_rcu+0x93/0x5b0
 mlxsw_sp_router_neigh_event_work+0x67d/0x860
 process_one_work+0xd57/0x1390
 worker_thread+0x4d6/0xd40
 kthread+0x355/0x5b0
 ret_from_fork+0x1d4/0x270
 ret_from_fork_asm+0x11/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68801/">CVE-2025-68801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68801">CVE-2025-68801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256653">SUSE bug 1256653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68802</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68802" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68802" ref_url="https://www.suse.com/security/cve/CVE-2025-68802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Limit num_syncs to prevent oversized allocations

The exec and vm_bind ioctl allow userspace to specify an arbitrary
num_syncs value. Without bounds checking, a very large num_syncs
can force an excessively large allocation, leading to kernel warnings
from the page allocator as below.

Introduce DRM_XE_MAX_SYNCS (set to 1024) and reject any request
exceeding this limit.

"
------------[ cut here ]------------
WARNING: CPU: 0 PID: 1217 at mm/page_alloc.c:5124 __alloc_frozen_pages_noprof+0x2f8/0x2180 mm/page_alloc.c:5124
...
Call Trace:
 &lt;TASK&gt;
 alloc_pages_mpol+0xe4/0x330 mm/mempolicy.c:2416
 ___kmalloc_large_node+0xd8/0x110 mm/slub.c:4317
 __kmalloc_large_node_noprof+0x18/0xe0 mm/slub.c:4348
 __do_kmalloc_node mm/slub.c:4364 [inline]
 __kmalloc_noprof+0x3d4/0x4b0 mm/slub.c:4388
 kmalloc_noprof include/linux/slab.h:909 [inline]
 kmalloc_array_noprof include/linux/slab.h:948 [inline]
 xe_exec_ioctl+0xa47/0x1e70 drivers/gpu/drm/xe/xe_exec.c:158
 drm_ioctl_kernel+0x1f1/0x3e0 drivers/gpu/drm/drm_ioctl.c:797
 drm_ioctl+0x5e7/0xc50 drivers/gpu/drm/drm_ioctl.c:894
 xe_drm_ioctl+0x10b/0x170 drivers/gpu/drm/xe/xe_device.c:224
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:598 [inline]
 __se_sys_ioctl fs/ioctl.c:584 [inline]
 __x64_sys_ioctl+0x18b/0x210 fs/ioctl.c:584
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xbb/0x380 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
...
"

v2: Add "Reported-by" and Cc stable kernels.
v3: Change XE_MAX_SYNCS from 64 to 1024. (Matt &amp; Ashutosh)
v4: s/XE_MAX_SYNCS/DRM_XE_MAX_SYNCS/ (Matt)
v5: Do the check at the top of the exec func. (Matt)

(cherry picked from commit b07bac9bd708ec468cd1b8a5fe70ae2ac9b0a11c)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68802/">CVE-2025-68802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68802">CVE-2025-68802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256661">SUSE bug 1256661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68803</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68803" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68803" ref_url="https://www.suse.com/security/cve/CVE-2025-68803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: NFSv4 file creation neglects setting ACL

An NFSv4 client that sets an ACL with a named principal during file
creation retrieves the ACL afterwards, and finds that it is only a
default ACL (based on the mode bits) and not the ACL that was
requested during file creation. This violates RFC 8881 section
6.4.1.3: "the ACL attribute is set as given".

The issue occurs in nfsd_create_setattr(), which calls
nfsd_attrs_valid() to determine whether to call nfsd_setattr().
However, nfsd_attrs_valid() checks only for iattr changes and
security labels, but not POSIX ACLs. When only an ACL is present,
the function returns false, nfsd_setattr() is skipped, and the
POSIX ACL is never applied to the inode.

Subsequently, when the client retrieves the ACL, the server finds
no POSIX ACL on the inode and returns one generated from the file's
mode bits rather than returning the originally-specified ACL.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68803/">CVE-2025-68803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68803">CVE-2025-68803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256770">SUSE bug 1256770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68804</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68804" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68804" ref_url="https://www.suse.com/security/cve/CVE-2025-68804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver

After unbinding the driver, another kthread `cros_ec_console_log_work`
is still accessing the device, resulting an UAF and crash.

The driver doesn't unregister the EC device in .remove() which should
shutdown sub-devices synchronously.  Fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-04"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68804/">CVE-2025-68804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68804">CVE-2025-68804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256617">SUSE bug 1256617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256618">SUSE bug 1256618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68805</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68805" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68805" ref_url="https://www.suse.com/security/cve/CVE-2025-68805" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fuse: fix io-uring list corruption for terminated non-committed requests

When a request is terminated before it has been committed, the request
is not removed from the queue's list. This leaves a dangling list entry
that leads to list corruption and use-after-free issues.

Remove the request from the queue's list for terminated non-committed
requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68805/">CVE-2025-68805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68805">CVE-2025-68805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256620">SUSE bug 1256620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68806</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68806" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68806" ref_url="https://www.suse.com/security/cve/CVE-2025-68806" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix buffer validation by including null terminator size in EA length

The smb2_set_ea function, which handles Extended Attributes (EA),
was performing buffer validation checks that incorrectly omitted the size
of the null terminating character (+1 byte) for EA Name.
This patch fixes the issue by explicitly adding '+ 1' to EaNameLength where
the null terminator is expected to be present in the buffer, ensuring
the validation accurately reflects the total required buffer size.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68806/">CVE-2025-68806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68806">CVE-2025-68806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256621">SUSE bug 1256621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68807</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68807" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68807" ref_url="https://www.suse.com/security/cve/CVE-2025-68807" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix race between wbt_enable_default and IO submission

When wbt_enable_default() is moved out of queue freezing in elevator_change(),
it can cause the wbt inflight counter to become negative (-1), leading to hung
tasks in the writeback path. Tasks get stuck in wbt_wait() because the counter
is in an inconsistent state.

The issue occurs because wbt_enable_default() could race with IO submission,
allowing the counter to be decremented before proper initialization. This manifests
as:

  rq_wait[0]:
    inflight:             -1
    has_waiters:        True

rwb_enabled() checks the state, which can be updated exactly between wbt_wait()
(rq_qos_throttle()) and wbt_track()(rq_qos_track()), then the inflight counter
will become negative.

And results in hung task warnings like:
  task:kworker/u24:39 state:D stack:0 pid:14767
  Call Trace:
    rq_qos_wait+0xb4/0x150
    wbt_wait+0xa9/0x100
    __rq_qos_throttle+0x24/0x40
    blk_mq_submit_bio+0x672/0x7b0
    ...

Fix this by:

1. Splitting wbt_enable_default() into:
   - __wbt_enable_default(): Returns true if wbt_init() should be called
   - wbt_enable_default(): Wrapper for existing callers (no init)
   - wbt_init_enable_default(): New function that checks and inits WBT

2. Using wbt_init_enable_default() in blk_register_queue() to ensure
   proper initialization during queue registration

3. Move wbt_init() out of wbt_enable_default() which is only for enabling
   disabled wbt from bfq and iocost, and wbt_init() isn't needed. Then the
   original lock warning can be avoided.

4. Removing the ELEVATOR_FLAG_ENABLE_WBT_ON_EXIT flag and its handling
   code since it's no longer needed

This ensures WBT is properly initialized before any IO can be submitted,
preventing the counter from going negative.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68807/">CVE-2025-68807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68807">CVE-2025-68807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256681">SUSE bug 1256681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68808</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68808" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68808" ref_url="https://www.suse.com/security/cve/CVE-2025-68808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: vidtv: initialize local pointers upon transfer of memory ownership

vidtv_channel_si_init() creates a temporary list (program, service, event)
and ownership of the memory itself is transferred to the PAT/SDT/EIT
tables through vidtv_psi_pat_program_assign(),
vidtv_psi_sdt_service_assign(), vidtv_psi_eit_event_assign().

The problem here is that the local pointer where the memory ownership
transfer was completed is not initialized to NULL. This causes the
vidtv_psi_pmt_create_sec_for_each_pat_entry() function to fail, and
in the flow that jumps to free_eit, the memory that was freed by
vidtv_psi_*_table_destroy() can be accessed again by
vidtv_psi_*_event_destroy() due to the uninitialized local pointer, so it
is freed once again.

Therefore, to prevent use-after-free and double-free vulnerability,
local pointers must be initialized to NULL when transferring memory
ownership.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68808/">CVE-2025-68808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68808">CVE-2025-68808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256682">SUSE bug 1256682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68809</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68809" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68809" ref_url="https://www.suse.com/security/cve/CVE-2025-68809" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: vfs: fix race on m_flags in vfs_cache

ksmbd maintains delete-on-close and pending-delete state in
ksmbd_inode-&gt;m_flags. In vfs_cache.c this field is accessed under
inconsistent locking: some paths read and modify m_flags under
ci-&gt;m_lock while others do so without taking the lock at all.

Examples:

 - ksmbd_query_inode_status() and __ksmbd_inode_close() use
   ci-&gt;m_lock when checking or updating m_flags.
 - ksmbd_inode_pending_delete(), ksmbd_set_inode_pending_delete(),
   ksmbd_clear_inode_pending_delete() and ksmbd_fd_set_delete_on_close()
   used to read and modify m_flags without ci-&gt;m_lock.

This creates a potential data race on m_flags when multiple threads
open, close and delete the same file concurrently. In the worst case
delete-on-close and pending-delete bits can be lost or observed in an
inconsistent state, leading to confusing delete semantics (files that
stay on disk after delete-on-close, or files that disappear while still
in use).

Fix it by:

 - Making ksmbd_query_inode_status() look at m_flags under ci-&gt;m_lock
   after dropping inode_hash_lock.
 - Adding ci-&gt;m_lock protection to all helpers that read or modify
   m_flags (ksmbd_inode_pending_delete(), ksmbd_set_inode_pending_delete(),
   ksmbd_clear_inode_pending_delete(), ksmbd_fd_set_delete_on_close()).
 - Keeping the existing ci-&gt;m_lock protection in __ksmbd_inode_close(),
   and moving the actual unlink/xattr removal outside the lock.

This unifies the locking around m_flags and removes the data race while
preserving the existing delete-on-close behaviour.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68809/">CVE-2025-68809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68809">CVE-2025-68809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256685">SUSE bug 1256685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68810</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68810" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68810" ref_url="https://www.suse.com/security/cve/CVE-2025-68810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot

Reject attempts to disable KVM_MEM_GUEST_MEMFD on a memslot that was
initially created with a guest_memfd binding, as KVM doesn't support
toggling KVM_MEM_GUEST_MEMFD on existing memslots.  KVM prevents enabling
KVM_MEM_GUEST_MEMFD, but doesn't prevent clearing the flag.

Failure to reject the new memslot results in a use-after-free due to KVM
not unbinding from the guest_memfd instance.  Unbinding on a FLAGS_ONLY
change is easy enough, and can/will be done as a hardening measure (in
anticipation of KVM supporting dirty logging on guest_memfd at some point),
but fixing the use-after-free would only address the immediate symptom.

  ==================================================================
  BUG: KASAN: slab-use-after-free in kvm_gmem_release+0x362/0x400 [kvm]
  Write of size 8 at addr ffff8881111ae908 by task repro/745

  CPU: 7 UID: 1000 PID: 745 Comm: repro Not tainted 6.18.0-rc6-115d5de2eef3-next-kasan #3 NONE
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x51/0x60
   print_report+0xcb/0x5c0
   kasan_report+0xb4/0xe0
   kvm_gmem_release+0x362/0x400 [kvm]
   __fput+0x2fa/0x9d0
   task_work_run+0x12c/0x200
   do_exit+0x6ae/0x2100
   do_group_exit+0xa8/0x230
   __x64_sys_exit_group+0x3a/0x50
   x64_sys_call+0x737/0x740
   do_syscall_64+0x5b/0x900
   entry_SYSCALL_64_after_hwframe+0x4b/0x53
  RIP: 0033:0x7f581f2eac31
   &lt;/TASK&gt;

  Allocated by task 745 on cpu 6 at 9.746971s:
   kasan_save_stack+0x20/0x40
   kasan_save_track+0x13/0x50
   __kasan_kmalloc+0x77/0x90
   kvm_set_memory_region.part.0+0x652/0x1110 [kvm]
   kvm_vm_ioctl+0x14b0/0x3290 [kvm]
   __x64_sys_ioctl+0x129/0x1a0
   do_syscall_64+0x5b/0x900
   entry_SYSCALL_64_after_hwframe+0x4b/0x53

  Freed by task 745 on cpu 6 at 9.747467s:
   kasan_save_stack+0x20/0x40
   kasan_save_track+0x13/0x50
   __kasan_save_free_info+0x37/0x50
   __kasan_slab_free+0x3b/0x60
   kfree+0xf5/0x440
   kvm_set_memslot+0x3c2/0x1160 [kvm]
   kvm_set_memory_region.part.0+0x86a/0x1110 [kvm]
   kvm_vm_ioctl+0x14b0/0x3290 [kvm]
   __x64_sys_ioctl+0x129/0x1a0
   do_syscall_64+0x5b/0x900
   entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68810/">CVE-2025-68810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68810">CVE-2025-68810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256679">SUSE bug 1256679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68811</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68811" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68811" ref_url="https://www.suse.com/security/cve/CVE-2025-68811" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

svcrdma: use rc_pageoff for memcpy byte offset

svc_rdma_copy_inline_range added rc_curpage (page index) to the page
base instead of the byte offset rc_pageoff. Use rc_pageoff so copies
land within the current page.

Found by ZeroPath (https://zeropath.com)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68811/">CVE-2025-68811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68811">CVE-2025-68811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256677">SUSE bug 1256677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68812</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68812" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68812" ref_url="https://www.suse.com/security/cve/CVE-2025-68812" source="SUSE CVE"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68812/">CVE-2025-68812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68812">CVE-2025-68812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256669">SUSE bug 1256669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68813</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68813" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68813" ref_url="https://www.suse.com/security/cve/CVE-2025-68813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20887-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20888-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20889-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20891-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20893-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20895-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20896-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipvs: fix ipv4 null-ptr-deref in route error path

The IPv4 code path in __ip_vs_get_out_rt() calls dst_link_failure()
without ensuring skb-&gt;dev is set, leading to a NULL pointer dereference
in fib_compute_spec_dst() when ipv4_link_failure() attempts to send
ICMP destination unreachable messages.

The issue emerged after commit ed0de45a1008 ("ipv4: recompile ip options
in ipv4_link_failure") started calling __ip_options_compile() from
ipv4_link_failure(). This code path eventually calls fib_compute_spec_dst()
which dereferences skb-&gt;dev. An attempt was made to fix the NULL skb-&gt;dev
dereference in commit 0113d9c9d1cc ("ipv4: fix null-deref in
ipv4_link_failure"), but it only addressed the immediate dev_net(skb-&gt;dev)
dereference by using a fallback device. The fix was incomplete because
fib_compute_spec_dst() later in the call chain still accesses skb-&gt;dev
directly, which remains NULL when IPVS calls dst_link_failure().

The crash occurs when:
1. IPVS processes a packet in NAT mode with a misconfigured destination
2. Route lookup fails in __ip_vs_get_out_rt() before establishing a route
3. The error path calls dst_link_failure(skb) with skb-&gt;dev == NULL
4. ipv4_link_failure() -&gt; ipv4_send_dest_unreach() -&gt;
   __ip_options_compile() -&gt; fib_compute_spec_dst()
5. fib_compute_spec_dst() dereferences NULL skb-&gt;dev

Apply the same fix used for IPv6 in commit 326bf17ea5d4 ("ipvs: fix
ipv6 route unreach panic"): set skb-&gt;dev from skb_dst(skb)-&gt;dev before
calling dst_link_failure().

KASAN: null-ptr-deref in range [0x0000000000000328-0x000000000000032f]
CPU: 1 PID: 12732 Comm: syz.1.3469 Not tainted 6.6.114 #2
RIP: 0010:__in_dev_get_rcu include/linux/inetdevice.h:233
RIP: 0010:fib_compute_spec_dst+0x17a/0x9f0 net/ipv4/fib_frontend.c:285
Call Trace:
  &lt;TASK&gt;
  spec_dst_fill net/ipv4/ip_options.c:232
  spec_dst_fill net/ipv4/ip_options.c:229
  __ip_options_compile+0x13a1/0x17d0 net/ipv4/ip_options.c:330
  ipv4_send_dest_unreach net/ipv4/route.c:1252
  ipv4_link_failure+0x702/0xb80 net/ipv4/route.c:1265
  dst_link_failure include/net/dst.h:437
  __ip_vs_get_out_rt+0x15fd/0x19e0 net/netfilter/ipvs/ip_vs_xmit.c:412
  ip_vs_nat_xmit+0x1d8/0xc80 net/netfilter/ipvs/ip_vs_xmit.c:764
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68813/">CVE-2025-68813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68813">CVE-2025-68813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256641">SUSE bug 1256641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256644">SUSE bug 1256644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052000" comment="kernel-livepatch-6_12_0-160000_5-default-8-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051986" comment="kernel-livepatch-6_12_0-160000_5-rt-6-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052001" comment="kernel-livepatch-6_12_0-160000_6-default-6-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051990" comment="kernel-livepatch-6_12_0-160000_6-rt-5-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052002" comment="kernel-livepatch-6_12_0-160000_7-default-4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051985" comment="kernel-livepatch-6_12_0-160000_7-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051998" comment="kernel-livepatch-6_12_0-160000_8-default-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051984" comment="kernel-livepatch-6_12_0-160000_8-rt-2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051997" comment="kernel-livepatch-6_12_0-160000_9-default-2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051989" comment="kernel-livepatch-6_12_0-160000_9-rt-2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68814</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68814" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68814" ref_url="https://www.suse.com/security/cve/CVE-2025-68814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix filename leak in __io_openat_prep()

 __io_openat_prep() allocates a struct filename using getname(). However,
for the condition of the file being installed in the fixed file table as
well as having O_CLOEXEC flag set, the function returns early. At that
point, the request doesn't have REQ_F_NEED_CLEANUP flag set. Due to this,
the memory for the newly allocated struct filename is not cleaned up,
causing a memory leak.

Fix this by setting the REQ_F_NEED_CLEANUP for the request just after the
successful getname() call, so that when the request is torn down, the
filename will be cleaned up, along with other resources needing cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68814/">CVE-2025-68814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68814">CVE-2025-68814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256651">SUSE bug 1256651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68815</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68815" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68815" ref_url="https://www.suse.com/security/cve/CVE-2025-68815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: ets: Remove drr class from the active list if it changes to strict

Whenever a user issues an ets qdisc change command, transforming a
drr class into a strict one, the ets code isn't checking whether that
class was in the active list and removing it. This means that, if a
user changes a strict class (which was in the active list) back to a drr
one, that class will be added twice to the active list [1].

Doing so with the following commands:

tc qdisc add dev lo root handle 1: ets bands 2 strict 1
tc qdisc add dev lo parent 1:2 handle 20: \
    tbf rate 8bit burst 100b latency 1s
tc filter add dev lo parent 1: basic classid 1:2
ping -c1 -W0.01 -s 56 127.0.0.1
tc qdisc change dev lo root handle 1: ets bands 2 strict 2
tc qdisc change dev lo root handle 1: ets bands 2 strict 1
ping -c1 -W0.01 -s 56 127.0.0.1

Will trigger the following splat with list debug turned on:

[   59.279014][  T365] ------------[ cut here ]------------
[   59.279452][  T365] list_add double add: new=ffff88801d60e350, prev=ffff88801d60e350, next=ffff88801d60e2c0.
[   59.280153][  T365] WARNING: CPU: 3 PID: 365 at lib/list_debug.c:35 __list_add_valid_or_report+0x17f/0x220
[   59.280860][  T365] Modules linked in:
[   59.281165][  T365] CPU: 3 UID: 0 PID: 365 Comm: tc Not tainted 6.18.0-rc7-00105-g7e9f13163c13-dirty #239 PREEMPT(voluntary)
[   59.281977][  T365] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[   59.282391][  T365] RIP: 0010:__list_add_valid_or_report+0x17f/0x220
[   59.282842][  T365] Code: 89 c6 e8 d4 b7 0d ff 90 0f 0b 90 90 31 c0 e9 31 ff ff ff 90 48 c7 c7 e0 a0 22 9f 48 89 f2 48 89 c1 4c 89 c6 e8 b2 b7 0d ff 90 &lt;0f&gt; 0b 90 90 31 c0 e9 0f ff ff ff 48 89 f7 48 89 44 24 10 4c 89 44
...
[   59.288812][  T365] Call Trace:
[   59.289056][  T365]  &lt;TASK&gt;
[   59.289224][  T365]  ? srso_alias_return_thunk+0x5/0xfbef5
[   59.289546][  T365]  ets_qdisc_change+0xd2b/0x1e80
[   59.289891][  T365]  ? __lock_acquire+0x7e7/0x1be0
[   59.290223][  T365]  ? __pfx_ets_qdisc_change+0x10/0x10
[   59.290546][  T365]  ? srso_alias_return_thunk+0x5/0xfbef5
[   59.290898][  T365]  ? __mutex_trylock_common+0xda/0x240
[   59.291228][  T365]  ? __pfx___mutex_trylock_common+0x10/0x10
[   59.291655][  T365]  ? srso_alias_return_thunk+0x5/0xfbef5
[   59.291993][  T365]  ? srso_alias_return_thunk+0x5/0xfbef5
[   59.292313][  T365]  ? trace_contention_end+0xc8/0x110
[   59.292656][  T365]  ? srso_alias_return_thunk+0x5/0xfbef5
[   59.293022][  T365]  ? srso_alias_return_thunk+0x5/0xfbef5
[   59.293351][  T365]  tc_modify_qdisc+0x63a/0x1cf0

Fix this by always checking and removing an ets class from the active list
when changing it to strict.

[1] https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/tree/net/sched/sch_ets.c?id=ce052b9402e461a9aded599f5b47e76bc727f7de#n663
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68815/">CVE-2025-68815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68815">CVE-2025-68815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256680">SUSE bug 1256680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68816</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68816" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68816" ref_url="https://www.suse.com/security/cve/CVE-2025-68816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: fw_tracer, Validate format string parameters

Add validation for format string parameters in the firmware tracer to
prevent potential security vulnerabilities and crashes from malformed
format strings received from firmware.

The firmware tracer receives format strings from the device firmware and
uses them to format trace messages. Without proper validation, bad
firmware could provide format strings with invalid format specifiers
(e.g., %s, %p, %n) that could lead to crashes, or other undefined
behavior.

Add mlx5_tracer_validate_params() to validate that all format specifiers
in trace strings are limited to safe integer/hex formats (%x, %d, %i,
%u, %llx, %lx, etc.). Reject strings containing other format types that
could be used to access arbitrary memory or cause crashes.
Invalid format strings are added to the trace output for visibility with
"BAD_FORMAT: " prefix.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68816/">CVE-2025-68816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68816">CVE-2025-68816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256674">SUSE bug 1256674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68817</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68817" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68817" ref_url="https://www.suse.com/security/cve/CVE-2025-68817" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency

Under high concurrency, A tree-connection object (tcon) is freed on
a disconnect path while another path still holds a reference and later
executes *_put()/write on it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68817/">CVE-2025-68817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68817">CVE-2025-68817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256672">SUSE bug 1256672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68818</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68818" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68818" ref_url="https://www.suse.com/security/cve/CVE-2025-68818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: Revert "scsi: qla2xxx: Perform lockless command completion in abort path"

This reverts commit 0367076b0817d5c75dfb83001ce7ce5c64d803a9.

The commit being reverted added code to __qla2x00_abort_all_cmds() to
call sp-&gt;done() without holding a spinlock.  But unlike the older code
below it, this new code failed to check sp-&gt;cmd_type and just assumed
TYPE_SRB, which results in a jump to an invalid pointer in target-mode
with TYPE_TGT_CMD:

qla2xxx [0000:65:00.0]-d034:8: qla24xx_do_nack_work create sess success
  0000000009f7a79b
qla2xxx [0000:65:00.0]-5003:8: ISP System Error - mbx1=1ff5h mbx2=10h
  mbx3=0h mbx4=0h mbx5=191h mbx6=0h mbx7=0h.
qla2xxx [0000:65:00.0]-d01e:8: -&gt; fwdump no buffer
qla2xxx [0000:65:00.0]-f03a:8: qla_target(0): System error async event
  0x8002 occurred
qla2xxx [0000:65:00.0]-00af:8: Performing ISP error recovery -
  ha=0000000058183fda.
BUG: kernel NULL pointer dereference, address: 0000000000000000
PF: supervisor instruction fetch in kernel mode
PF: error_code(0x0010) - not-present page
PGD 0 P4D 0
Oops: 0010 [#1] SMP
CPU: 2 PID: 9446 Comm: qla2xxx_8_dpc Tainted: G           O       6.1.133 #1
Hardware name: Supermicro Super Server/X11SPL-F, BIOS 4.2 12/15/2023
RIP: 0010:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0018:ffffc90001f93dc8 EFLAGS: 00010206
RAX: 0000000000000282 RBX: 0000000000000355 RCX: ffff88810d16a000
RDX: ffff88810dbadaa8 RSI: 0000000000080000 RDI: ffff888169dc38c0
RBP: ffff888169dc38c0 R08: 0000000000000001 R09: 0000000000000045
R10: ffffffffa034bdf0 R11: 0000000000000000 R12: ffff88810800bb40
R13: 0000000000001aa8 R14: ffff888100136610 R15: ffff8881070f7400
FS:  0000000000000000(0000) GS:ffff88bf80080000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 000000010c8ff006 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? __die+0x4d/0x8b
 ? page_fault_oops+0x91/0x180
 ? trace_buffer_unlock_commit_regs+0x38/0x1a0
 ? exc_page_fault+0x391/0x5e0
 ? asm_exc_page_fault+0x22/0x30
 __qla2x00_abort_all_cmds+0xcb/0x3e0 [qla2xxx_scst]
 qla2x00_abort_all_cmds+0x50/0x70 [qla2xxx_scst]
 qla2x00_abort_isp_cleanup+0x3b7/0x4b0 [qla2xxx_scst]
 qla2x00_abort_isp+0xfd/0x860 [qla2xxx_scst]
 qla2x00_do_dpc+0x581/0xa40 [qla2xxx_scst]
 kthread+0xa8/0xd0
 &lt;/TASK&gt;

Then commit 4475afa2646d ("scsi: qla2xxx: Complete command early within
lock") added the spinlock back, because not having the lock caused a
race and a crash.  But qla2x00_abort_srb() in the switch below already
checks for qla2x00_chip_is_down() and handles it the same way, so the
code above the switch is now redundant and still buggy in target-mode.
Remove it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68818/">CVE-2025-68818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68818">CVE-2025-68818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256675">SUSE bug 1256675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68819</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68819" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68819" ref_url="https://www.suse.com/security/cve/CVE-2025-68819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg()

rlen value is a user-controlled value, but dtv5100_i2c_msg() does not
check the size of the rlen value. Therefore, if it is set to a value
larger than sizeof(st-&gt;data), an out-of-bounds vuln occurs for st-&gt;data.

Therefore, we need to add proper range checking to prevent this vuln.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68819/">CVE-2025-68819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68819">CVE-2025-68819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256664">SUSE bug 1256664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68820</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68820" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68820" ref_url="https://www.suse.com/security/cve/CVE-2025-68820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: xattr: fix null pointer deref in ext4_raw_inode()

If ext4_get_inode_loc() fails (e.g. if it returns -EFSCORRUPTED),
iloc.bh will remain set to NULL. Since ext4_xattr_inode_dec_ref_all()
lacks error checking, this will lead to a null pointer dereference
in ext4_raw_inode(), called right after ext4_get_inode_loc().

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-68820/">CVE-2025-68820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68820">CVE-2025-68820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256754">SUSE bug 1256754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68821</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68821" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68821" ref_url="https://www.suse.com/security/cve/CVE-2025-68821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fuse: fix readahead reclaim deadlock

Commit e26ee4efbc79 ("fuse: allocate ff-&gt;release_args only if release is
needed") skips allocating ff-&gt;release_args if the server does not
implement open. However in doing so, fuse_prepare_release() now skips
grabbing the reference on the inode, which makes it possible for an
inode to be evicted from the dcache while there are inflight readahead
requests. This causes a deadlock if the server triggers reclaim while
servicing the readahead request and reclaim attempts to evict the inode
of the file being read ahead. Since the folio is locked during
readahead, when reclaim evicts the fuse inode and fuse_evict_inode()
attempts to remove all folios associated with the inode from the page
cache (truncate_inode_pages_range()), reclaim will block forever waiting
for the lock since readahead cannot relinquish the lock because it is
itself blocked in reclaim:

&gt;&gt;&gt; stack_trace(1504735)
 folio_wait_bit_common (mm/filemap.c:1308:4)
 folio_lock (./include/linux/pagemap.h:1052:3)
 truncate_inode_pages_range (mm/truncate.c:336:10)
 fuse_evict_inode (fs/fuse/inode.c:161:2)
 evict (fs/inode.c:704:3)
 dentry_unlink_inode (fs/dcache.c:412:3)
 __dentry_kill (fs/dcache.c:615:3)
 shrink_kill (fs/dcache.c:1060:12)
 shrink_dentry_list (fs/dcache.c:1087:3)
 prune_dcache_sb (fs/dcache.c:1168:2)
 super_cache_scan (fs/super.c:221:10)
 do_shrink_slab (mm/shrinker.c:435:9)
 shrink_slab (mm/shrinker.c:626:10)
 shrink_node (mm/vmscan.c:5951:2)
 shrink_zones (mm/vmscan.c:6195:3)
 do_try_to_free_pages (mm/vmscan.c:6257:3)
 do_swap_page (mm/memory.c:4136:11)
 handle_pte_fault (mm/memory.c:5562:10)
 handle_mm_fault (mm/memory.c:5870:9)
 do_user_addr_fault (arch/x86/mm/fault.c:1338:10)
 handle_page_fault (arch/x86/mm/fault.c:1481:3)
 exc_page_fault (arch/x86/mm/fault.c:1539:2)
 asm_exc_page_fault+0x22/0x27

Fix this deadlock by allocating ff-&gt;release_args and grabbing the
reference on the inode when preparing the file for release even if the
server does not implement open. The inode reference will be dropped when
the last reference on the fuse file is dropped (see fuse_file_put() -&gt;
fuse_release_end()).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68821/">CVE-2025-68821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68821">CVE-2025-68821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256667">SUSE bug 1256667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68822</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68822" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68822" ref_url="https://www.suse.com/security/cve/CVE-2025-68822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: alps - fix use-after-free bugs caused by dev3_register_work

The dev3_register_work delayed work item is initialized within
alps_reconnect() and scheduled upon receipt of the first bare
PS/2 packet from an external PS/2 device connected to the ALPS
touchpad. During device detachment, the original implementation
calls flush_workqueue() in psmouse_disconnect() to ensure
completion of dev3_register_work. However, the flush_workqueue()
in psmouse_disconnect() only blocks and waits for work items that
were already queued to the workqueue prior to its invocation. Any
work items submitted after flush_workqueue() is called are not
included in the set of tasks that the flush operation awaits.
This means that after flush_workqueue() has finished executing,
the dev3_register_work could still be scheduled. Although the
psmouse state is set to PSMOUSE_CMD_MODE in psmouse_disconnect(),
the scheduling of dev3_register_work remains unaffected.

The race condition can occur as follows:

CPU 0 (cleanup path)     | CPU 1 (delayed work)
psmouse_disconnect()     |
  psmouse_set_state()    |
  flush_workqueue()      | alps_report_bare_ps2_packet()
  alps_disconnect()      |   psmouse_queue_work()
    kfree(priv); // FREE | alps_register_bare_ps2_mouse()
                         |   priv = container_of(work...); // USE
                         |   priv-&gt;dev3 // USE

Add disable_delayed_work_sync() in alps_disconnect() to ensure
that dev3_register_work is properly canceled and prevented from
executing after the alps_data structure has been deallocated.

This bug is identified by static analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68822/">CVE-2025-68822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68822">CVE-2025-68822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256668">SUSE bug 1256668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68823</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68823" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68823" ref_url="https://www.suse.com/security/cve/CVE-2025-68823" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ublk: fix deadlock when reading partition table

When one process(such as udev) opens ublk block device (e.g., to read
the partition table via bdev_open()), a deadlock[1] can occur:

1. bdev_open() grabs disk-&gt;open_mutex
2. The process issues read I/O to ublk backend to read partition table
3. In __ublk_complete_rq(), blk_update_request() or blk_mq_end_request()
   runs bio-&gt;bi_end_io() callbacks
4. If this triggers fput() on file descriptor of ublk block device, the
   work may be deferred to current task's task work (see fput() implementation)
5. This eventually calls blkdev_release() from the same context
6. blkdev_release() tries to grab disk-&gt;open_mutex again
7. Deadlock: same task waiting for a mutex it already holds

The fix is to run blk_update_request() and blk_mq_end_request() with bottom
halves disabled. This forces blkdev_release() to run in kernel work-queue
context instead of current task work context, and allows ublk server to make
forward progress, and avoids the deadlock.

[axboe: rewrite comment in ublk]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68823/">CVE-2025-68823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68823">CVE-2025-68823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256652">SUSE bug 1256652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68973</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68973" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68973" ref_url="https://www.suse.com/security/cve/CVE-2025-68973" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0719" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003161.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0728" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002386.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1229" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024327.html" source="SUSE-SU"/>
    <description>
    In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-68973/">CVE-2025-68973 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68973">CVE-2025-68973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255715">SUSE bug 1255715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037710" comment="gpg2-2.5.5-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69418</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69418" ref_url="https://www.suse.com/security/cve/CVE-2025-69418" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: When using the low-level OCB API directly with AES-NI or&lt;br&gt;other hardware-accelerated code paths, inputs whose length is not a multiple&lt;br&gt;of 16 bytes can leave the final partial block unencrypted and unauthenticated.&lt;br&gt;&lt;br&gt;Impact summary: The trailing 1-15 bytes of a message may be exposed in&lt;br&gt;cleartext on encryption and are not covered by the authentication tag,&lt;br&gt;allowing an attacker to read or tamper with those bytes without detection.&lt;br&gt;&lt;br&gt;The low-level OCB encrypt and decrypt routines in the hardware-accelerated&lt;br&gt;stream path process full 16-byte blocks but do not advance the input/output&lt;br&gt;pointers. The subsequent tail-handling code then operates on the original&lt;br&gt;base pointers, effectively reprocessing the beginning of the buffer while&lt;br&gt;leaving the actual trailing bytes unprocessed. The authentication checksum&lt;br&gt;also excludes the true tail bytes.&lt;br&gt;&lt;br&gt;However, typical OpenSSL consumers using EVP are not affected because the&lt;br&gt;higher-level EVP and provider OCB implementations split inputs so that full&lt;br&gt;blocks and trailing partial blocks are processed in separate calls, avoiding&lt;br&gt;the problematic code path. Additionally, TLS does not use OCB ciphersuites.&lt;br&gt;The vulnerability only affects applications that call the low-level&lt;br&gt;CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with&lt;br&gt;non-block-aligned lengths in a single call on hardware-accelerated builds.&lt;br&gt;For these reasons the issue was assessed as Low severity.&lt;br&gt;&lt;br&gt;The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected&lt;br&gt;by this issue, as OCB mode is not a FIPS-approved algorithm.&lt;br&gt;&lt;br&gt;OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.&lt;br&gt;&lt;br&gt;OpenSSL 1.0.2 is not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-04"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69418/">CVE-2025-69418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69418">CVE-2025-69418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256835">SUSE bug 1256835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69419</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69419" ref_url="https://www.suse.com/security/cve/CVE-2025-69419" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1503" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002449.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3042" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002521.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4472" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003283.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4824" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously
crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing
non-ASCII BMP code point can trigger a one byte write before the allocated
buffer.

Impact summary: The out-of-bounds write can cause a memory corruption
which can have various consequences including a Denial of Service.

The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12
BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes,
the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16
source byte count as the destination buffer capacity to UTF8_putc(). For BMP
code points above U+07FF, UTF-8 requires three bytes, but the forwarded
capacity can be just two bytes. UTF8_putc() then returns -1, and this negative
value is added to the output length without validation, causing the
length to become negative. The subsequent trailing NUL byte is then written
at a negative offset, causing write outside of heap allocated buffer.

The vulnerability is reachable via the public PKCS12_get_friendlyname() API
when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a
different code path that avoids this issue, PKCS12_get_friendlyname() directly
invokes the vulnerable function. Exploitation requires an attacker to provide
a malicious PKCS#12 file to be parsed by the application and the attacker
can just trigger a one zero byte write before the allocated buffer.
For that reason the issue was assessed as Low severity according to our
Security Policy.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.

OpenSSL 1.0.2 is not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69419/">CVE-2025-69419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69419">CVE-2025-69419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256836">SUSE bug 1256836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941029" comment="openssl-3-livepatches is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69420</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69420" ref_url="https://www.suse.com/security/cve/CVE-2025-69420" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: A type confusion vulnerability exists in the TimeStamp Response
verification code where an ASN1_TYPE union member is accessed without first
validating the type, causing an invalid or NULL pointer dereference when
processing a malformed TimeStamp Response file.

Impact summary: An application calling TS_RESP_verify_response() with a
malformed TimeStamp Response can be caused to dereference an invalid or
NULL pointer when reading, resulting in a Denial of Service.

The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2()
access the signing cert attribute value without validating its type.
When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory
through the ASN1_TYPE union, causing a crash.

Exploiting this vulnerability requires an attacker to provide a malformed
TimeStamp Response to an application that verifies timestamp responses. The
TimeStamp protocol (RFC 3161) is not widely used and the impact of the
exploit is just a Denial of Service. For these reasons the issue was
assessed as Low severity.

The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the TimeStamp Response implementation is outside the OpenSSL FIPS module
boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.

OpenSSL 1.0.2 is not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-04"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69420/">CVE-2025-69420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69420">CVE-2025-69420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256837">SUSE bug 1256837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941029" comment="openssl-3-livepatches is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69421</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69421" ref_url="https://www.suse.com/security/cve/CVE-2025-69421" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer
dereference in the PKCS12_item_decrypt_d2i_ex() function.

Impact summary: A NULL pointer dereference can trigger a crash which leads to
Denial of Service for an application processing PKCS#12 files.

The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct
parameter is NULL before dereferencing it. When called from
PKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can
be NULL, causing a crash. The vulnerability is limited to Denial of Service
and cannot be escalated to achieve code execution or memory disclosure.

Exploiting this issue requires an attacker to provide a malformed PKCS#12 file
to an application that processes it. For that reason the issue was assessed as
Low severity according to our Security Policy.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-04"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69421/">CVE-2025-69421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69421">CVE-2025-69421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256838">SUSE bug 1256838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941029" comment="openssl-3-livepatches is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20257039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-7039</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-7039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7039" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-7039" ref_url="https://www.suse.com/security/cve/CVE-2025-7039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023743.html" source="SUSE-SU"/>
    <description>
    A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7039/">CVE-2025-7039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7039">CVE-2025-7039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249055">SUSE bug 1249055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037475" comment="gio-branding-SLE-16-160000.2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037198" comment="glib2-tools-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037199" comment="libgio-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037200" comment="libgirepository-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037201" comment="libglib-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037202" comment="libgmodule-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037203" comment="libgobject-2_0-0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037206" comment="typelib-1_0-GLib-2_0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037208" comment="typelib-1_0-GModule-2_0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037209" comment="typelib-1_0-GObject-2_0-2.84.4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037210" comment="typelib-1_0-Gio-2_0-2.84.4-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71064</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71064" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71064" ref_url="https://www.suse.com/security/cve/CVE-2025-71064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: using the num_tqps in the vf driver to apply for resources

Currently, hdev-&gt;htqp is allocated using hdev-&gt;num_tqps, and kinfo-&gt;tqp
is allocated using kinfo-&gt;num_tqps. However, kinfo-&gt;num_tqps is set to
min(new_tqps, hdev-&gt;num_tqps);  Therefore, kinfo-&gt;num_tqps may be smaller
than hdev-&gt;num_tqps, which causes some hdev-&gt;htqp[i] to remain
uninitialized in hclgevf_knic_setup().

Thus, this patch allocates hdev-&gt;htqp and kinfo-&gt;tqp using hdev-&gt;num_tqps,
ensuring that the lengths of hdev-&gt;htqp and kinfo-&gt;tqp are consistent
and that all elements are properly initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71064/">CVE-2025-71064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71064">CVE-2025-71064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256654">SUSE bug 1256654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71065</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71065" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71065" ref_url="https://www.suse.com/security/cve/CVE-2025-71065" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to avoid potential deadlock

As Jiaming Zhang and syzbot reported, there is potential deadlock in
f2fs as below:

Chain exists of:
  &amp;sbi-&gt;cp_rwsem --&gt; fs_reclaim --&gt; sb_internal#2

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  rlock(sb_internal#2);
                               lock(fs_reclaim);
                               lock(sb_internal#2);
  rlock(&amp;sbi-&gt;cp_rwsem);

 *** DEADLOCK ***

3 locks held by kswapd0/73:
 #0: ffffffff8e247a40 (fs_reclaim){+.+.}-{0:0}, at: balance_pgdat mm/vmscan.c:7015 [inline]
 #0: ffffffff8e247a40 (fs_reclaim){+.+.}-{0:0}, at: kswapd+0x951/0x2800 mm/vmscan.c:7389
 #1: ffff8880118400e0 (&amp;type-&gt;s_umount_key#50){.+.+}-{4:4}, at: super_trylock_shared fs/super.c:562 [inline]
 #1: ffff8880118400e0 (&amp;type-&gt;s_umount_key#50){.+.+}-{4:4}, at: super_cache_scan+0x91/0x4b0 fs/super.c:197
 #2: ffff888011840610 (sb_internal#2){.+.+}-{0:0}, at: f2fs_evict_inode+0x8d9/0x1b60 fs/f2fs/inode.c:890

stack backtrace:
CPU: 0 UID: 0 PID: 73 Comm: kswapd0 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_circular_bug+0x2ee/0x310 kernel/locking/lockdep.c:2043
 check_noncircular+0x134/0x160 kernel/locking/lockdep.c:2175
 check_prev_add kernel/locking/lockdep.c:3165 [inline]
 check_prevs_add kernel/locking/lockdep.c:3284 [inline]
 validate_chain+0xb9b/0x2140 kernel/locking/lockdep.c:3908
 __lock_acquire+0xab9/0xd20 kernel/locking/lockdep.c:5237
 lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
 down_read+0x46/0x2e0 kernel/locking/rwsem.c:1537
 f2fs_down_read fs/f2fs/f2fs.h:2278 [inline]
 f2fs_lock_op fs/f2fs/f2fs.h:2357 [inline]
 f2fs_do_truncate_blocks+0x21c/0x10c0 fs/f2fs/file.c:791
 f2fs_truncate_blocks+0x10a/0x300 fs/f2fs/file.c:867
 f2fs_truncate+0x489/0x7c0 fs/f2fs/file.c:925
 f2fs_evict_inode+0x9f2/0x1b60 fs/f2fs/inode.c:897
 evict+0x504/0x9c0 fs/inode.c:810
 f2fs_evict_inode+0x1dc/0x1b60 fs/f2fs/inode.c:853
 evict+0x504/0x9c0 fs/inode.c:810
 dispose_list fs/inode.c:852 [inline]
 prune_icache_sb+0x21b/0x2c0 fs/inode.c:1000
 super_cache_scan+0x39b/0x4b0 fs/super.c:224
 do_shrink_slab+0x6ef/0x1110 mm/shrinker.c:437
 shrink_slab_memcg mm/shrinker.c:550 [inline]
 shrink_slab+0x7ef/0x10d0 mm/shrinker.c:628
 shrink_one+0x28a/0x7c0 mm/vmscan.c:4955
 shrink_many mm/vmscan.c:5016 [inline]
 lru_gen_shrink_node mm/vmscan.c:5094 [inline]
 shrink_node+0x315d/0x3780 mm/vmscan.c:6081
 kswapd_shrink_node mm/vmscan.c:6941 [inline]
 balance_pgdat mm/vmscan.c:7124 [inline]
 kswapd+0x147c/0x2800 mm/vmscan.c:7389
 kthread+0x70e/0x8a0 kernel/kthread.c:463
 ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

The root cause is deadlock among four locks as below:

kswapd
- fs_reclaim				--- Lock A
 - shrink_one
  - evict
   - f2fs_evict_inode
    - sb_start_intwrite			--- Lock B

- iput
 - evict
  - f2fs_evict_inode
   - sb_start_intwrite			--- Lock B
   - f2fs_truncate
    - f2fs_truncate_blocks
     - f2fs_do_truncate_blocks
      - f2fs_lock_op			--- Lock C

ioctl
- f2fs_ioc_commit_atomic_write
 - f2fs_lock_op				--- Lock C
  - __f2fs_commit_atomic_write
   - __replace_atomic_write_block
    - f2fs_get_dnode_of_data
     - __get_node_folio
      - f2fs_check_nid_range
       - f2fs_handle_error
        - f2fs_record_errors
         - f2fs_down_write		--- Lock D

open
- do_open
 - do_truncate
  - security_inode_need_killpriv
   - f2fs_getxattr
    - lookup_all_xattrs
     - f2fs_handle_error
      - f2fs_record_errors
       - f2fs_down_write		--- Lock D
        - f2fs_commit_super
         - read_mapping_folio
          - filemap_alloc_folio_noprof
           - prepare_alloc_pages
            - fs_reclaim_acquire	--- Lock A

In order to a
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71065/">CVE-2025-71065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71065">CVE-2025-71065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256657">SUSE bug 1256657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71066</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71066" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71066" ref_url="https://www.suse.com/security/cve/CVE-2025-71066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change

zdi-disclosures@trendmicro.com says:

The vulnerability is a race condition between `ets_qdisc_dequeue` and
`ets_qdisc_change`.  It leads to UAF on `struct Qdisc` object.
Attacker requires the capability to create new user and network namespace
in order to trigger the bug.
See my additional commentary at the end of the analysis.

Analysis:

static int ets_qdisc_change(struct Qdisc *sch, struct nlattr *opt,
                          struct netlink_ext_ack *extack)
{
...

      // (1) this lock is preventing .change handler (`ets_qdisc_change`)
      //to race with .dequeue handler (`ets_qdisc_dequeue`)
      sch_tree_lock(sch);

      for (i = nbands; i &lt; oldbands; i++) {
              if (i &gt;= q-&gt;nstrict &amp;&amp; q-&gt;classes[i].qdisc-&gt;q.qlen)
                      list_del_init(&amp;q-&gt;classes[i].alist);
              qdisc_purge_queue(q-&gt;classes[i].qdisc);
      }

      WRITE_ONCE(q-&gt;nbands, nbands);
      for (i = nstrict; i &lt; q-&gt;nstrict; i++) {
              if (q-&gt;classes[i].qdisc-&gt;q.qlen) {
		      // (2) the class is added to the q-&gt;active
                      list_add_tail(&amp;q-&gt;classes[i].alist, &amp;q-&gt;active);
                      q-&gt;classes[i].deficit = quanta[i];
              }
      }
      WRITE_ONCE(q-&gt;nstrict, nstrict);
      memcpy(q-&gt;prio2band, priomap, sizeof(priomap));

      for (i = 0; i &lt; q-&gt;nbands; i++)
              WRITE_ONCE(q-&gt;classes[i].quantum, quanta[i]);

      for (i = oldbands; i &lt; q-&gt;nbands; i++) {
              q-&gt;classes[i].qdisc = queues[i];
              if (q-&gt;classes[i].qdisc != &amp;noop_qdisc)
                      qdisc_hash_add(q-&gt;classes[i].qdisc, true);
      }

      // (3) the qdisc is unlocked, now dequeue can be called in parallel
      // to the rest of .change handler
      sch_tree_unlock(sch);

      ets_offload_change(sch);
      for (i = q-&gt;nbands; i &lt; oldbands; i++) {
	      // (4) we're reducing the refcount for our class's qdisc and
	      //  freeing it
              qdisc_put(q-&gt;classes[i].qdisc);
	      // (5) If we call .dequeue between (4) and (5), we will have
	      // a strong UAF and we can control RIP
              q-&gt;classes[i].qdisc = NULL;
              WRITE_ONCE(q-&gt;classes[i].quantum, 0);
              q-&gt;classes[i].deficit = 0;
              gnet_stats_basic_sync_init(&amp;q-&gt;classes[i].bstats);
              memset(&amp;q-&gt;classes[i].qstats, 0, sizeof(q-&gt;classes[i].qstats));
      }
      return 0;
}

Comment:
This happens because some of the classes have their qdiscs assigned to
NULL, but remain in the active list. This commit fixes this issue by always
removing the class from the active list before deleting and freeing its
associated qdisc

Reproducer Steps
(trimmed version of what was sent by zdi-disclosures@trendmicro.com)

```
DEV="${DEV:-lo}"
ROOT_HANDLE="${ROOT_HANDLE:-1:}"
BAND2_HANDLE="${BAND2_HANDLE:-20:}"   # child under 1:2
PING_BYTES="${PING_BYTES:-48}"
PING_COUNT="${PING_COUNT:-200000}"
PING_DST="${PING_DST:-127.0.0.1}"

SLOW_TBF_RATE="${SLOW_TBF_RATE:-8bit}"
SLOW_TBF_BURST="${SLOW_TBF_BURST:-100b}"
SLOW_TBF_LAT="${SLOW_TBF_LAT:-1s}"

cleanup() {
  tc qdisc del dev "$DEV" root 2&gt;/dev/null
}
trap cleanup EXIT

ip link set "$DEV" up

tc qdisc del dev "$DEV" root 2&gt;/dev/null || true

tc qdisc add dev "$DEV" root handle "$ROOT_HANDLE" ets bands 2 strict 2

tc qdisc add dev "$DEV" parent 1:2 handle "$BAND2_HANDLE" \
  tbf rate "$SLOW_TBF_RATE" burst "$SLOW_TBF_BURST" latency "$SLOW_TBF_LAT"

tc filter add dev "$DEV" parent 1: protocol all prio 1 u32 match u32 0 0 flowid 1:2
tc -s qdisc ls dev $DEV

ping -I "$DEV" -f -c "$PING_COUNT" -s "$PING_BYTES" -W 0.001 "$PING_DST" \
  &gt;/dev/null 2&gt;&amp;1 &amp;
tc qdisc change dev "$DEV" root handle "$ROOT_HANDLE" ets bands 2 strict 0
tc qdisc change dev "$DEV" root handle "$ROOT_HANDLE" ets bands 2 strict 2
tc -s qdisc ls dev $DEV
tc qdisc del dev "$DEV" parent 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-71066/">CVE-2025-71066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71066">CVE-2025-71066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256645">SUSE bug 1256645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258005">SUSE bug 1258005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71067</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71067" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71067" ref_url="https://www.suse.com/security/cve/CVE-2025-71067" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ntfs: set dummy blocksize to read boot_block when mounting

When mounting, sb-&gt;s_blocksize is used to read the boot_block without
being defined or validated. Set a dummy blocksize before attempting to
read the boot_block.

The issue can be triggered with the following syz reproducer:

  mkdirat(0xffffffffffffff9c, &amp;(0x7f0000000080)='./file1\x00', 0x0)
  r4 = openat$nullb(0xffffffffffffff9c, &amp;(0x7f0000000040), 0x121403, 0x0)
  ioctl$FS_IOC_SETFLAGS(r4, 0x40081271, &amp;(0x7f0000000980)=0x4000)
  mount(&amp;(0x7f0000000140)=@nullb, &amp;(0x7f0000000040)='./cgroup\x00',
        &amp;(0x7f0000000000)='ntfs3\x00', 0x2208004, 0x0)
  syz_clone(0x88200200, 0x0, 0x0, 0x0, 0x0, 0x0)

Here, the ioctl sets the bdev block size to 16384. During mount,
get_tree_bdev_flags() calls sb_set_blocksize(sb, block_size(bdev)),
but since block_size(bdev) &gt; PAGE_SIZE, sb_set_blocksize() leaves
sb-&gt;s_blocksize at zero.

Later, ntfs_init_from_boot() attempts to read the boot_block while
sb-&gt;s_blocksize is still zero, which triggers the bug.

[almaz.alexandrovich@paragon-software.com: changed comment style, added
return value handling]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71067/">CVE-2025-71067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71067">CVE-2025-71067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256642">SUSE bug 1256642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71069</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71069" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71069" ref_url="https://www.suse.com/security/cve/CVE-2025-71069" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: invalidate dentry cache on failed whiteout creation

F2FS can mount filesystems with corrupted directory depth values that
get runtime-clamped to MAX_DIR_HASH_DEPTH. When RENAME_WHITEOUT
operations are performed on such directories, f2fs_rename performs
directory modifications (updating target entry and deleting source
entry) before attempting to add the whiteout entry via f2fs_add_link.

If f2fs_add_link fails due to the corrupted directory structure, the
function returns an error to VFS, but the partial directory
modifications have already been committed to disk. VFS assumes the
entire rename operation failed and does not update the dentry cache,
leaving stale mappings.

In the error path, VFS does not call d_move() to update the dentry
cache. This results in new_dentry still pointing to the old inode
(new_inode) which has already had its i_nlink decremented to zero.
The stale cache causes subsequent operations to incorrectly reference
the freed inode.

This causes subsequent operations to use cached dentry information that
no longer matches the on-disk state. When a second rename targets the
same entry, VFS attempts to decrement i_nlink on the stale inode, which
may already have i_nlink=0, triggering a WARNING in drop_nlink().

Example sequence:
1. First rename (RENAME_WHITEOUT): file2 -&gt; file1
   - f2fs updates file1 entry on disk (points to inode 8)
   - f2fs deletes file2 entry on disk
   - f2fs_add_link(whiteout) fails (corrupted directory)
   - Returns error to VFS
   - VFS does not call d_move() due to error
   - VFS cache still has: file1 -&gt; inode 7 (stale!)
   - inode 7 has i_nlink=0 (already decremented)

2. Second rename: file3 -&gt; file1
   - VFS uses stale cache: file1 -&gt; inode 7
   - Tries to drop_nlink on inode 7 (i_nlink already 0)
   - WARNING in drop_nlink()

Fix this by explicitly invalidating old_dentry and new_dentry when
f2fs_add_link fails during whiteout creation. This forces VFS to
refresh from disk on subsequent operations, ensuring cache consistency
even when the rename partially succeeds.

Reproducer:
1. Mount F2FS image with corrupted i_current_depth
2. renameat2(file2, file1, RENAME_WHITEOUT)
3. renameat2(file3, file1, 0)
4. System triggers WARNING in drop_nlink()
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71069/">CVE-2025-71069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71069">CVE-2025-71069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256635">SUSE bug 1256635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71070</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71070" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71070" ref_url="https://www.suse.com/security/cve/CVE-2025-71070" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ublk: clean up user copy references on ublk server exit

If a ublk server process releases a ublk char device file, any requests
dispatched to the ublk server but not yet completed will retain a ref
value of UBLK_REFCOUNT_INIT. Before commit e63d2228ef83 ("ublk: simplify
aborting ublk request"), __ublk_fail_req() would decrement the reference
count before completing the failed request. However, that commit
optimized __ublk_fail_req() to call __ublk_complete_rq() directly
without decrementing the request reference count.
The leaked reference count incorrectly allows user copy and zero copy
operations on the completed ublk request. It also triggers the
WARN_ON_ONCE(refcount_read(&amp;io-&gt;ref)) warnings in ublk_queue_reinit()
and ublk_deinit_queue().
Commit c5c5eb24ed61 ("ublk: avoid ublk_io_release() called after ublk
char dev is closed") already fixed the issue for ublk devices using
UBLK_F_SUPPORT_ZERO_COPY or UBLK_F_AUTO_BUF_REG. However, the reference
count leak also affects UBLK_F_USER_COPY, the other reference-counted
data copy mode. Fix the condition in ublk_check_and_reset_active_ref()
to include all reference-counted data copy modes. This ensures that any
ublk requests still owned by the ublk server when it exits have their
reference counts reset to 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71070/">CVE-2025-71070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71070">CVE-2025-71070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256633">SUSE bug 1256633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71071</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71071" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71071" ref_url="https://www.suse.com/security/cve/CVE-2025-71071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/mediatek: fix use-after-free on probe deferral

The driver is dropping the references taken to the larb devices during
probe after successful lookup as well as on errors. This can
potentially lead to a use-after-free in case a larb device has not yet
been bound to its driver so that the iommu driver probe defers.

Fix this by keeping the references as expected while the iommu driver is
bound.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-71071/">CVE-2025-71071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71071">CVE-2025-71071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256802">SUSE bug 1256802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71073</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71073" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71073" ref_url="https://www.suse.com/security/cve/CVE-2025-71073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: lkkbd - disable pending work before freeing device

lkkbd_interrupt() schedules lk-&gt;tq via schedule_work(), and the work
handler lkkbd_reinit() dereferences the lkkbd structure and its
serio/input_dev fields.

lkkbd_disconnect() and error paths in lkkbd_connect() free the lkkbd
structure without preventing the reinit work from being queued again
until serio_close() returns. This can allow the work handler to run
after the structure has been freed, leading to a potential use-after-free.

Use disable_work_sync() instead of cancel_work_sync() to ensure the
reinit work cannot be re-queued, and call it both in lkkbd_disconnect()
and in lkkbd_connect() error paths after serio_open().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71073/">CVE-2025-71073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71073">CVE-2025-71073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256632">SUSE bug 1256632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71076</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71076" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71076" ref_url="https://www.suse.com/security/cve/CVE-2025-71076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/oa: Limit num_syncs to prevent oversized allocations

The OA open parameters did not validate num_syncs, allowing
userspace to pass arbitrarily large values, potentially
leading to excessive allocations.

Add check to ensure that num_syncs does not exceed DRM_XE_MAX_SYNCS,
returning -EINVAL when the limit is violated.

v2: use XE_IOCTL_DBG() and drop duplicated check. (Ashutosh)

(cherry picked from commit e057b2d2b8d815df3858a87dffafa2af37e5945b)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71076/">CVE-2025-71076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71076">CVE-2025-71076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256627">SUSE bug 1256627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71077</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71077" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71077" ref_url="https://www.suse.com/security/cve/CVE-2025-71077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: Cap the number of PCR banks

tpm2_get_pcr_allocation() does not cap any upper limit for the number of
banks. Cap the limit to eight banks so that out of bounds values coming
from external I/O cause on only limited harm.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71077/">CVE-2025-71077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71077">CVE-2025-71077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256613">SUSE bug 1256613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71078</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71078" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71078" ref_url="https://www.suse.com/security/cve/CVE-2025-71078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/64s/slb: Fix SLB multihit issue during SLB preload

On systems using the hash MMU, there is a software SLB preload cache that
mirrors the entries loaded into the hardware SLB buffer. This preload
cache is subject to periodic eviction - typically after every 256 context
switches - to remove old entry.

To optimize performance, the kernel skips switch_mmu_context() in
switch_mm_irqs_off() when the prev and next mm_struct are the same.
However, on hash MMU systems, this can lead to inconsistencies between
the hardware SLB and the software preload cache.

If an SLB entry for a process is evicted from the software cache on one
CPU, and the same process later runs on another CPU without executing
switch_mmu_context(), the hardware SLB may retain stale entries. If the
kernel then attempts to reload that entry, it can trigger an SLB
multi-hit error.

The following timeline shows how stale SLB entries are created and can
cause a multi-hit error when a process moves between CPUs without a
MMU context switch.

CPU 0                                   CPU 1
-----                                    -----
Process P
exec                                    swapper/1
 load_elf_binary
  begin_new_exc
    activate_mm
     switch_mm_irqs_off
      switch_mmu_context
       switch_slb
       /*
        * This invalidates all
        * the entries in the HW
        * and setup the new HW
        * SLB entries as per the
        * preload cache.
        */
context_switch
sched_migrate_task migrates process P to cpu-1

Process swapper/0                       context switch (to process P)
(uses mm_struct of Process P)           switch_mm_irqs_off()
                                         switch_slb
                                           load_slb++
                                            /*
                                            * load_slb becomes 0 here
                                            * and we evict an entry from
                                            * the preload cache with
                                            * preload_age(). We still
                                            * keep HW SLB and preload
                                            * cache in sync, that is
                                            * because all HW SLB entries
                                            * anyways gets evicted in
                                            * switch_slb during SLBIA.
                                            * We then only add those
                                            * entries back in HW SLB,
                                            * which are currently
                                            * present in preload_cache
                                            * (after eviction).
                                            */
                                        load_elf_binary continues...
                                         setup_new_exec()
                                          slb_setup_new_exec()

                                        sched_switch event
                                        sched_migrate_task migrates
                                        process P to cpu-0

context_switch from swapper/0 to Process P
 switch_mm_irqs_off()
  /*
   * Since both prev and next mm struct are same we don't call
   * switch_mmu_context(). This will cause the HW SLB and SW preload
   * cache to go out of sync in preload_new_slb_context. Because there
   * was an SLB entry which was evicted from both HW and preload cache
   * on cpu-1. Now later in preload_new_slb_context(), when we will try
   * to add the same preload entry again, we will add this to the SW
   * preload cache and then will add it to the HW SLB. Since on cpu-0
   * this entry was never invalidated, hence adding this entry to the HW
   * SLB will cause a SLB multi-hit error.
   */
load_elf_binary cont
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71078/">CVE-2025-71078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71078">CVE-2025-71078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256616">SUSE bug 1256616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71079</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71079" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71079" ref_url="https://www.suse.com/security/cve/CVE-2025-71079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write

A deadlock can occur between nfc_unregister_device() and rfkill_fop_write()
due to lock ordering inversion between device_lock and rfkill_global_mutex.

The problematic lock order is:

Thread A (rfkill_fop_write):
  rfkill_fop_write()
    mutex_lock(&amp;rfkill_global_mutex)
      rfkill_set_block()
        nfc_rfkill_set_block()
          nfc_dev_down()
            device_lock(&amp;dev-&gt;dev)    &lt;- waits for device_lock

Thread B (nfc_unregister_device):
  nfc_unregister_device()
    device_lock(&amp;dev-&gt;dev)
      rfkill_unregister()
        mutex_lock(&amp;rfkill_global_mutex)  &lt;- waits for rfkill_global_mutex

This creates a classic ABBA deadlock scenario.

Fix this by moving rfkill_unregister() and rfkill_destroy() outside the
device_lock critical section. Store the rfkill pointer in a local variable
before releasing the lock, then call rfkill_unregister() after releasing
device_lock.

This change is safe because rfkill_fop_write() holds rfkill_global_mutex
while calling the rfkill callbacks, and rfkill_unregister() also acquires
rfkill_global_mutex before cleanup. Therefore, rfkill_unregister() will
wait for any ongoing callback to complete before proceeding, and
device_del() is only called after rfkill_unregister() returns, preventing
any use-after-free.

The similar lock ordering in nfc_register_device() (device_lock -&gt;
rfkill_global_mutex via rfkill_register) is safe because during
registration the device is not yet in rfkill_list, so no concurrent
rfkill operations can occur on this device.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71079/">CVE-2025-71079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71079">CVE-2025-71079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256619">SUSE bug 1256619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71080</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71080" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71080" ref_url="https://www.suse.com/security/cve/CVE-2025-71080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT

On PREEMPT_RT kernels, after rt6_get_pcpu_route() returns NULL, the
current task can be preempted. Another task running on the same CPU
may then execute rt6_make_pcpu_route() and successfully install a
pcpu_rt entry. When the first task resumes execution, its cmpxchg()
in rt6_make_pcpu_route() will fail because rt6i_pcpu is no longer
NULL, triggering the BUG_ON(prev). It's easy to reproduce it by adding
mdelay() after rt6_get_pcpu_route().

Using preempt_disable/enable is not appropriate here because
ip6_rt_pcpu_alloc() may sleep.

Fix this by handling the cmpxchg() failure gracefully on PREEMPT_RT:
free our allocation and return the existing pcpu_rt installed by
another task. The BUG_ON is replaced by WARN_ON_ONCE for non-PREEMPT_RT
kernels where such races should not occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71080/">CVE-2025-71080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71080">CVE-2025-71080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256608">SUSE bug 1256608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71081</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71081" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71081" ref_url="https://www.suse.com/security/cve/CVE-2025-71081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: stm32: sai: fix OF node leak on probe

The reference taken to the sync provider OF node when probing the
platform device is currently only dropped if the set_sync() callback
fails during DAI probe.

Make sure to drop the reference on platform probe failures (e.g. probe
deferral) and on driver unbind.

This also avoids a potential use-after-free in case the DAI is ever
reprobed without first rebinding the platform driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71081/">CVE-2025-71081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71081">CVE-2025-71081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256609">SUSE bug 1256609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71082</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71082" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71082" ref_url="https://www.suse.com/security/cve/CVE-2025-71082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btusb: revert use of devm_kzalloc in btusb

This reverts commit 98921dbd00c4e ("Bluetooth: Use devm_kzalloc in
btusb.c file").

In btusb_probe(), we use devm_kzalloc() to allocate the btusb data. This
ties the lifetime of all the btusb data to the binding of a driver to
one interface, INTF. In a driver that binds to other interfaces, ISOC
and DIAG, this is an accident waiting to happen.

The issue is revealed in btusb_disconnect(), where calling
usb_driver_release_interface(&amp;btusb_driver, data-&gt;intf) will have devm
free the data that is also being used by the other interfaces of the
driver that may not be released yet.

To fix this, revert the use of devm and go back to freeing memory
explicitly.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71082/">CVE-2025-71082 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71082">CVE-2025-71082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256611">SUSE bug 1256611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71083</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71083" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71083" ref_url="https://www.suse.com/security/cve/CVE-2025-71083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/ttm: Avoid NULL pointer deref for evicted BOs

It is possible for a BO to exist that is not currently associated with a
resource, e.g. because it has been evicted.

When devcoredump tries to read the contents of all BOs for dumping, we need
to expect this as well -- in this case, ENODATA is recorded instead of the
buffer contents.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71083/">CVE-2025-71083 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71083">CVE-2025-71083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256610">SUSE bug 1256610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71084</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71084" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71084" ref_url="https://www.suse.com/security/cve/CVE-2025-71084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/cm: Fix leaking the multicast GID table reference

If the CM ID is destroyed while the CM event for multicast creating is
still queued the cancel_work_sync() will prevent the work from running
which also prevents destroying the ah_attr. This leaks a refcount and
triggers a WARN:

   GID entry ref leak for dev syz1 index 2 ref=573
   WARNING: CPU: 1 PID: 655 at drivers/infiniband/core/cache.c:809 release_gid_table drivers/infiniband/core/cache.c:806 [inline]
   WARNING: CPU: 1 PID: 655 at drivers/infiniband/core/cache.c:809 gid_table_release_one+0x284/0x3cc drivers/infiniband/core/cache.c:886

Destroy the ah_attr after canceling the work, it is safe to call this
twice.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71084/">CVE-2025-71084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71084">CVE-2025-71084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256622">SUSE bug 1256622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71085</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71085" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71085" ref_url="https://www.suse.com/security/cve/CVE-2025-71085" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3488" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003199.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3963" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20887-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20888-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20889-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20891-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20893-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20895-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20896-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()

There exists a kernel oops caused by a BUG_ON(nhead &lt; 0) at
net/core/skbuff.c:2232 in pskb_expand_head().
This bug is triggered as part of the calipso_skbuff_setattr()
routine when skb_cow() is passed headroom &gt; INT_MAX
(i.e. (int)(skb_headroom(skb) + len_delta) &lt; 0).

The root cause of the bug is due to an implicit integer cast in
__skb_cow(). The check (headroom &gt; skb_headroom(skb)) is meant to ensure
that delta = headroom - skb_headroom(skb) is never negative, otherwise
we will trigger a BUG_ON in pskb_expand_head(). However, if
headroom &gt; INT_MAX and delta &lt;= -NET_SKB_PAD, the check passes, delta
becomes negative, and pskb_expand_head() is passed a negative value for
nhead.

Fix the trigger condition in calipso_skbuff_setattr(). Avoid passing
"negative" headroom sizes to skb_cow() within calipso_skbuff_setattr()
by only using skb_cow() to grow headroom.

PoC:
	Using `netlabelctl` tool:

        netlabelctl map del default
        netlabelctl calipso add pass doi:7
        netlabelctl map add default address:0::1/128 protocol:calipso,7

        Then run the following PoC:

        int fd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP);

        // setup msghdr
        int cmsg_size = 2;
        int cmsg_len = 0x60;
        struct msghdr msg;
        struct sockaddr_in6 dest_addr;
        struct cmsghdr * cmsg = (struct cmsghdr *) calloc(1,
                        sizeof(struct cmsghdr) + cmsg_len);
        msg.msg_name = &amp;dest_addr;
        msg.msg_namelen = sizeof(dest_addr);
        msg.msg_iov = NULL;
        msg.msg_iovlen = 0;
        msg.msg_control = cmsg;
        msg.msg_controllen = cmsg_len;
        msg.msg_flags = 0;

        // setup sockaddr
        dest_addr.sin6_family = AF_INET6;
        dest_addr.sin6_port = htons(31337);
        dest_addr.sin6_flowinfo = htonl(31337);
        dest_addr.sin6_addr = in6addr_loopback;
        dest_addr.sin6_scope_id = 31337;

        // setup cmsghdr
        cmsg-&gt;cmsg_len = cmsg_len;
        cmsg-&gt;cmsg_level = IPPROTO_IPV6;
        cmsg-&gt;cmsg_type = IPV6_HOPOPTS;
        char * hop_hdr = (char *)cmsg + sizeof(struct cmsghdr);
        hop_hdr[1] = 0x9; //set hop size - (0x9 + 1) * 8 = 80

        sendmsg(fd, &amp;msg, 0);
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71085/">CVE-2025-71085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71085">CVE-2025-71085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256623">SUSE bug 1256623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256624">SUSE bug 1256624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052000" comment="kernel-livepatch-6_12_0-160000_5-default-8-160000.4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051986" comment="kernel-livepatch-6_12_0-160000_5-rt-6-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052001" comment="kernel-livepatch-6_12_0-160000_6-default-6-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051990" comment="kernel-livepatch-6_12_0-160000_6-rt-5-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052002" comment="kernel-livepatch-6_12_0-160000_7-default-4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051985" comment="kernel-livepatch-6_12_0-160000_7-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051998" comment="kernel-livepatch-6_12_0-160000_8-default-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051984" comment="kernel-livepatch-6_12_0-160000_8-rt-2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051997" comment="kernel-livepatch-6_12_0-160000_9-default-2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051989" comment="kernel-livepatch-6_12_0-160000_9-rt-2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71086</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71086" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71086" ref_url="https://www.suse.com/security/cve/CVE-2025-71086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: rose: fix invalid array index in rose_kill_by_device()

rose_kill_by_device() collects sockets into a local array[] and then
iterates over them to disconnect sockets bound to a device being brought
down.

The loop mistakenly indexes array[cnt] instead of array[i]. For cnt &lt;
ARRAY_SIZE(array), this reads an uninitialized entry; for cnt ==
ARRAY_SIZE(array), it is an out-of-bounds read. Either case can lead to
an invalid socket pointer dereference and also leaks references taken
via sock_hold().

Fix the index to use i.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71086/">CVE-2025-71086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71086">CVE-2025-71086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256625">SUSE bug 1256625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71087</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71087" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71087" ref_url="https://www.suse.com/security/cve/CVE-2025-71087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: fix off-by-one issues in iavf_config_rss_reg()

There are off-by-one bugs when configuring RSS hash key and lookup
table, causing out-of-bounds reads to memory [1] and out-of-bounds
writes to device registers.

Before commit 43a3d9ba34c9 ("i40evf: Allow PF driver to configure RSS"),
the loop upper bounds were:
    i &lt;= I40E_VFQF_{HKEY,HLUT}_MAX_INDEX
which is safe since the value is the last valid index.

That commit changed the bounds to:
    i &lt;= adapter-&gt;rss_{key,lut}_size / 4
where `rss_{key,lut}_size / 4` is the number of dwords, so the last
valid index is `(rss_{key,lut}_size / 4) - 1`. Therefore, using `&lt;=`
accesses one element past the end.

Fix the issues by using `&lt;` instead of `&lt;=`, ensuring we do not exceed
the bounds.

[1] KASAN splat about rss_key_size off-by-one
  BUG: KASAN: slab-out-of-bounds in iavf_config_rss+0x619/0x800
  Read of size 4 at addr ffff888102c50134 by task kworker/u8:6/63

  CPU: 0 UID: 0 PID: 63 Comm: kworker/u8:6 Not tainted 6.18.0-rc2-enjuk-tnguy-00378-g3005f5b77652-dirty #156 PREEMPT(voluntary)
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
  Workqueue: iavf iavf_watchdog_task
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x6f/0xb0
   print_report+0x170/0x4f3
   kasan_report+0xe1/0x1a0
   iavf_config_rss+0x619/0x800
   iavf_watchdog_task+0x2be7/0x3230
   process_one_work+0x7fd/0x1420
   worker_thread+0x4d1/0xd40
   kthread+0x344/0x660
   ret_from_fork+0x249/0x320
   ret_from_fork_asm+0x1a/0x30
   &lt;/TASK&gt;

  Allocated by task 63:
   kasan_save_stack+0x30/0x50
   kasan_save_track+0x14/0x30
   __kasan_kmalloc+0x7f/0x90
   __kmalloc_noprof+0x246/0x6f0
   iavf_watchdog_task+0x28fc/0x3230
   process_one_work+0x7fd/0x1420
   worker_thread+0x4d1/0xd40
   kthread+0x344/0x660
   ret_from_fork+0x249/0x320
   ret_from_fork_asm+0x1a/0x30

  The buggy address belongs to the object at ffff888102c50100
   which belongs to the cache kmalloc-64 of size 64
  The buggy address is located 0 bytes to the right of
   allocated 52-byte region [ffff888102c50100, ffff888102c50134)

  The buggy address belongs to the physical page:
  page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c50
  flags: 0x200000000000000(node=0|zone=2)
  page_type: f5(slab)
  raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
  raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
  page dumped because: kasan: bad access detected

  Memory state around the buggy address:
   ffff888102c50000: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc
   ffff888102c50080: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc
  &gt;ffff888102c50100: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc
                                       ^
   ffff888102c50180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
   ffff888102c50200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71087/">CVE-2025-71087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71087">CVE-2025-71087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256628">SUSE bug 1256628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71088</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71088" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71088" ref_url="https://www.suse.com/security/cve/CVE-2025-71088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fallback earlier on simult connection

Syzkaller reports a simult-connect race leading to inconsistent fallback
status:

  WARNING: CPU: 3 PID: 33 at net/mptcp/subflow.c:1515 subflow_data_ready+0x40b/0x7c0 net/mptcp/subflow.c:1515
  Modules linked in:
  CPU: 3 UID: 0 PID: 33 Comm: ksoftirqd/3 Not tainted syzkaller #0 PREEMPT(full)
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
  RIP: 0010:subflow_data_ready+0x40b/0x7c0 net/mptcp/subflow.c:1515
  Code: 89 ee e8 78 61 3c f6 40 84 ed 75 21 e8 8e 66 3c f6 44 89 fe bf 07 00 00 00 e8 c1 61 3c f6 41 83 ff 07 74 09 e8 76 66 3c f6 90 &lt;0f&gt; 0b 90 e8 6d 66 3c f6 48 89 df e8 e5 ad ff ff 31 ff 89 c5 89 c6
  RSP: 0018:ffffc900006cf338 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: ffff888031acd100 RCX: ffffffff8b7f2abf
  RDX: ffff88801e6ea440 RSI: ffffffff8b7f2aca RDI: 0000000000000005
  RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000007
  R10: 0000000000000004 R11: 0000000000002c10 R12: ffff88802ba69900
  R13: 1ffff920000d9e67 R14: ffff888046f81800 R15: 0000000000000004
  FS:  0000000000000000(0000) GS:ffff8880d69bc000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000560fc0ca1670 CR3: 0000000032c3a000 CR4: 0000000000352ef0
  Call Trace:
   &lt;TASK&gt;
   tcp_data_queue+0x13b0/0x4f90 net/ipv4/tcp_input.c:5197
   tcp_rcv_state_process+0xfdf/0x4ec0 net/ipv4/tcp_input.c:6922
   tcp_v6_do_rcv+0x492/0x1740 net/ipv6/tcp_ipv6.c:1672
   tcp_v6_rcv+0x2976/0x41e0 net/ipv6/tcp_ipv6.c:1918
   ip6_protocol_deliver_rcu+0x188/0x1520 net/ipv6/ip6_input.c:438
   ip6_input_finish+0x1e4/0x4b0 net/ipv6/ip6_input.c:489
   NF_HOOK include/linux/netfilter.h:318 [inline]
   NF_HOOK include/linux/netfilter.h:312 [inline]
   ip6_input+0x105/0x2f0 net/ipv6/ip6_input.c:500
   dst_input include/net/dst.h:471 [inline]
   ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]
   NF_HOOK include/linux/netfilter.h:318 [inline]
   NF_HOOK include/linux/netfilter.h:312 [inline]
   ipv6_rcv+0x264/0x650 net/ipv6/ip6_input.c:311
   __netif_receive_skb_one_core+0x12d/0x1e0 net/core/dev.c:5979
   __netif_receive_skb+0x1d/0x160 net/core/dev.c:6092
   process_backlog+0x442/0x15e0 net/core/dev.c:6444
   __napi_poll.constprop.0+0xba/0x550 net/core/dev.c:7494
   napi_poll net/core/dev.c:7557 [inline]
   net_rx_action+0xa9f/0xfe0 net/core/dev.c:7684
   handle_softirqs+0x216/0x8e0 kernel/softirq.c:579
   run_ksoftirqd kernel/softirq.c:968 [inline]
   run_ksoftirqd+0x3a/0x60 kernel/softirq.c:960
   smpboot_thread_fn+0x3f7/0xae0 kernel/smpboot.c:160
   kthread+0x3c2/0x780 kernel/kthread.c:463
   ret_from_fork+0x5d7/0x6f0 arch/x86/kernel/process.c:148
   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
   &lt;/TASK&gt;

The TCP subflow can process the simult-connect syn-ack packet after
transitioning to TCP_FIN1 state, bypassing the MPTCP fallback check,
as the sk_state_change() callback is not invoked for * -&gt; FIN_WAIT1
transitions.

That will move the msk socket to an inconsistent status and the next
incoming data will hit the reported splat.

Close the race moving the simult-fallback check at the earliest possible
stage - that is at syn-ack generation time.

About the fixes tags: [2] was supposed to also fix this issue introduced
by [3]. [1] is required as a dependence: it was not explicitly marked as
a fix, but it is one and it has already been backported before [3]. In
other words, this commit should be backported up to [3], including [2]
and [1] if that's not already there.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71088/">CVE-2025-71088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71088">CVE-2025-71088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256630">SUSE bug 1256630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71089</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71089" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71089" ref_url="https://www.suse.com/security/cve/CVE-2025-71089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu: disable SVA when CONFIG_X86 is set

Patch series "Fix stale IOTLB entries for kernel address space", v7.

This proposes a fix for a security vulnerability related to IOMMU Shared
Virtual Addressing (SVA).  In an SVA context, an IOMMU can cache kernel
page table entries.  When a kernel page table page is freed and
reallocated for another purpose, the IOMMU might still hold stale,
incorrect entries.  This can be exploited to cause a use-after-free or
write-after-free condition, potentially leading to privilege escalation or
data corruption.

This solution introduces a deferred freeing mechanism for kernel page
table pages, which provides a safe window to notify the IOMMU to
invalidate its caches before the page is reused.


This patch (of 8):

In the IOMMU Shared Virtual Addressing (SVA) context, the IOMMU hardware
shares and walks the CPU's page tables.  The x86 architecture maps the
kernel's virtual address space into the upper portion of every process's
page table.  Consequently, in an SVA context, the IOMMU hardware can walk
and cache kernel page table entries.

The Linux kernel currently lacks a notification mechanism for kernel page
table changes, specifically when page table pages are freed and reused. 
The IOMMU driver is only notified of changes to user virtual address
mappings.  This can cause the IOMMU's internal caches to retain stale
entries for kernel VA.

Use-After-Free (UAF) and Write-After-Free (WAF) conditions arise when
kernel page table pages are freed and later reallocated.  The IOMMU could
misinterpret the new data as valid page table entries.  The IOMMU might
then walk into attacker-controlled memory, leading to arbitrary physical
memory DMA access or privilege escalation.  This is also a
Write-After-Free issue, as the IOMMU will potentially continue to write
Accessed and Dirty bits to the freed memory while attempting to walk the
stale page tables.

Currently, SVA contexts are unprivileged and cannot access kernel
mappings.  However, the IOMMU will still walk kernel-only page tables all
the way down to the leaf entries, where it realizes the mapping is for the
kernel and errors out.  This means the IOMMU still caches these
intermediate page table entries, making the described vulnerability a real
concern.

Disable SVA on x86 architecture until the IOMMU can receive notification
to flush the paging cache before freeing the CPU kernel page table pages.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71089/">CVE-2025-71089 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71089">CVE-2025-71089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256612">SUSE bug 1256612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256615">SUSE bug 1256615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71090</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71090" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71090" ref_url="https://www.suse.com/security/cve/CVE-2025-71090" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix nfsd_file reference leak in nfsd4_add_rdaccess_to_wrdeleg()

nfsd4_add_rdaccess_to_wrdeleg() unconditionally overwrites
fp-&gt;fi_fds[O_RDONLY] with a newly acquired nfsd_file. However, if
the client already has a SHARE_ACCESS_READ open from a previous OPEN
operation, this action overwrites the existing pointer without
releasing its reference, orphaning the previous reference.

Additionally, the function originally stored the same nfsd_file
pointer in both fp-&gt;fi_fds[O_RDONLY] and fp-&gt;fi_rdeleg_file with
only a single reference. When put_deleg_file() runs, it clears
fi_rdeleg_file and calls nfs4_file_put_access() to release the file.

However, nfs4_file_put_access() only releases fi_fds[O_RDONLY] when
the fi_access[O_RDONLY] counter drops to zero. If another READ open
exists on the file, the counter remains elevated and the nfsd_file
reference from the delegation is never released. This potentially
causes open conflicts on that file.

Then, on server shutdown, these leaks cause __nfsd_file_cache_purge()
to encounter files with an elevated reference count that cannot be
cleaned up, ultimately triggering a BUG() in kmem_cache_destroy()
because there are still nfsd_file objects allocated in that cache.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71090/">CVE-2025-71090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71090">CVE-2025-71090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256772">SUSE bug 1256772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71091</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71091" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71091" ref_url="https://www.suse.com/security/cve/CVE-2025-71091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

team: fix check for port enabled in team_queue_override_port_prio_changed()

There has been a syzkaller bug reported recently with the following
trace:

list_del corruption, ffff888058bea080-&gt;prev is LIST_POISON2 (dead000000000122)
------------[ cut here ]------------
kernel BUG at lib/list_debug.c:59!
Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI
CPU: 3 UID: 0 PID: 21246 Comm: syz.0.2928 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:__list_del_entry_valid_or_report+0x13e/0x200 lib/list_debug.c:59
Code: 48 c7 c7 e0 71 f0 8b e8 30 08 ef fc 90 0f 0b 48 89 ef e8 a5 02 55 fd 48 89 ea 48 89 de 48 c7 c7 40 72 f0 8b e8 13 08 ef fc 90 &lt;0f&gt; 0b 48 89 ef e8 88 02 55 fd 48 89 ea 48 b8 00 00 00 00 00 fc ff
RSP: 0018:ffffc9000d49f370 EFLAGS: 00010286
RAX: 000000000000004e RBX: ffff888058bea080 RCX: ffffc9002817d000
RDX: 0000000000000000 RSI: ffffffff819becc6 RDI: 0000000000000005
RBP: dead000000000122 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000080000000 R11: 0000000000000001 R12: ffff888039e9c230
R13: ffff888058bea088 R14: ffff888058bea080 R15: ffff888055461480
FS:  00007fbbcfe6f6c0(0000) GS:ffff8880d6d0a000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000110c3afcb0 CR3: 00000000382c7000 CR4: 0000000000352ef0
Call Trace:
 &lt;TASK&gt;
 __list_del_entry_valid include/linux/list.h:132 [inline]
 __list_del_entry include/linux/list.h:223 [inline]
 list_del_rcu include/linux/rculist.h:178 [inline]
 __team_queue_override_port_del drivers/net/team/team_core.c:826 [inline]
 __team_queue_override_port_del drivers/net/team/team_core.c:821 [inline]
 team_queue_override_port_prio_changed drivers/net/team/team_core.c:883 [inline]
 team_priority_option_set+0x171/0x2f0 drivers/net/team/team_core.c:1534
 team_option_set drivers/net/team/team_core.c:376 [inline]
 team_nl_options_set_doit+0x8ae/0xe60 drivers/net/team/team_core.c:2653
 genl_family_rcv_msg_doit+0x209/0x2f0 net/netlink/genetlink.c:1115
 genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]
 genl_rcv_msg+0x55c/0x800 net/netlink/genetlink.c:1210
 netlink_rcv_skb+0x158/0x420 net/netlink/af_netlink.c:2552
 genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219
 netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]
 netlink_unicast+0x5aa/0x870 net/netlink/af_netlink.c:1346
 netlink_sendmsg+0x8c8/0xdd0 net/netlink/af_netlink.c:1896
 sock_sendmsg_nosec net/socket.c:727 [inline]
 __sock_sendmsg net/socket.c:742 [inline]
 ____sys_sendmsg+0xa98/0xc70 net/socket.c:2630
 ___sys_sendmsg+0x134/0x1d0 net/socket.c:2684
 __sys_sendmsg+0x16d/0x220 net/socket.c:2716
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0xfa0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

The problem is in this flow:
1) Port is enabled, queue_id != 0, in qom_list
2) Port gets disabled
        -&gt; team_port_disable()
        -&gt; team_queue_override_port_del()
        -&gt; del (removed from list)
3) Port is disabled, queue_id != 0, not in any list
4) Priority changes
        -&gt; team_queue_override_port_prio_changed()
        -&gt; checks: port disabled &amp;&amp; queue_id != 0
        -&gt; calls del - hits the BUG as it is removed already

To fix this, change the check in team_queue_override_port_prio_changed()
so it returns early if port is not enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71091/">CVE-2025-71091 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71091">CVE-2025-71091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256773">SUSE bug 1256773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71092</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71092" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71092" ref_url="https://www.suse.com/security/cve/CVE-2025-71092" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/bnxt_re: Fix OOB write in bnxt_re_copy_err_stats()

Commit ef56081d1864 ("RDMA/bnxt_re: RoCE related hardware counters
update") added three new counters and placed them after
BNXT_RE_OUT_OF_SEQ_ERR.

BNXT_RE_OUT_OF_SEQ_ERR acts as a boundary marker for allocating hardware
statistics with different num_counters values on chip_gen_p5_p7 devices.

As a result, BNXT_RE_NUM_STD_COUNTERS are used when allocating
hw_stats, which leads to an out-of-bounds write in
bnxt_re_copy_err_stats().

The counters BNXT_RE_REQ_CQE_ERROR, BNXT_RE_RESP_CQE_ERROR, and
BNXT_RE_RESP_REMOTE_ACCESS_ERRS are applicable to generic hardware, not
only p5/p7 devices.

Fix this by moving these counters before BNXT_RE_OUT_OF_SEQ_ERR so they
are included in the generic counter set.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71092/">CVE-2025-71092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71092">CVE-2025-71092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256776">SUSE bug 1256776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71093</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71093" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71093" ref_url="https://www.suse.com/security/cve/CVE-2025-71093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

e1000: fix OOB in e1000_tbi_should_accept()

In e1000_tbi_should_accept() we read the last byte of the frame via
'data[length - 1]' to evaluate the TBI workaround. If the descriptor-
reported length is zero or larger than the actual RX buffer size, this
read goes out of bounds and can hit unrelated slab objects. The issue
is observed from the NAPI receive path (e1000_clean_rx_irq):

==================================================================
BUG: KASAN: slab-out-of-bounds in e1000_tbi_should_accept+0x610/0x790
Read of size 1 at addr ffff888014114e54 by task sshd/363

CPU: 0 PID: 363 Comm: sshd Not tainted 5.18.0-rc1 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x5a/0x74
 print_address_description+0x7b/0x440
 print_report+0x101/0x200
 kasan_report+0xc1/0xf0
 e1000_tbi_should_accept+0x610/0x790
 e1000_clean_rx_irq+0xa8c/0x1110
 e1000_clean+0xde2/0x3c10
 __napi_poll+0x98/0x380
 net_rx_action+0x491/0xa20
 __do_softirq+0x2c9/0x61d
 do_softirq+0xd1/0x120
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 __local_bh_enable_ip+0xfe/0x130
 ip_finish_output2+0x7d5/0xb00
 __ip_queue_xmit+0xe24/0x1ab0
 __tcp_transmit_skb+0x1bcb/0x3340
 tcp_write_xmit+0x175d/0x6bd0
 __tcp_push_pending_frames+0x7b/0x280
 tcp_sendmsg_locked+0x2e4f/0x32d0
 tcp_sendmsg+0x24/0x40
 sock_write_iter+0x322/0x430
 vfs_write+0x56c/0xa60
 ksys_write+0xd1/0x190
 do_syscall_64+0x43/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f511b476b10
Code: 73 01 c3 48 8b 0d 88 d3 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d f9 2b 2c 00 00 75 10 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 8e 9b 01 00 48 89 04 24
RSP: 002b:00007ffc9211d4e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 0000000000004024 RCX: 00007f511b476b10
RDX: 0000000000004024 RSI: 0000559a9385962c RDI: 0000000000000003
RBP: 0000559a9383a400 R08: fffffffffffffff0 R09: 0000000000004f00
R10: 0000000000000070 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffc9211d57f R14: 0000559a9347bde7 R15: 0000000000000003
 &lt;/TASK&gt;
Allocated by task 1:
 __kasan_krealloc+0x131/0x1c0
 krealloc+0x90/0xc0
 add_sysfs_param+0xcb/0x8a0
 kernel_add_sysfs_param+0x81/0xd4
 param_sysfs_builtin+0x138/0x1a6
 param_sysfs_init+0x57/0x5b
 do_one_initcall+0x104/0x250
 do_initcall_level+0x102/0x132
 do_initcalls+0x46/0x74
 kernel_init_freeable+0x28f/0x393
 kernel_init+0x14/0x1a0
 ret_from_fork+0x22/0x30
The buggy address belongs to the object at ffff888014114000
 which belongs to the cache kmalloc-2k of size 2048
The buggy address is located 1620 bytes to the right of
 2048-byte region [ffff888014114000, ffff888014114800]
The buggy address belongs to the physical page:
page:ffffea0000504400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14110
head:ffffea0000504400 order:3 compound_mapcount:0 compound_pincount:0
flags: 0x100000000010200(slab|head|node=0|zone=1)
raw: 0100000000010200 0000000000000000 dead000000000001 ffff888013442000
raw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
==================================================================

This happens because the TBI check unconditionally dereferences the last
byte without validating the reported length first:

	u8 last_byte = *(data + length - 1);

Fix by rejecting the frame early if the length is zero, or if it exceeds
adapter-&gt;rx_buffer_len. This preserves the TBI workaround semantics for
valid frames and prevents touching memory beyond the RX buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71093/">CVE-2025-71093 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71093">CVE-2025-71093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256777">SUSE bug 1256777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71094</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71094" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71094" ref_url="https://www.suse.com/security/cve/CVE-2025-71094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: asix: validate PHY address before use

The ASIX driver reads the PHY address from the USB device via
asix_read_phy_addr(). A malicious or faulty device can return an
invalid address (&gt;= PHY_MAX_ADDR), which causes a warning in
mdiobus_get_phy():

  addr 207 out of range
  WARNING: drivers/net/phy/mdio_bus.c:76

Validate the PHY address in asix_read_phy_addr() and remove the
now-redundant check in ax88172a.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71094/">CVE-2025-71094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71094">CVE-2025-71094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256597">SUSE bug 1256597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71095</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71095" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71095" ref_url="https://www.suse.com/security/cve/CVE-2025-71095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: fix the crash issue for zero copy XDP_TX action

There is a crash issue when running zero copy XDP_TX action, the crash
log is shown below.

[  216.122464] Unable to handle kernel paging request at virtual address fffeffff80000000
[  216.187524] Internal error: Oops: 0000000096000144 [#1]  SMP
[  216.301694] Call trace:
[  216.304130]  dcache_clean_poc+0x20/0x38 (P)
[  216.308308]  __dma_sync_single_for_device+0x1bc/0x1e0
[  216.313351]  stmmac_xdp_xmit_xdpf+0x354/0x400
[  216.317701]  __stmmac_xdp_run_prog+0x164/0x368
[  216.322139]  stmmac_napi_poll_rxtx+0xba8/0xf00
[  216.326576]  __napi_poll+0x40/0x218
[  216.408054] Kernel panic - not syncing: Oops: Fatal exception in interrupt

For XDP_TX action, the xdp_buff is converted to xdp_frame by
xdp_convert_buff_to_frame(). The memory type of the resulting xdp_frame
depends on the memory type of the xdp_buff. For page pool based xdp_buff
it produces xdp_frame with memory type MEM_TYPE_PAGE_POOL. For zero copy
XSK pool based xdp_buff it produces xdp_frame with memory type
MEM_TYPE_PAGE_ORDER0. However, stmmac_xdp_xmit_back() does not check the
memory type and always uses the page pool type, this leads to invalid
mappings and causes the crash. Therefore, check the xdp_buff memory type
in stmmac_xdp_xmit_back() to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71095/">CVE-2025-71095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71095">CVE-2025-71095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256605">SUSE bug 1256605</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71096</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71096" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71096" ref_url="https://www.suse.com/security/cve/CVE-2025-71096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly

The netlink response for RDMA_NL_LS_OP_IP_RESOLVE should always have a
LS_NLA_TYPE_DGID attribute, it is invalid if it does not.

Use the nl parsing logic properly and call nla_parse_deprecated() to fill
the nlattrs array and then directly index that array to get the data for
the DGID. Just fail if it is NULL.

Remove the for loop searching for the nla, and squash the validation and
parsing into one function.

Fixes an uninitialized read from the stack triggered by userspace if it
does not provide the DGID to a kernel initiated RDMA_NL_LS_OP_IP_RESOLVE
query.

    BUG: KMSAN: uninit-value in hex_byte_pack include/linux/hex.h:13 [inline]
    BUG: KMSAN: uninit-value in ip6_string+0xef4/0x13a0 lib/vsprintf.c:1490
     hex_byte_pack include/linux/hex.h:13 [inline]
     ip6_string+0xef4/0x13a0 lib/vsprintf.c:1490
     ip6_addr_string+0x18a/0x3e0 lib/vsprintf.c:1509
     ip_addr_string+0x245/0xee0 lib/vsprintf.c:1633
     pointer+0xc09/0x1bd0 lib/vsprintf.c:2542
     vsnprintf+0xf8a/0x1bd0 lib/vsprintf.c:2930
     vprintk_store+0x3ae/0x1530 kernel/printk/printk.c:2279
     vprintk_emit+0x307/0xcd0 kernel/printk/printk.c:2426
     vprintk_default+0x3f/0x50 kernel/printk/printk.c:2465
     vprintk+0x36/0x50 kernel/printk/printk_safe.c:82
     _printk+0x17e/0x1b0 kernel/printk/printk.c:2475
     ib_nl_process_good_ip_rsep drivers/infiniband/core/addr.c:128 [inline]
     ib_nl_handle_ip_res_resp+0x963/0x9d0 drivers/infiniband/core/addr.c:141
     rdma_nl_rcv_msg drivers/infiniband/core/netlink.c:-1 [inline]
     rdma_nl_rcv_skb drivers/infiniband/core/netlink.c:239 [inline]
     rdma_nl_rcv+0xefa/0x11c0 drivers/infiniband/core/netlink.c:259
     netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]
     netlink_unicast+0xf04/0x12b0 net/netlink/af_netlink.c:1346
     netlink_sendmsg+0x10b3/0x1250 net/netlink/af_netlink.c:1896
     sock_sendmsg_nosec net/socket.c:714 [inline]
     __sock_sendmsg+0x333/0x3d0 net/socket.c:729
     ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2617
     ___sys_sendmsg+0x271/0x3b0 net/socket.c:2671
     __sys_sendmsg+0x1aa/0x300 net/socket.c:2703
     __compat_sys_sendmsg net/compat.c:346 [inline]
     __do_compat_sys_sendmsg net/compat.c:353 [inline]
     __se_compat_sys_sendmsg net/compat.c:350 [inline]
     __ia32_compat_sys_sendmsg+0xa4/0x100 net/compat.c:350
     ia32_sys_call+0x3f6c/0x4310 arch/x86/include/generated/asm/syscalls_32.h:371
     do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]
     __do_fast_syscall_32+0xb0/0x150 arch/x86/entry/syscall_32.c:306
     do_fast_syscall_32+0x38/0x80 arch/x86/entry/syscall_32.c:331
     do_SYSENTER_32+0x1f/0x30 arch/x86/entry/syscall_32.c:3
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71096/">CVE-2025-71096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71096">CVE-2025-71096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256606">SUSE bug 1256606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042144" comment="kernel-default-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042145" comment="kernel-rt-livepatch-6.12.0-160000.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71097</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71097" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71097" ref_url="https://www.suse.com/security/cve/CVE-2025-71097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: Fix reference count leak when using error routes with nexthop objects

When a nexthop object is deleted, it is marked as dead and then
fib_table_flush() is called to flush all the routes that are using the
dead nexthop.

The current logic in fib_table_flush() is to only flush error routes
(e.g., blackhole) when it is called as part of network namespace
dismantle (i.e., with flush_all=true). Therefore, error routes are not
flushed when their nexthop object is deleted:

 # ip link add name dummy1 up type dummy
 # ip nexthop add id 1 dev dummy1
 # ip route add 198.51.100.1/32 nhid 1
 # ip route add blackhole 198.51.100.2/32 nhid 1
 # ip nexthop del id 1
 # ip route show
 blackhole 198.51.100.2 nhid 1 dev dummy1

As such, they keep holding a reference on the nexthop object which in
turn holds a reference on the nexthop device, resulting in a reference
count leak:

 # ip link del dev dummy1
 [   70.516258] unregister_netdevice: waiting for dummy1 to become free. Usage count = 2

Fix by flushing error routes when their nexthop is marked as dead.

IPv6 does not suffer from this problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71097/">CVE-2025-71097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71097">CVE-2025-71097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256607">SUSE bug 1256607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71098</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71098" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71098" ref_url="https://www.suse.com/security/cve/CVE-2025-71098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip6_gre: make ip6gre_header() robust

Over the years, syzbot found many ways to crash the kernel
in ip6gre_header() [1].

This involves team or bonding drivers ability to dynamically
change their dev-&gt;needed_headroom and/or dev-&gt;hard_header_len

In this particular crash mld_newpack() allocated an skb
with a too small reserve/headroom, and by the time mld_sendpack()
was called, syzbot managed to attach an ip6gre device.

[1]
skbuff: skb_under_panic: text:ffffffff8a1d69a8 len:136 put:40 head:ffff888059bc7000 data:ffff888059bc6fe8 tail:0x70 end:0x6c0 dev:team0
------------[ cut here ]------------
 kernel BUG at net/core/skbuff.c:213 !
 &lt;TASK&gt;
  skb_under_panic net/core/skbuff.c:223 [inline]
  skb_push+0xc3/0xe0 net/core/skbuff.c:2641
  ip6gre_header+0xc8/0x790 net/ipv6/ip6_gre.c:1371
  dev_hard_header include/linux/netdevice.h:3436 [inline]
  neigh_connected_output+0x286/0x460 net/core/neighbour.c:1618
  neigh_output include/net/neighbour.h:556 [inline]
  ip6_finish_output2+0xfb3/0x1480 net/ipv6/ip6_output.c:136
 __ip6_finish_output net/ipv6/ip6_output.c:-1 [inline]
  ip6_finish_output+0x234/0x7d0 net/ipv6/ip6_output.c:220
  NF_HOOK_COND include/linux/netfilter.h:307 [inline]
  ip6_output+0x340/0x550 net/ipv6/ip6_output.c:247
  NF_HOOK+0x9e/0x380 include/linux/netfilter.h:318
  mld_sendpack+0x8d4/0xe60 net/ipv6/mcast.c:1855
  mld_send_cr net/ipv6/mcast.c:2154 [inline]
  mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71098/">CVE-2025-71098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71098">CVE-2025-71098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256591">SUSE bug 1256591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71099</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71099" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71099" ref_url="https://www.suse.com/security/cve/CVE-2025-71099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/oa: Fix potential UAF in xe_oa_add_config_ioctl()

In xe_oa_add_config_ioctl(), we accessed oa_config-&gt;id after dropping
metrics_lock. Since this lock protects the lifetime of oa_config, an
attacker could guess the id and call xe_oa_remove_config_ioctl() with
perfect timing, freeing oa_config before we dereference it, leading to
a potential use-after-free.

Fix this by caching the id in a local variable while holding the lock.

v2: (Matt A)
- Dropped mutex_unlock(&amp;oa-&gt;metrics_lock) ordering change from
  xe_oa_remove_config_ioctl()

(cherry picked from commit 28aeaed130e8e587fd1b73b6d66ca41ccc5a1a31)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71099/">CVE-2025-71099 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71099">CVE-2025-71099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256592">SUSE bug 1256592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71100</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71100" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71100" ref_url="https://www.suse.com/security/cve/CVE-2025-71100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtlwifi: 8192cu: fix tid out of range in rtl92cu_tx_fill_desc()

TID getting from ieee80211_get_tid() might be out of range of array size
of sta_entry-&gt;tids[], so check TID is less than MAX_TID_COUNT. Othwerwise,
UBSAN warn:

 UBSAN: array-index-out-of-bounds in drivers/net/wireless/realtek/rtlwifi/rtl8192cu/trx.c:514:30
 index 10 is out of range for type 'rtl_tid_data [9]'
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71100/">CVE-2025-71100 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71100">CVE-2025-71100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256593">SUSE bug 1256593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71101</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71101" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71101" ref_url="https://www.suse.com/security/cve/CVE-2025-71101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: hp-bioscfg: Fix out-of-bounds array access in ACPI package parsing

The hp_populate_*_elements_from_package() functions in the hp-bioscfg
driver contain out-of-bounds array access vulnerabilities.

These functions parse ACPI packages into internal data structures using
a for loop with index variable 'elem' that iterates through
enum_obj/integer_obj/order_obj/password_obj/string_obj arrays.

When processing multi-element fields like PREREQUISITES and
ENUM_POSSIBLE_VALUES, these functions read multiple consecutive array
elements using expressions like 'enum_obj[elem + reqs]' and
'enum_obj[elem + pos_values]' within nested loops.

The bug is that the bounds check only validated elem, but did not consider
the additional offset when accessing elem + reqs or elem + pos_values.

The fix changes the bounds check to validate the actual accessed index.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71101/">CVE-2025-71101 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71101">CVE-2025-71101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256594">SUSE bug 1256594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71102</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71102" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71102" ref_url="https://www.suse.com/security/cve/CVE-2025-71102" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scs: fix a wrong parameter in __scs_magic

__scs_magic() needs a 'void *' variable, but a 'struct task_struct *' is
given.  'task_scs(tsk)' is the starting address of the task's shadow call
stack, and '__scs_magic(task_scs(tsk))' is the end address of the task's
shadow call stack.  Here should be '__scs_magic(task_scs(tsk))'.

The user-visible effect of this bug is that when CONFIG_DEBUG_STACK_USAGE
is enabled, the shadow call stack usage checking function
(scs_check_usage) would scan an incorrect memory range.  This could lead

1. **Inaccurate stack usage reporting**: The function would calculate
   wrong usage statistics for the shadow call stack, potentially showing
   incorrect value in kmsg.

2. **Potential kernel crash**: If the value of __scs_magic(tsk)is
   greater than that of __scs_magic(task_scs(tsk)), the for loop may
   access unmapped memory, potentially causing a kernel panic.  However,
   this scenario is unlikely because task_struct is allocated via the slab
   allocator (which typically returns lower addresses), while the shadow
   call stack returned by task_scs(tsk) is allocated via vmalloc(which
   typically returns higher addresses).

However, since this is purely a debugging feature
(CONFIG_DEBUG_STACK_USAGE), normal production systems should be not
unaffected.  The bug only impacts developers and testers who are actively
debugging stack usage with this configuration enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71102/">CVE-2025-71102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71102">CVE-2025-71102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256704">SUSE bug 1256704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71103</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71103" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71103" ref_url="https://www.suse.com/security/cve/CVE-2025-71103" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: adreno: fix deferencing ifpc_reglist when not declared

On plaforms with an a7xx GPU not supporting IFPC, the ifpc_reglist
if still deferenced in a7xx_patch_pwrup_reglist() which causes
a kernel crash:
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008
...
pc : a6xx_hw_init+0x155c/0x1e4c [msm]
lr : a6xx_hw_init+0x9a8/0x1e4c [msm]
...
Call trace:
  a6xx_hw_init+0x155c/0x1e4c [msm] (P)
  msm_gpu_hw_init+0x58/0x88 [msm]
  adreno_load_gpu+0x94/0x1fc [msm]
  msm_open+0xe4/0xf4 [msm]
  drm_file_alloc+0x1a0/0x2e4 [drm]
  drm_client_init+0x7c/0x104 [drm]
  drm_fbdev_client_setup+0x94/0xcf0 [drm_client_lib]
  drm_client_setup+0xb4/0xd8 [drm_client_lib]
  msm_drm_kms_post_init+0x2c/0x3c [msm]
  msm_drm_init+0x1a4/0x228 [msm]
  msm_drm_bind+0x30/0x3c [msm]
...

Check the validity of ifpc_reglist before deferencing the table
to setup the register values.

Patchwork: https://patchwork.freedesktop.org/patch/688944/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71103/">CVE-2025-71103 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71103">CVE-2025-71103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256743">SUSE bug 1256743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71104</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71104" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71104" ref_url="https://www.suse.com/security/cve/CVE-2025-71104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer

When advancing the target expiration for the guest's APIC timer in periodic
mode, set the expiration to "now" if the target expiration is in the past
(similar to what is done in update_target_expiration()).  Blindly adding
the period to the previous target expiration can result in KVM generating
a practically unbounded number of hrtimer IRQs due to programming an
expired timer over and over.  In extreme scenarios, e.g. if userspace
pauses/suspends a VM for an extended duration, this can even cause hard
lockups in the host.

Currently, the bug only affects Intel CPUs when using the hypervisor timer
(HV timer), a.k.a. the VMX preemption timer.  Unlike the software timer,
a.k.a. hrtimer, which KVM keeps running even on exits to userspace, the
HV timer only runs while the guest is active.  As a result, if the vCPU
does not run for an extended duration, there will be a huge gap between
the target expiration and the current time the vCPU resumes running.
Because the target expiration is incremented by only one period on each
timer expiration, this leads to a series of timer expirations occurring
rapidly after the vCPU/VM resumes.

More critically, when the vCPU first triggers a periodic HV timer
expiration after resuming, advancing the expiration by only one period
will result in a target expiration in the past.  As a result, the delta
may be calculated as a negative value.  When the delta is converted into
an absolute value (tscdeadline is an unsigned u64), the resulting value
can overflow what the HV timer is capable of programming.  I.e. the large
value will exceed the VMX Preemption Timer's maximum bit width of
cpu_preemption_timer_multi + 32, and thus cause KVM to switch from the
HV timer to the software timer (hrtimers).

After switching to the software timer, periodic timer expiration callbacks
may be executed consecutively within a single clock interrupt handler,
because hrtimers honors KVM's request for an expiration in the past and
immediately re-invokes KVM's callback after reprogramming.  And because
the interrupt handler runs with IRQs disabled, restarting KVM's hrtimer
over and over until the target expiration is advanced to "now" can result
in a hard lockup.

E.g. the following hard lockup was triggered in the host when running a
Windows VM (only relevant because it used the APIC timer in periodic mode)
after resuming the VM from a long suspend (in the host).

  NMI watchdog: Watchdog detected hard LOCKUP on cpu 45
  ...
  RIP: 0010:advance_periodic_target_expiration+0x4d/0x80 [kvm]
  ...
  RSP: 0018:ff4f88f5d98d8ef0 EFLAGS: 00000046
  RAX: fff0103f91be678e RBX: fff0103f91be678e RCX: 00843a7d9e127bcc
  RDX: 0000000000000002 RSI: 0052ca4003697505 RDI: ff440d5bfbdbd500
  RBP: ff440d5956f99200 R08: ff2ff2a42deb6a84 R09: 000000000002a6c0
  R10: 0122d794016332b3 R11: 0000000000000000 R12: ff440db1af39cfc0
  R13: ff440db1af39cfc0 R14: ffffffffc0d4a560 R15: ff440db1af39d0f8
  FS:  00007f04a6ffd700(0000) GS:ff440db1af380000(0000) knlGS:000000e38a3b8000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 000000d5651feff8 CR3: 000000684e038002 CR4: 0000000000773ee0
  PKRU: 55555554
  Call Trace:
   &lt;IRQ&gt;
   apic_timer_fn+0x31/0x50 [kvm]
   __hrtimer_run_queues+0x100/0x280
   hrtimer_interrupt+0x100/0x210
   ? ttwu_do_wakeup+0x19/0x160
   smp_apic_timer_interrupt+0x6a/0x130
   apic_timer_interrupt+0xf/0x20
   &lt;/IRQ&gt;

Moreover, if the suspend duration of the virtual machine is not long enough
to trigger a hard lockup in this scenario, since commit 98c25ead5eda
("KVM: VMX: Move preemption timer &lt;=&gt; hrtimer dance to common x86"), KVM
will continue using the software timer until the guest reprograms the APIC
timer in some way.  Since the periodic timer does not require frequent APIC
timer register programming, the guest may continue to use the software
timer in 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-71104/">CVE-2025-71104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71104">CVE-2025-71104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256708">SUSE bug 1256708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71105</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71105" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71105" ref_url="https://www.suse.com/security/cve/CVE-2025-71105" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: use global inline_xattr_slab instead of per-sb slab cache

As Hong Yun reported in mailing list:

loop7: detected capacity change from 0 to 131072
------------[ cut here ]------------
kmem_cache of name 'f2fs_xattr_entry-7:7' already exists
WARNING: CPU: 0 PID: 24426 at mm/slab_common.c:110 kmem_cache_sanity_check mm/slab_common.c:109 [inline]
WARNING: CPU: 0 PID: 24426 at mm/slab_common.c:110 __kmem_cache_create_args+0xa6/0x320 mm/slab_common.c:307
CPU: 0 UID: 0 PID: 24426 Comm: syz.7.1370 Not tainted 6.17.0-rc4 #1 PREEMPT(full)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
RIP: 0010:kmem_cache_sanity_check mm/slab_common.c:109 [inline]
RIP: 0010:__kmem_cache_create_args+0xa6/0x320 mm/slab_common.c:307
Call Trace:
  __kmem_cache_create include/linux/slab.h:353 [inline]
  f2fs_kmem_cache_create fs/f2fs/f2fs.h:2943 [inline]
  f2fs_init_xattr_caches+0xa5/0xe0 fs/f2fs/xattr.c:843
  f2fs_fill_super+0x1645/0x2620 fs/f2fs/super.c:4918
  get_tree_bdev_flags+0x1fb/0x260 fs/super.c:1692
  vfs_get_tree+0x43/0x140 fs/super.c:1815
  do_new_mount+0x201/0x550 fs/namespace.c:3808
  do_mount fs/namespace.c:4136 [inline]
  __do_sys_mount fs/namespace.c:4347 [inline]
  __se_sys_mount+0x298/0x2f0 fs/namespace.c:4324
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0x8e/0x3a0 arch/x86/entry/syscall_64.c:94
  entry_SYSCALL_64_after_hwframe+0x76/0x7e

The bug can be reproduced w/ below scripts:
- mount /dev/vdb /mnt1
- mount /dev/vdc /mnt2
- umount /mnt1
- mounnt /dev/vdb /mnt1

The reason is if we created two slab caches, named f2fs_xattr_entry-7:3
and f2fs_xattr_entry-7:7, and they have the same slab size. Actually,
slab system will only create one slab cache core structure which has
slab name of "f2fs_xattr_entry-7:3", and two slab caches share the same
structure and cache address.

So, if we destroy f2fs_xattr_entry-7:3 cache w/ cache address, it will
decrease reference count of slab cache, rather than release slab cache
entirely, since there is one more user has referenced the cache.

Then, if we try to create slab cache w/ name "f2fs_xattr_entry-7:3" again,
slab system will find that there is existed cache which has the same name
and trigger the warning.

Let's changes to use global inline_xattr_slab instead of per-sb slab cache
for fixing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71105/">CVE-2025-71105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71105">CVE-2025-71105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256707">SUSE bug 1256707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71106</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71106" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71106" ref_url="https://www.suse.com/security/cve/CVE-2025-71106" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: PM: Fix reverse check in filesystems_freeze_callback()

The freeze_all_ptr check in filesystems_freeze_callback() introduced by
commit a3f8f8662771 ("power: always freeze efivarfs") is reverse which
quite confusingly causes all file systems to be frozen when
filesystem_freeze_enabled is false.

On my systems it causes the WARN_ON_ONCE() in __set_task_frozen() to
trigger, most likely due to an attempt to freeze a file system that is
not ready for that.

Add a logical negation to the check in question to reverse it as
appropriate.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71106/">CVE-2025-71106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71106">CVE-2025-71106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256706">SUSE bug 1256706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71107</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71107" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71107" ref_url="https://www.suse.com/security/cve/CVE-2025-71107" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: ensure node page reads complete before f2fs_put_super() finishes

Xfstests generic/335, generic/336 sometimes crash with the following message:

F2FS-fs (dm-0): detect filesystem reference count leak during umount, type: 9, count: 1
------------[ cut here ]------------
kernel BUG at fs/f2fs/super.c:1939!
Oops: invalid opcode: 0000 [#1] SMP NOPTI
CPU: 1 UID: 0 PID: 609351 Comm: umount Tainted: G        W           6.17.0-rc5-xfstests-g9dd1835ecda5 #1 PREEMPT(none)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
RIP: 0010:f2fs_put_super+0x3b3/0x3c0
Call Trace:
 &lt;TASK&gt;
 generic_shutdown_super+0x7e/0x190
 kill_block_super+0x1a/0x40
 kill_f2fs_super+0x9d/0x190
 deactivate_locked_super+0x30/0xb0
 cleanup_mnt+0xba/0x150
 task_work_run+0x5c/0xa0
 exit_to_user_mode_loop+0xb7/0xc0
 do_syscall_64+0x1ae/0x1c0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
 &lt;/TASK&gt;
---[ end trace 0000000000000000 ]---

It appears that sometimes it is possible that f2fs_put_super() is called before
all node page reads are completed.
Adding a call to f2fs_wait_on_all_pages() for F2FS_RD_NODE fixes the problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71107/">CVE-2025-71107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71107">CVE-2025-71107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256705">SUSE bug 1256705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71108</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71108" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71108" ref_url="https://www.suse.com/security/cve/CVE-2025-71108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: ucsi: Handle incorrect num_connectors capability

The UCSI spec states that the num_connectors field is 7 bits, and the
8th bit is reserved and should be set to zero.
Some buggy FW has been known to set this bit, and it can lead to a
system not booting.
Flag that the FW is not behaving correctly, and auto-fix the value
so that the system boots correctly.

Found on Lenovo P1 G8 during Linux enablement program. The FW will
be fixed, but seemed worth addressing in case it hit platforms that
aren't officially Linux supported.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71108/">CVE-2025-71108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71108">CVE-2025-71108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256774">SUSE bug 1256774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71109</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71109" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71109" ref_url="https://www.suse.com/security/cve/CVE-2025-71109" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

MIPS: ftrace: Fix memory corruption when kernel is located beyond 32 bits

Since commit e424054000878 ("MIPS: Tracing: Reduce the overhead of
dynamic Function Tracer"), the macro UASM_i_LA_mostly has been used,
and this macro can generate more than 2 instructions. At the same
time, the code in ftrace assumes that no more than 2 instructions can
be generated, which is why it stores them in an int[2] array. However,
as previously noted, the macro UASM_i_LA_mostly (and now UASM_i_LA)
causes a buffer overflow when _mcount is beyond 32 bits. This leads to
corruption of the variables located in the __read_mostly section.

This corruption was observed because the variable
__cpu_primary_thread_mask was corrupted, causing a hang very early
during boot.

This fix prevents the corruption by avoiding the generation of
instructions if they could exceed 2 instructions in
length. Fortunately, insn_la_mcount is only used if the instrumented
code is located outside the kernel code section, so dynamic ftrace can
still be used, albeit in a more limited scope. This is still
preferable to corrupting memory and/or crashing the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-17"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71109/">CVE-2025-71109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71109">CVE-2025-71109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256768">SUSE bug 1256768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71110</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71110" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71110" ref_url="https://www.suse.com/security/cve/CVE-2025-71110" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/slub: reset KASAN tag in defer_free() before accessing freed memory

When CONFIG_SLUB_TINY is enabled, kfree_nolock() calls kasan_slab_free()
before defer_free(). On ARM64 with MTE (Memory Tagging Extension),
kasan_slab_free() poisons the memory and changes the tag from the
original (e.g., 0xf3) to a poison tag (0xfe).

When defer_free() then tries to write to the freed object to build the
deferred free list via llist_add(), the pointer still has the old tag,
causing a tag mismatch and triggering a KASAN use-after-free report:

  BUG: KASAN: slab-use-after-free in defer_free+0x3c/0xbc mm/slub.c:6537
  Write at addr f3f000000854f020 by task kworker/u8:6/983
  Pointer tag: [f3], memory tag: [fe]

Fix this by calling kasan_reset_tag() before accessing the freed memory.
This is safe because defer_free() is part of the allocator itself and is
expected to manipulate freed memory for bookkeeping purposes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-17"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71110/">CVE-2025-71110 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71110">CVE-2025-71110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256729">SUSE bug 1256729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71111</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71111" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71111" ref_url="https://www.suse.com/security/cve/CVE-2025-71111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (w83791d) Convert macros to functions to avoid TOCTOU

The macro FAN_FROM_REG evaluates its arguments multiple times. When used
in lockless contexts involving shared driver data, this leads to
Time-of-Check to Time-of-Use (TOCTOU) race conditions, potentially
causing divide-by-zero errors.

Convert the macro to a static function. This guarantees that arguments
are evaluated only once (pass-by-value), preventing the race
conditions.

Additionally, in store_fan_div, move the calculation of the minimum
limit inside the update lock. This ensures that the read-modify-write
sequence operates on consistent data.

Adhere to the principle of minimal changes by only converting macros
that evaluate arguments multiple times and are used in lockless
contexts.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-17"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71111/">CVE-2025-71111 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71111">CVE-2025-71111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256728">SUSE bug 1256728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71112</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71112" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71112" ref_url="https://www.suse.com/security/cve/CVE-2025-71112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: add VLAN id validation before using

Currently, the VLAN id may be used without validation when
receive a VLAN configuration mailbox from VF. The length of
vlan_del_fail_bmap is BITS_TO_LONGS(VLAN_N_VID). It may cause
out-of-bounds memory access once the VLAN id is bigger than
or equal to VLAN_N_VID.

Therefore, VLAN id needs to be checked to ensure it is within
the range of VLAN_N_VID.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71112/">CVE-2025-71112 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71112">CVE-2025-71112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256726">SUSE bug 1256726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256727">SUSE bug 1256727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71113</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71113" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71113" ref_url="https://www.suse.com/security/cve/CVE-2025-71113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: af_alg - zero initialize memory allocated via sock_kmalloc

Several crypto user API contexts and requests allocated with
sock_kmalloc() were left uninitialized, relying on callers to
set fields explicitly. This resulted in the use of uninitialized
data in certain error paths or when new fields are added in the
future.

The ACVP patches also contain two user-space interface files:
algif_kpp.c and algif_akcipher.c. These too rely on proper
initialization of their context structures.

A particular issue has been observed with the newly added
'inflight' variable introduced in af_alg_ctx by commit:

  67b164a871af ("crypto: af_alg - Disallow multiple in-flight AIO requests")

Because the context is not memset to zero after allocation,
the inflight variable has contained garbage values. As a result,
af_alg_alloc_areq() has incorrectly returned -EBUSY randomly when
the garbage value was interpreted as true:

  https://github.com/gregkh/linux/blame/master/crypto/af_alg.c#L1209

The check directly tests ctx-&gt;inflight without explicitly
comparing against true/false. Since inflight is only ever set to
true or false later, an uninitialized value has triggered
-EBUSY failures. Zero-initializing memory allocated with
sock_kmalloc() ensures inflight and other fields start in a known
state, removing random issues caused by uninitialized data.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71113/">CVE-2025-71113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71113">CVE-2025-71113 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256716">SUSE bug 1256716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71114</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71114" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71114" ref_url="https://www.suse.com/security/cve/CVE-2025-71114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

via_wdt: fix critical boot hang due to unnamed resource allocation

The VIA watchdog driver uses allocate_resource() to reserve a MMIO
region for the watchdog control register. However, the allocated
resource was not given a name, which causes the kernel resource tree
to contain an entry marked as "&lt;BAD&gt;" under /proc/iomem on x86
platforms.

During boot, this unnamed resource can lead to a critical hang because
subsequent resource lookups and conflict checks fail to handle the
invalid entry properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71114/">CVE-2025-71114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71114">CVE-2025-71114 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256752">SUSE bug 1256752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71115</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71115" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71115" ref_url="https://www.suse.com/security/cve/CVE-2025-71115" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

um: init cpu_tasks[] earlier

This is currently done in uml_finishsetup(), but e.g. with
KCOV enabled we'll crash because some init code can call
into e.g. memparse(), which has coverage annotations, and
then the checks in check_kcov_mode() crash because current
is NULL.

Simply initialize the cpu_tasks[] array statically, which
fixes the crash. For the later SMP work, it seems to have
not really caused any problems yet, but initialize all of
the entries anyway.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-19"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71115/">CVE-2025-71115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71115">CVE-2025-71115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256750">SUSE bug 1256750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71116</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71116" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71116" ref_url="https://www.suse.com/security/cve/CVE-2025-71116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: make decode_pool() more resilient against corrupted osdmaps

If the osdmap is (maliciously) corrupted such that the encoded length
of ceph_pg_pool envelope is less than what is expected for a particular
encoding version, out-of-bounds reads may ensue because the only bounds
check that is there is based on that length value.

This patch adds explicit bounds checks for each field that is decoded
or skipped.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71116/">CVE-2025-71116 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71116">CVE-2025-71116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256744">SUSE bug 1256744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71118</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71118" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71118" ref_url="https://www.suse.com/security/cve/CVE-2025-71118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPICA: Avoid walking the Namespace if start_node is NULL

Although commit 0c9992315e73 ("ACPICA: Avoid walking the ACPI Namespace
if it is not there") fixed the situation when both start_node and
acpi_gbl_root_node are NULL, the Linux kernel mainline now still crashed
on Honor Magicbook 14 Pro [1].

That happens due to the access to the member of parent_node in
acpi_ns_get_next_node().  The NULL pointer dereference will always
happen, no matter whether or not the start_node is equal to
ACPI_ROOT_OBJECT, so move the check of start_node being NULL
out of the if block.

Unfortunately, all the attempts to contact Honor have failed, they
refused to provide any technical support for Linux.

The bad DSDT table's dump could be found on GitHub [2].

DMI: HONOR FMB-P/FMB-P-PCB, BIOS 1.13 05/08/2025

[ rjw: Subject adjustment, changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71118/">CVE-2025-71118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71118">CVE-2025-71118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256763">SUSE bug 1256763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71119</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71119" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71119" ref_url="https://www.suse.com/security/cve/CVE-2025-71119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/kexec: Enable SMT before waking offline CPUs

If SMT is disabled or a partial SMT state is enabled, when a new kernel
image is loaded for kexec, on reboot the following warning is observed:

kexec: Waking offline cpu 228.
WARNING: CPU: 0 PID: 9062 at arch/powerpc/kexec/core_64.c:223 kexec_prepare_cpus+0x1b0/0x1bc
[snip]
 NIP kexec_prepare_cpus+0x1b0/0x1bc
 LR  kexec_prepare_cpus+0x1a0/0x1bc
 Call Trace:
  kexec_prepare_cpus+0x1a0/0x1bc (unreliable)
  default_machine_kexec+0x160/0x19c
  machine_kexec+0x80/0x88
  kernel_kexec+0xd0/0x118
  __do_sys_reboot+0x210/0x2c4
  system_call_exception+0x124/0x320
  system_call_vectored_common+0x15c/0x2ec

This occurs as add_cpu() fails due to cpu_bootable() returning false for
CPUs that fail the cpu_smt_thread_allowed() check or non primary
threads if SMT is disabled.

Fix the issue by enabling SMT and resetting the number of SMT threads to
the number of threads per core, before attempting to wake up all present
CPUs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71119/">CVE-2025-71119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71119">CVE-2025-71119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256730">SUSE bug 1256730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71120</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71120" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71120" ref_url="https://www.suse.com/security/cve/CVE-2025-71120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1263-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1279-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1284-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1285-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1287-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1288-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21006-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21071-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf

A zero length gss_token results in pages == 0 and in_token-&gt;pages[0]
is NULL. The code unconditionally evaluates
page_address(in_token-&gt;pages[0]) for the initial memcpy, which can
dereference NULL even when the copy length is 0. Guard the first
memcpy so it only runs when length &gt; 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71120/">CVE-2025-71120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71120">CVE-2025-71120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256779">SUSE bug 1256779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256780">SUSE bug 1256780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056309" comment="kernel-livepatch-6_12_0-160000_5-rt-7-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056310" comment="kernel-livepatch-6_12_0-160000_6-rt-6-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056311" comment="kernel-livepatch-6_12_0-160000_7-rt-4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056308" comment="kernel-livepatch-6_12_0-160000_8-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056330" comment="kernel-livepatch-6_12_0-160000_9-default-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056307" comment="kernel-livepatch-6_12_0-160000_9-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71121</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71121" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71121" ref_url="https://www.suse.com/security/cve/CVE-2025-71121" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

parisc: Do not reprogram affinitiy on ASP chip

The ASP chip is a very old variant of the GSP chip and is used e.g. in
HP 730 workstations. When trying to reprogram the affinity it will crash
with a HPMC as the relevant registers don't seem to be at the usual
location.  Let's avoid the crash by checking the sversion. Also note,
that reprogramming isn't necessary either, as the HP730 is a just a
single-CPU machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71121/">CVE-2025-71121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71121">CVE-2025-71121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256758">SUSE bug 1256758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71122</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71122" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71122" ref_url="https://www.suse.com/security/cve/CVE-2025-71122" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd/selftest: Check for overflow in IOMMU_TEST_OP_ADD_RESERVED

syzkaller found it could overflow math in the test infrastructure and
cause a WARN_ON by corrupting the reserved interval tree. This only
effects test kernels with CONFIG_IOMMUFD_TEST.

Validate the user input length in the test ioctl.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71122/">CVE-2025-71122 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71122">CVE-2025-71122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256762">SUSE bug 1256762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71123</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71123" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71123" ref_url="https://www.suse.com/security/cve/CVE-2025-71123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix string copying in parse_apply_sb_mount_options()

strscpy_pad() can't be used to copy a non-NUL-term string into a NUL-term
string of possibly bigger size.  Commit 0efc5990bca5 ("string.h: Introduce
memtostr() and memtostr_pad()") provides additional information in that
regard.  So if this happens, the following warning is observed:

strnlen: detected buffer overflow: 65 byte read of buffer size 64
WARNING: CPU: 0 PID: 28655 at lib/string_helpers.c:1032 __fortify_report+0x96/0xc0 lib/string_helpers.c:1032
Modules linked in:
CPU: 0 UID: 0 PID: 28655 Comm: syz-executor.3 Not tainted 6.12.54-syzkaller-00144-g5f0270f1ba00 #0
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
RIP: 0010:__fortify_report+0x96/0xc0 lib/string_helpers.c:1032
Call Trace:
 &lt;TASK&gt;
 __fortify_panic+0x1f/0x30 lib/string_helpers.c:1039
 strnlen include/linux/fortify-string.h:235 [inline]
 sized_strscpy include/linux/fortify-string.h:309 [inline]
 parse_apply_sb_mount_options fs/ext4/super.c:2504 [inline]
 __ext4_fill_super fs/ext4/super.c:5261 [inline]
 ext4_fill_super+0x3c35/0xad00 fs/ext4/super.c:5706
 get_tree_bdev_flags+0x387/0x620 fs/super.c:1636
 vfs_get_tree+0x93/0x380 fs/super.c:1814
 do_new_mount fs/namespace.c:3553 [inline]
 path_mount+0x6ae/0x1f70 fs/namespace.c:3880
 do_mount fs/namespace.c:3893 [inline]
 __do_sys_mount fs/namespace.c:4103 [inline]
 __se_sys_mount fs/namespace.c:4080 [inline]
 __x64_sys_mount+0x280/0x300 fs/namespace.c:4080
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x64/0x140 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Since userspace is expected to provide s_mount_opts field to be at most 63
characters long with the ending byte being NUL-term, use a 64-byte buffer
which matches the size of s_mount_opts, so that strscpy_pad() does its job
properly.  Return with error if the user still managed to provide a
non-NUL-term string here.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71123/">CVE-2025-71123 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71123">CVE-2025-71123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256757">SUSE bug 1256757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71124</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71124" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71124" ref_url="https://www.suse.com/security/cve/CVE-2025-71124" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/a6xx: move preempt_prepare_postamble after error check

Move the call to preempt_prepare_postamble() after verifying that
preempt_postamble_ptr is valid. If preempt_postamble_ptr is NULL,
dereferencing it in preempt_prepare_postamble() would lead to a crash.

This change avoids calling the preparation function when the
postamble allocation has failed, preventing potential NULL pointer
dereference and ensuring proper error handling.

Patchwork: https://patchwork.freedesktop.org/patch/687659/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71124/">CVE-2025-71124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71124">CVE-2025-71124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256782">SUSE bug 1256782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71125</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71125" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71125" ref_url="https://www.suse.com/security/cve/CVE-2025-71125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Do not register unsupported perf events

Synthetic events currently do not have a function to register perf events.
This leads to calling the tracepoint register functions with a NULL
function pointer which triggers:

 ------------[ cut here ]------------
 WARNING: kernel/tracepoint.c:175 at tracepoint_add_func+0x357/0x370, CPU#2: perf/2272
 Modules linked in: kvm_intel kvm irqbypass
 CPU: 2 UID: 0 PID: 2272 Comm: perf Not tainted 6.18.0-ftest-11964-ge022764176fc-dirty #323 PREEMPTLAZY
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-debian-1.17.0-1 04/01/2014
 RIP: 0010:tracepoint_add_func+0x357/0x370
 Code: 28 9c e8 4c 0b f5 ff eb 0f 4c 89 f7 48 c7 c6 80 4d 28 9c e8 ab 89 f4 ff 31 c0 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc &lt;0f&gt; 0b 49 c7 c6 ea ff ff ff e9 ee fe ff ff 0f 0b e9 f9 fe ff ff 0f
 RSP: 0018:ffffabc0c44d3c40 EFLAGS: 00010246
 RAX: 0000000000000001 RBX: ffff9380aa9e4060 RCX: 0000000000000000
 RDX: 000000000000000a RSI: ffffffff9e1d4a98 RDI: ffff937fcf5fd6c8
 RBP: 0000000000000001 R08: 0000000000000007 R09: ffff937fcf5fc780
 R10: 0000000000000003 R11: ffffffff9c193910 R12: 000000000000000a
 R13: ffffffff9e1e5888 R14: 0000000000000000 R15: ffffabc0c44d3c78
 FS:  00007f6202f5f340(0000) GS:ffff93819f00f000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000055d3162281a8 CR3: 0000000106a56003 CR4: 0000000000172ef0
 Call Trace:
  &lt;TASK&gt;
  tracepoint_probe_register+0x5d/0x90
  synth_event_reg+0x3c/0x60
  perf_trace_event_init+0x204/0x340
  perf_trace_init+0x85/0xd0
  perf_tp_event_init+0x2e/0x50
  perf_try_init_event+0x6f/0x230
  ? perf_event_alloc+0x4bb/0xdc0
  perf_event_alloc+0x65a/0xdc0
  __se_sys_perf_event_open+0x290/0x9f0
  do_syscall_64+0x93/0x7b0
  ? entry_SYSCALL_64_after_hwframe+0x76/0x7e
  ? trace_hardirqs_off+0x53/0xc0
  entry_SYSCALL_64_after_hwframe+0x76/0x7e

Instead, have the code return -ENODEV, which doesn't warn and has perf
error out with:

 # perf record -e synthetic:futex_wait
Error:
The sys_perf_event_open() syscall returned with 19 (No such device) for event (synthetic:futex_wait).
"dmesg | grep -i perf" may provide additional information.

Ideally perf should support synthetic events, but for now just fix the
warning. The support can come later.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71125/">CVE-2025-71125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71125">CVE-2025-71125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256784">SUSE bug 1256784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71126</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71126" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71126" ref_url="https://www.suse.com/security/cve/CVE-2025-71126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: avoid deadlock on fallback while reinjecting

Jakub reported an MPTCP deadlock at fallback time:

 WARNING: possible recursive locking detected
 6.18.0-rc7-virtme #1 Not tainted
 --------------------------------------------
 mptcp_connect/20858 is trying to acquire lock:
 ff1100001da18b60 (&amp;msk-&gt;fallback_lock){+.-.}-{3:3}, at: __mptcp_try_fallback+0xd8/0x280

 but task is already holding lock:
 ff1100001da18b60 (&amp;msk-&gt;fallback_lock){+.-.}-{3:3}, at: __mptcp_retrans+0x352/0xaa0

 other info that might help us debug this:
  Possible unsafe locking scenario:

        CPU0
        ----
   lock(&amp;msk-&gt;fallback_lock);
   lock(&amp;msk-&gt;fallback_lock);

  *** DEADLOCK ***

  May be due to missing lock nesting notation

 3 locks held by mptcp_connect/20858:
  #0: ff1100001da18290 (sk_lock-AF_INET){+.+.}-{0:0}, at: mptcp_sendmsg+0x114/0x1bc0
  #1: ff1100001db40fd0 (k-sk_lock-AF_INET#2){+.+.}-{0:0}, at: __mptcp_retrans+0x2cb/0xaa0
  #2: ff1100001da18b60 (&amp;msk-&gt;fallback_lock){+.-.}-{3:3}, at: __mptcp_retrans+0x352/0xaa0

 stack backtrace:
 CPU: 0 UID: 0 PID: 20858 Comm: mptcp_connect Not tainted 6.18.0-rc7-virtme #1 PREEMPT(full)
 Hardware name: Bochs, BIOS Bochs 01/01/2011
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x6f/0xa0
  print_deadlock_bug.cold+0xc0/0xcd
  validate_chain+0x2ff/0x5f0
  __lock_acquire+0x34c/0x740
  lock_acquire.part.0+0xbc/0x260
  _raw_spin_lock_bh+0x38/0x50
  __mptcp_try_fallback+0xd8/0x280
  mptcp_sendmsg_frag+0x16c2/0x3050
  __mptcp_retrans+0x421/0xaa0
  mptcp_release_cb+0x5aa/0xa70
  release_sock+0xab/0x1d0
  mptcp_sendmsg+0xd5b/0x1bc0
  sock_write_iter+0x281/0x4d0
  new_sync_write+0x3c5/0x6f0
  vfs_write+0x65e/0xbb0
  ksys_write+0x17e/0x200
  do_syscall_64+0xbb/0xfd0
  entry_SYSCALL_64_after_hwframe+0x4b/0x53
 RIP: 0033:0x7fa5627cbc5e
 Code: 4d 89 d8 e8 14 bd 00 00 4c 8b 5d f8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 11 c9 c3 0f 1f 80 00 00 00 00 48 8b 45 10 0f 05 &lt;c9&gt; c3 83 e2 39 83 fa 08 75 e7 e8 13 ff ff ff 0f 1f 00 f3 0f 1e fa
 RSP: 002b:00007fff1fe14700 EFLAGS: 00000202 ORIG_RAX: 0000000000000001
 RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007fa5627cbc5e
 RDX: 0000000000001f9c RSI: 00007fff1fe16984 RDI: 0000000000000005
 RBP: 00007fff1fe14710 R08: 0000000000000000 R09: 0000000000000000
 R10: 0000000000000000 R11: 0000000000000202 R12: 00007fff1fe16920
 R13: 0000000000002000 R14: 0000000000001f9c R15: 0000000000001f9c

The packet scheduler could attempt a reinjection after receiving an
MP_FAIL and before the infinite map has been transmitted, causing a
deadlock since MPTCP needs to do the reinjection atomically from WRT
fallback.

Address the issue explicitly avoiding the reinjection in the critical
scenario. Note that this is the only fallback critical section that
could potentially send packets and hit the double-lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71126/">CVE-2025-71126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71126">CVE-2025-71126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256755">SUSE bug 1256755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71128</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71128" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71128" ref_url="https://www.suse.com/security/cve/CVE-2025-71128" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erspan: Initialize options_len before referencing options.

The struct ip_tunnel_info has a flexible array member named
options that is protected by a counted_by(options_len)
attribute.

The compiler will use this information to enforce runtime bounds
checking deployed by FORTIFY_SOURCE string helpers.

As laid out in the GCC documentation, the counter must be
initialized before the first reference to the flexible array
member.

After scanning through the files that use struct ip_tunnel_info
and also refer to options or options_len, it appears the normal
case is to use the ip_tunnel_info_opts_set() helper.

Said helper would initialize options_len properly before copying
data into options, however in the GRE ERSPAN code a partial
update is done, preventing the use of the helper function.

Before this change the handling of ERSPAN traffic in GRE tunnels
would cause a kernel panic when the kernel is compiled with
GCC 15+ and having FORTIFY_SOURCE configured:

memcpy: detected buffer overflow: 4 byte write of buffer size 0

Call Trace:
 &lt;IRQ&gt;
 __fortify_panic+0xd/0xf
 erspan_rcv.cold+0x68/0x83
 ? ip_route_input_slow+0x816/0x9d0
 gre_rcv+0x1b2/0x1c0
 gre_rcv+0x8e/0x100
 ? raw_v4_input+0x2a0/0x2b0
 ip_protocol_deliver_rcu+0x1ea/0x210
 ip_local_deliver_finish+0x86/0x110
 ip_local_deliver+0x65/0x110
 ? ip_rcv_finish_core+0xd6/0x360
 ip_rcv+0x186/0x1a0

Reported-at: https://launchpad.net/bugs/2129580
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71128/">CVE-2025-71128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71128">CVE-2025-71128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256769">SUSE bug 1256769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256771">SUSE bug 1256771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71129</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71129" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71129" ref_url="https://www.suse.com/security/cve/CVE-2025-71129" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

LoongArch: BPF: Sign extend kfunc call arguments

The kfunc calls are native calls so they should follow LoongArch calling
conventions. Sign extend its arguments properly to avoid kernel panic.
This is done by adding a new emit_abi_ext() helper. The emit_abi_ext()
helper performs extension in place meaning a value already store in the
target register (Note: this is different from the existing sign_extend()
helper and thus we can't reuse it).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71129/">CVE-2025-71129 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71129">CVE-2025-71129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256778">SUSE bug 1256778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71130</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71130" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71130" ref_url="https://www.suse.com/security/cve/CVE-2025-71130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gem: Zero-initialize the eb.vma array in i915_gem_do_execbuffer

Initialize the eb.vma array with values of 0 when the eb structure is
first set up. In particular, this sets the eb-&gt;vma[i].vma pointers to
NULL, simplifying cleanup and getting rid of the bug described below.

During the execution of eb_lookup_vmas(), the eb-&gt;vma array is
successively filled up with struct eb_vma objects. This process includes
calling eb_add_vma(), which might fail; however, even in the event of
failure, eb-&gt;vma[i].vma is set for the currently processed buffer.

If eb_add_vma() fails, eb_lookup_vmas() returns with an error, which
prompts a call to eb_release_vmas() to clean up the mess. Since
eb_lookup_vmas() might fail during processing any (possibly not first)
buffer, eb_release_vmas() checks whether a buffer's vma is NULL to know
at what point did the lookup function fail.

In eb_lookup_vmas(), eb-&gt;vma[i].vma is set to NULL if either the helper
function eb_lookup_vma() or eb_validate_vma() fails. eb-&gt;vma[i+1].vma is
set to NULL in case i915_gem_object_userptr_submit_init() fails; the
current one needs to be cleaned up by eb_release_vmas() at this point,
so the next one is set. If eb_add_vma() fails, neither the current nor
the next vma is set to NULL, which is a source of a NULL deref bug
described in the issue linked in the Closes tag.

When entering eb_lookup_vmas(), the vma pointers are set to the slab
poison value, instead of NULL. This doesn't matter for the actual
lookup, since it gets overwritten anyway, however the eb_release_vmas()
function only recognizes NULL as the stopping value, hence the pointers
are being set to NULL as they go in case of intermediate failure. This
patch changes the approach to filling them all with NULL at the start
instead, rather than handling that manually during failure.

(cherry picked from commit 08889b706d4f0b8d2352b7ca29c2d8df4d0787cd)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71130/">CVE-2025-71130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71130">CVE-2025-71130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256741">SUSE bug 1256741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71131</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71131" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71131" ref_url="https://www.suse.com/security/cve/CVE-2025-71131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: seqiv - Do not use req-&gt;iv after crypto_aead_encrypt

As soon as crypto_aead_encrypt is called, the underlying request
may be freed by an asynchronous completion.  Thus dereferencing
req-&gt;iv after it returns is invalid.

Instead of checking req-&gt;iv against info, create a new variable
unaligned_info and use it for that purpose instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-17"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71131/">CVE-2025-71131 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71131">CVE-2025-71131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256742">SUSE bug 1256742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71132</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71132" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71132" ref_url="https://www.suse.com/security/cve/CVE-2025-71132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smc91x: fix broken irq-context in PREEMPT_RT

When smc91x.c is built with PREEMPT_RT, the following splat occurs
in FVP_RevC:

[   13.055000] smc91x LNRO0003:00 eth0: link up, 10Mbps, half-duplex, lpa 0x0000
[   13.062137] BUG: workqueue leaked atomic, lock or RCU: kworker/2:1[106]
[   13.062137]      preempt=0x00000000 lock=0-&gt;0 RCU=0-&gt;1 workfn=mld_ifc_work
[   13.062266] C
** replaying previous printk message **
[   13.062266] CPU: 2 UID: 0 PID: 106 Comm: kworker/2:1 Not tainted 6.18.0-dirty #179 PREEMPT_{RT,(full)}
[   13.062353] Hardware name:  , BIOS
[   13.062382] Workqueue: mld mld_ifc_work
[   13.062469] Call trace:
[   13.062494]  show_stack+0x24/0x40 (C)
[   13.062602]  __dump_stack+0x28/0x48
[   13.062710]  dump_stack_lvl+0x7c/0xb0
[   13.062818]  dump_stack+0x18/0x34
[   13.062926]  process_scheduled_works+0x294/0x450
[   13.063043]  worker_thread+0x260/0x3d8
[   13.063124]  kthread+0x1c4/0x228
[   13.063235]  ret_from_fork+0x10/0x20

This happens because smc_special_trylock() disables IRQs even on PREEMPT_RT,
but smc_special_unlock() does not restore IRQs on PREEMPT_RT.
The reason is that smc_special_unlock() calls spin_unlock_irqrestore(),
and rcu_read_unlock_bh() in __dev_queue_xmit() cannot invoke
rcu_read_unlock() through __local_bh_enable_ip() when current-&gt;softirq_disable_cnt becomes zero.

To address this issue, replace smc_special_trylock() with spin_trylock_irqsave().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71132/">CVE-2025-71132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71132">CVE-2025-71132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256737">SUSE bug 1256737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71133</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71133" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71133" ref_url="https://www.suse.com/security/cve/CVE-2025-71133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: avoid invalid read in irdma_net_event

irdma_net_event() should not dereference anything from "neigh" (alias
"ptr") until it has checked that the event is NETEVENT_NEIGH_UPDATE.
Other events come with different structures pointed to by "ptr" and they
may be smaller than struct neighbour.

Move the read of neigh-&gt;dev under the NETEVENT_NEIGH_UPDATE case.

The bug is mostly harmless, but it triggers KASAN on debug kernels:

 BUG: KASAN: stack-out-of-bounds in irdma_net_event+0x32e/0x3b0 [irdma]
 Read of size 8 at addr ffffc900075e07f0 by task kworker/27:2/542554

 CPU: 27 PID: 542554 Comm: kworker/27:2 Kdump: loaded Not tainted 5.14.0-630.el9.x86_64+debug #1
 Hardware name: [...]
 Workqueue: events rt6_probe_deferred
 Call Trace:
  &lt;IRQ&gt;
  dump_stack_lvl+0x60/0xb0
  print_address_description.constprop.0+0x2c/0x3f0
  print_report+0xb4/0x270
  kasan_report+0x92/0xc0
  irdma_net_event+0x32e/0x3b0 [irdma]
  notifier_call_chain+0x9e/0x180
  atomic_notifier_call_chain+0x5c/0x110
  rt6_do_redirect+0xb91/0x1080
  tcp_v6_err+0xe9b/0x13e0
  icmpv6_notify+0x2b2/0x630
  ndisc_redirect_rcv+0x328/0x530
  icmpv6_rcv+0xc16/0x1360
  ip6_protocol_deliver_rcu+0xb84/0x12e0
  ip6_input_finish+0x117/0x240
  ip6_input+0xc4/0x370
  ipv6_rcv+0x420/0x7d0
  __netif_receive_skb_one_core+0x118/0x1b0
  process_backlog+0xd1/0x5d0
  __napi_poll.constprop.0+0xa3/0x440
  net_rx_action+0x78a/0xba0
  handle_softirqs+0x2d4/0x9c0
  do_softirq+0xad/0xe0
  &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71133/">CVE-2025-71133 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71133">CVE-2025-71133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256733">SUSE bug 1256733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71134</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71134" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71134" ref_url="https://www.suse.com/security/cve/CVE-2025-71134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/page_alloc: change all pageblocks migrate type on coalescing

When a page is freed it coalesces with a buddy into a higher order page
while possible.  When the buddy page migrate type differs, it is expected
to be updated to match the one of the page being freed.

However, only the first pageblock of the buddy page is updated, while the
rest of the pageblocks are left unchanged.

That causes warnings in later expand() and other code paths (like below),
since an inconsistency between migration type of the list containing the
page and the page-owned pageblocks migration types is introduced.

[  308.986589] ------------[ cut here ]------------
[  308.987227] page type is 0, passed migratetype is 1 (nr=256)
[  308.987275] WARNING: CPU: 1 PID: 5224 at mm/page_alloc.c:812 expand+0x23c/0x270
[  308.987293] Modules linked in: algif_hash(E) af_alg(E) nft_fib_inet(E) nft_fib_ipv4(E) nft_fib_ipv6(E) nft_fib(E) nft_reject_inet(E) nf_reject_ipv4(E) nf_reject_ipv6(E) nft_reject(E) nft_ct(E) nft_chain_nat(E) nf_nat(E) nf_conntrack(E) nf_defrag_ipv6(E) nf_defrag_ipv4(E) nf_tables(E) s390_trng(E) vfio_ccw(E) mdev(E) vfio_iommu_type1(E) vfio(E) sch_fq_codel(E) drm(E) i2c_core(E) drm_panel_orientation_quirks(E) loop(E) nfnetlink(E) vsock_loopback(E) vmw_vsock_virtio_transport_common(E) vsock(E) ctcm(E) fsm(E) diag288_wdt(E) watchdog(E) zfcp(E) scsi_transport_fc(E) ghash_s390(E) prng(E) aes_s390(E) des_generic(E) des_s390(E) libdes(E) sha3_512_s390(E) sha3_256_s390(E) sha_common(E) paes_s390(E) crypto_engine(E) pkey_cca(E) pkey_ep11(E) zcrypt(E) rng_core(E) pkey_pckmo(E) pkey(E) autofs4(E)
[  308.987439] Unloaded tainted modules: hmac_s390(E):2
[  308.987650] CPU: 1 UID: 0 PID: 5224 Comm: mempig_verify Kdump: loaded Tainted: G            E       6.18.0-gcc-bpf-debug #431 PREEMPT
[  308.987657] Tainted: [E]=UNSIGNED_MODULE
[  308.987661] Hardware name: IBM 3906 M04 704 (z/VM 7.3.0)
[  308.987666] Krnl PSW : 0404f00180000000 00000349976fa600 (expand+0x240/0x270)
[  308.987676]            R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:3 PM:0 RI:0 EA:3
[  308.987682] Krnl GPRS: 0000034980000004 0000000000000005 0000000000000030 000003499a0e6d88
[  308.987688]            0000000000000005 0000034980000005 000002be803ac000 0000023efe6c8300
[  308.987692]            0000000000000008 0000034998d57290 000002be00000100 0000023e00000008
[  308.987696]            0000000000000000 0000000000000000 00000349976fa5fc 000002c99b1eb6f0
[  308.987708] Krnl Code: 00000349976fa5f0: c020008a02f2	larl	%r2,000003499883abd4
                          00000349976fa5f6: c0e5ffe3f4b5	brasl	%r14,0000034997378f60
                         #00000349976fa5fc: af000000		mc	0,0
                         &gt;00000349976fa600: a7f4ff4c		brc	15,00000349976fa498
                          00000349976fa604: b9040026		lgr	%r2,%r6
                          00000349976fa608: c0300088317f	larl	%r3,0000034998800906
                          00000349976fa60e: c0e5fffdb6e1	brasl	%r14,00000349976b13d0
                          00000349976fa614: af000000		mc	0,0
[  308.987734] Call Trace:
[  308.987738]  [&lt;00000349976fa600&gt;] expand+0x240/0x270
[  308.987744] ([&lt;00000349976fa5fc&gt;] expand+0x23c/0x270)
[  308.987749]  [&lt;00000349976ff95e&gt;] rmqueue_bulk+0x71e/0x940
[  308.987754]  [&lt;00000349976ffd7e&gt;] __rmqueue_pcplist+0x1fe/0x2a0
[  308.987759]  [&lt;0000034997700966&gt;] rmqueue.isra.0+0xb46/0xf40
[  308.987763]  [&lt;0000034997703ec8&gt;] get_page_from_freelist+0x198/0x8d0
[  308.987768]  [&lt;0000034997706fa8&gt;] __alloc_frozen_pages_noprof+0x198/0x400
[  308.987774]  [&lt;00000349977536f8&gt;] alloc_pages_mpol+0xb8/0x220
[  308.987781]  [&lt;0000034997753bf6&gt;] folio_alloc_mpol_noprof+0x26/0xc0
[  308.987786]  [&lt;0000034997753e4c&gt;] vma_alloc_folio_noprof+0x6c/0xa0
[  308.987791]  [&lt;0000034997775b22&gt;] vma_alloc_anon_folio_pmd+0x42/0x240
[  308.987799]  [&lt;000003499777bfea&gt;] __do_huge_pmd_anonymous_page+0x3a/0x210
[  308.987804]  [&lt;00000349976cb0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71134/">CVE-2025-71134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71134">CVE-2025-71134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256732">SUSE bug 1256732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71135</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71135" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71135" ref_url="https://www.suse.com/security/cve/CVE-2025-71135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt()

The variable mddev-&gt;private is first assigned to conf and then checked:

  conf = mddev-&gt;private;
  if (!conf) ...

If conf is NULL, then mddev-&gt;private is also NULL. In this case,
null-pointer dereferences can occur when calling raid5_quiesce():

  raid5_quiesce(mddev, true);
  raid5_quiesce(mddev, false);

since mddev-&gt;private is assigned to conf again in raid5_quiesce(), and conf
is dereferenced in several places, for example:

  conf-&gt;quiesce = 0;
  wake_up(&amp;conf-&gt;wait_for_quiescent);

To fix this issue, the function should unlock mddev and return before
invoking raid5_quiesce() when conf is NULL, following the existing pattern
in raid5_change_consistency_policy().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71135/">CVE-2025-71135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71135">CVE-2025-71135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256761">SUSE bug 1256761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71136</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71136" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71136" ref_url="https://www.suse.com/security/cve/CVE-2025-71136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status()

It's possible for cp_read() and hdmi_read() to return -EIO. Those
values are further used as indexes for accessing arrays.

Fix that by checking return values where it's needed.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-17"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71136/">CVE-2025-71136 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71136">CVE-2025-71136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256759">SUSE bug 1256759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71137</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71137" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71137" ref_url="https://www.suse.com/security/cve/CVE-2025-71137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: fix "UBSAN: shift-out-of-bounds error"

This patch ensures that the RX ring size (rx_pending) is not
set below the permitted length. This avoids UBSAN
shift-out-of-bounds errors when users passes small or zero
ring sizes via ethtool -G.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71137/">CVE-2025-71137 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71137">CVE-2025-71137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256760">SUSE bug 1256760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71138</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71138" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71138" ref_url="https://www.suse.com/security/cve/CVE-2025-71138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: Add missing NULL pointer check for pingpong interface

It is checked almost always in dpu_encoder_phys_wb_setup_ctl(), but in a
single place the check is missing.
Also use convenient locals instead of phys_enc-&gt;* where available.

Patchwork: https://patchwork.freedesktop.org/patch/693860/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71138/">CVE-2025-71138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71138">CVE-2025-71138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256785">SUSE bug 1256785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71139</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71139" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71139" ref_url="https://www.suse.com/security/cve/CVE-2025-71139" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kernel/kexec: fix IMA when allocation happens in CMA area

*** Bug description ***

When I tested kexec with the latest kernel, I ran into the following warning:

[   40.712410] ------------[ cut here ]------------
[   40.712576] WARNING: CPU: 2 PID: 1562 at kernel/kexec_core.c:1001 kimage_map_segment+0x144/0x198
[...]
[   40.816047] Call trace:
[   40.818498]  kimage_map_segment+0x144/0x198 (P)
[   40.823221]  ima_kexec_post_load+0x58/0xc0
[   40.827246]  __do_sys_kexec_file_load+0x29c/0x368
[...]
[   40.855423] ---[ end trace 0000000000000000 ]---

*** How to reproduce ***

This bug is only triggered when the kexec target address is allocated in
the CMA area. If no CMA area is reserved in the kernel, use the "cma="
option in the kernel command line to reserve one.

*** Root cause ***
The commit 07d24902977e ("kexec: enable CMA based contiguous
allocation") allocates the kexec target address directly on the CMA area
to avoid copying during the jump. In this case, there is no IND_SOURCE
for the kexec segment.  But the current implementation of
kimage_map_segment() assumes that IND_SOURCE pages exist and map them
into a contiguous virtual address by vmap().

*** Solution ***
If IMA segment is allocated in the CMA area, use its page_address()
directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71139/">CVE-2025-71139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71139">CVE-2025-71139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256753">SUSE bug 1256753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71140</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71140" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71140" ref_url="https://www.suse.com/security/cve/CVE-2025-71140" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mediatek: vcodec: Use spinlock for context list protection lock

Previously a mutex was added to protect the encoder and decoder context
lists from unexpected changes originating from the SCP IP block, causing
the context pointer to go invalid, resulting in a NULL pointer
dereference in the IPI handler.

Turns out on the MT8173, the VPU IPI handler is called from hard IRQ
context. This causes a big warning from the scheduler. This was first
reported downstream on the ChromeOS kernels, but is also reproducible
on mainline using Fluster with the FFmpeg v4l2m2m decoders. Even though
the actual capture format is not supported, the affected code paths
are triggered.

Since this lock just protects the context list and operations on it are
very fast, it should be OK to switch to a spinlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71140/">CVE-2025-71140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71140">CVE-2025-71140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256786">SUSE bug 1256786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71141</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71141" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71141" ref_url="https://www.suse.com/security/cve/CVE-2025-71141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/tilcdc: Fix removal actions in case of failed probe

The drm_kms_helper_poll_fini() and drm_atomic_helper_shutdown() helpers
should only be called when the device has been successfully registered.
Currently, these functions are called unconditionally in tilcdc_fini(),
which causes warnings during probe deferral scenarios.

[    7.972317] WARNING: CPU: 0 PID: 23 at drivers/gpu/drm/drm_atomic_state_helper.c:175 drm_atomic_helper_crtc_duplicate_state+0x60/0x68
...
[    8.005820]  drm_atomic_helper_crtc_duplicate_state from drm_atomic_get_crtc_state+0x68/0x108
[    8.005858]  drm_atomic_get_crtc_state from drm_atomic_helper_disable_all+0x90/0x1c8
[    8.005885]  drm_atomic_helper_disable_all from drm_atomic_helper_shutdown+0x90/0x144
[    8.005911]  drm_atomic_helper_shutdown from tilcdc_fini+0x68/0xf8 [tilcdc]
[    8.005957]  tilcdc_fini [tilcdc] from tilcdc_pdev_probe+0xb0/0x6d4 [tilcdc]

Fix this by rewriting the failed probe cleanup path using the standard
goto error handling pattern, which ensures that cleanup functions are
only called on successfully initialized resources. Additionally, remove
the now-unnecessary is_registered flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71141/">CVE-2025-71141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71141">CVE-2025-71141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256756">SUSE bug 1256756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71142</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71142" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71142" ref_url="https://www.suse.com/security/cve/CVE-2025-71142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpuset: fix warning when disabling remote partition

A warning was triggered as follows:

WARNING: kernel/cgroup/cpuset.c:1651 at remote_partition_disable+0xf7/0x110
RIP: 0010:remote_partition_disable+0xf7/0x110
RSP: 0018:ffffc90001947d88 EFLAGS: 00000206
RAX: 0000000000007fff RBX: ffff888103b6e000 RCX: 0000000000006f40
RDX: 0000000000006f00 RSI: ffffc90001947da8 RDI: ffff888103b6e000
RBP: ffff888103b6e000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000001 R11: ffff88810b2e2728 R12: ffffc90001947da8
R13: 0000000000000000 R14: ffffc90001947da8 R15: ffff8881081f1c00
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f55c8bbe0b2 CR3: 000000010b14c000 CR4: 00000000000006f0
Call Trace:
 &lt;TASK&gt;
 update_prstate+0x2d3/0x580
 cpuset_partition_write+0x94/0xf0
 kernfs_fop_write_iter+0x147/0x200
 vfs_write+0x35d/0x500
 ksys_write+0x66/0xe0
 do_syscall_64+0x6b/0x390
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
RIP: 0033:0x7f55c8cd4887

Reproduction steps (on a 16-CPU machine):

        # cd /sys/fs/cgroup/
        # mkdir A1
        # echo +cpuset &gt; A1/cgroup.subtree_control
        # echo "0-14" &gt; A1/cpuset.cpus.exclusive
        # mkdir A1/A2
        # echo "0-14" &gt; A1/A2/cpuset.cpus.exclusive
        # echo "root" &gt; A1/A2/cpuset.cpus.partition
        # echo 0 &gt; /sys/devices/system/cpu/cpu15/online
        # echo member &gt; A1/A2/cpuset.cpus.partition

When CPU 15 is offlined, subpartitions_cpus gets cleared because no CPUs
remain available for the top_cpuset, forcing partitions to share CPUs with
the top_cpuset. In this scenario, disabling the remote partition triggers
a warning stating that effective_xcpus is not a subset of
subpartitions_cpus. Partitions should be invalidated in this case to
inform users that the partition is now invalid(cpus are shared with
top_cpuset).

To fix this issue:
1. Only emit the warning only if subpartitions_cpus is not empty and the
   effective_xcpus is not a subset of subpartitions_cpus.
2. During the CPU hotplug process, invalidate partitions if
   subpartitions_cpus is empty.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71142/">CVE-2025-71142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71142">CVE-2025-71142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256748">SUSE bug 1256748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71143</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71143" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71143" ref_url="https://www.suse.com/security/cve/CVE-2025-71143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: samsung: exynos-clkout: Assign .num before accessing .hws

Commit f316cdff8d67 ("clk: Annotate struct clk_hw_onecell_data with
__counted_by") annotated the hws member of 'struct clk_hw_onecell_data'
with __counted_by, which informs the bounds sanitizer (UBSAN_BOUNDS)
about the number of elements in .hws[], so that it can warn when .hws[]
is accessed out of bounds. As noted in that change, the __counted_by
member must be initialized with the number of elements before the first
array access happens, otherwise there will be a warning from each access
prior to the initialization because the number of elements is zero. This
occurs in exynos_clkout_probe() due to .num being assigned after .hws[]
has been accessed:

  UBSAN: array-index-out-of-bounds in drivers/clk/samsung/clk-exynos-clkout.c:178:18
  index 0 is out of range for type 'clk_hw *[*]'

Move the .num initialization to before the first access of .hws[],
clearing up the warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-17"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71143/">CVE-2025-71143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71143">CVE-2025-71143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256749">SUSE bug 1256749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71144</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71144" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71144" ref_url="https://www.suse.com/security/cve/CVE-2025-71144" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: ensure context reset on disconnect()

After the blamed commit below, if the MPC subflow is already in TCP_CLOSE
status or has fallback to TCP at mptcp_disconnect() time,
mptcp_do_fastclose() skips setting the `send_fastclose flag` and the later
__mptcp_close_ssk() does not reset anymore the related subflow context.

Any later connection will be created with both the `request_mptcp` flag
and the msk-level fallback status off (it is unconditionally cleared at
MPTCP disconnect time), leading to a warning in subflow_data_ready():

  WARNING: CPU: 26 PID: 8996 at net/mptcp/subflow.c:1519 subflow_data_ready (net/mptcp/subflow.c:1519 (discriminator 13))
  Modules linked in:
  CPU: 26 UID: 0 PID: 8996 Comm: syz.22.39 Not tainted 6.18.0-rc7-05427-g11fc074f6c36 #1 PREEMPT(voluntary)
  Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
  RIP: 0010:subflow_data_ready (net/mptcp/subflow.c:1519 (discriminator 13))
  Code: 90 0f 0b 90 90 e9 04 fe ff ff e8 b7 1e f5 fe 89 ee bf 07 00 00 00 e8 db 19 f5 fe 83 fd 07 0f 84 35 ff ff ff e8 9d 1e f5 fe 90 &lt;0f&gt; 0b 90 e9 27 ff ff ff e8 8f 1e f5 fe 4c 89 e7 48 89 de e8 14 09
  RSP: 0018:ffffc9002646fb30 EFLAGS: 00010293
  RAX: 0000000000000000 RBX: ffff88813b218000 RCX: ffffffff825c8435
  RDX: ffff8881300b3580 RSI: ffffffff825c8443 RDI: 0000000000000005
  RBP: 000000000000000b R08: ffffffff825c8435 R09: 000000000000000b
  R10: 0000000000000005 R11: 0000000000000007 R12: ffff888131ac0000
  R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
  FS:  00007f88330af6c0(0000) GS:ffff888a93dd2000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f88330aefe8 CR3: 000000010ff59000 CR4: 0000000000350ef0
  Call Trace:
   &lt;TASK&gt;
   tcp_data_ready (net/ipv4/tcp_input.c:5356)
   tcp_data_queue (net/ipv4/tcp_input.c:5445)
   tcp_rcv_state_process (net/ipv4/tcp_input.c:7165)
   tcp_v4_do_rcv (net/ipv4/tcp_ipv4.c:1955)
   __release_sock (include/net/sock.h:1158 (discriminator 6) net/core/sock.c:3180 (discriminator 6))
   release_sock (net/core/sock.c:3737)
   mptcp_sendmsg (net/mptcp/protocol.c:1763 net/mptcp/protocol.c:1857)
   inet_sendmsg (net/ipv4/af_inet.c:853 (discriminator 7))
   __sys_sendto (net/socket.c:727 (discriminator 15) net/socket.c:742 (discriminator 15) net/socket.c:2244 (discriminator 15))
   __x64_sys_sendto (net/socket.c:2247)
   do_syscall_64 (arch/x86/entry/syscall_64.c:63 (discriminator 1) arch/x86/entry/syscall_64.c:94 (discriminator 1))
   entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)
  RIP: 0033:0x7f883326702d

Address the issue setting an explicit `fastclosing` flag at fastclose
time, and checking such flag after mptcp_do_fastclose().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71144/">CVE-2025-71144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71144">CVE-2025-71144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256751">SUSE bug 1256751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71145</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71145" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71145" ref_url="https://www.suse.com/security/cve/CVE-2025-71145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: phy: isp1301: fix non-OF device reference imbalance

A recent change fixing a device reference leak in a UDC driver
introduced a potential use-after-free in the non-OF case as the
isp1301_get_client() helper only increases the reference count for the
returned I2C device in the OF case.

Increment the reference count also for non-OF so that the caller can
decrement it unconditionally.

Note that this is inherently racy just as using the returned I2C device
is since nothing is preventing the PHY driver from being unbound while
in use.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71145/">CVE-2025-71145 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71145">CVE-2025-71145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257155">SUSE bug 1257155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257156">SUSE bug 1257156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71147</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71147" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71147" ref_url="https://www.suse.com/security/cve/CVE-2025-71147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KEYS: trusted: Fix a memory leak in tpm2_load_cmd

'tpm2_load_cmd' allocates a tempoary blob indirectly via 'tpm2_key_decode'
but it is not freed in the failure paths. Address this by wrapping the blob
into with a cleanup helper.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71147/">CVE-2025-71147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71147">CVE-2025-71147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257158">SUSE bug 1257158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71148</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71148" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71148" ref_url="https://www.suse.com/security/cve/CVE-2025-71148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/handshake: restore destructor on submit failure

handshake_req_submit() replaces sk-&gt;sk_destruct but never restores it when
submission fails before the request is hashed. handshake_sk_destruct() then
returns early and the original destructor never runs, leaking the socket.
Restore sk_destruct on the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71148/">CVE-2025-71148 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71148">CVE-2025-71148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257159">SUSE bug 1257159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71149</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71149" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71149" ref_url="https://www.suse.com/security/cve/CVE-2025-71149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/poll: correctly handle io_poll_add() return value on update

When the core of io_uring was updated to handle completions
consistently and with fixed return codes, the POLL_REMOVE opcode
with updates got slightly broken. If a POLL_ADD is pending and
then POLL_REMOVE is used to update the events of that request, if that
update causes the POLL_ADD to now trigger, then that completion is lost
and a CQE is never posted.

Additionally, ensure that if an update does cause an existing POLL_ADD
to complete, that the completion value isn't always overwritten with
-ECANCELED. For that case, whatever io_poll_add() set the value to
should just be retained.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71149/">CVE-2025-71149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71149">CVE-2025-71149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257164">SUSE bug 1257164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71154</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71154" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71154" ref_url="https://www.suse.com/security/cve/CVE-2025-71154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: rtl8150: fix memory leak on usb_submit_urb() failure

In async_set_registers(), when usb_submit_urb() fails, the allocated
  async_req structure and URB are not freed, causing a memory leak.

  The completion callback async_set_reg_cb() is responsible for freeing
  these allocations, but it is only called after the URB is successfully
  submitted and completes (successfully or with error). If submission
  fails, the callback never runs and the memory is leaked.

  Fix this by freeing both the URB and the request structure in the error
  path when usb_submit_urb() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71154/">CVE-2025-71154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71154">CVE-2025-71154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257163">SUSE bug 1257163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71156</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71156" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71156" ref_url="https://www.suse.com/security/cve/CVE-2025-71156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gve: defer interrupt enabling until NAPI registration

Currently, interrupts are automatically enabled immediately upon
request. This allows interrupt to fire before the associated NAPI
context is fully initialized and cause failures like below:

[    0.946369] Call Trace:
[    0.946369]  &lt;IRQ&gt;
[    0.946369]  __napi_poll+0x2a/0x1e0
[    0.946369]  net_rx_action+0x2f9/0x3f0
[    0.946369]  handle_softirqs+0xd6/0x2c0
[    0.946369]  ? handle_edge_irq+0xc1/0x1b0
[    0.946369]  __irq_exit_rcu+0xc3/0xe0
[    0.946369]  common_interrupt+0x81/0xa0
[    0.946369]  &lt;/IRQ&gt;
[    0.946369]  &lt;TASK&gt;
[    0.946369]  asm_common_interrupt+0x22/0x40
[    0.946369] RIP: 0010:pv_native_safe_halt+0xb/0x10

Use the `IRQF_NO_AUTOEN` flag when requesting interrupts to prevent auto
enablement and explicitly enable the interrupt in NAPI initialization
path (and disable it during NAPI teardown).

This ensures that interrupt lifecycle is strictly coupled with
readiness of NAPI context.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71156/">CVE-2025-71156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71156">CVE-2025-71156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257167">SUSE bug 1257167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71157</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71157" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71157" ref_url="https://www.suse.com/security/cve/CVE-2025-71157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: always drop device refcount in ib_del_sub_device_and_put()

Since nldev_deldev() (introduced by commit 060c642b2ab8 ("RDMA/nldev: Add
support to add/delete a sub IB device through netlink") grabs a reference
using ib_device_get_by_index() before calling ib_del_sub_device_and_put(),
we need to drop that reference before returning -EOPNOTSUPP error.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71157/">CVE-2025-71157 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71157">CVE-2025-71157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257168">SUSE bug 1257168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71161</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71161" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71161" ref_url="https://www.suse.com/security/cve/CVE-2025-71161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm-verity: disable recursive forward error correction

There are two problems with the recursive correction:

1. It may cause denial-of-service. In fec_read_bufs, there is a loop that
has 253 iterations. For each iteration, we may call verity_hash_for_block
recursively. There is a limit of 4 nested recursions - that means that
there may be at most 253^4 (4 billion) iterations. Red Hat QE team
actually created an image that pushes dm-verity to this limit - and this
image just makes the udev-worker process get stuck in the 'D' state.

2. It doesn't work. In fec_read_bufs we store data into the variable
"fio-&gt;bufs", but fio bufs is shared between recursive invocations, if
"verity_hash_for_block" invoked correction recursively, it would
overwrite partially filled fio-&gt;bufs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71161/">CVE-2025-71161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71161">CVE-2025-71161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257174">SUSE bug 1257174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71162</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71162" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71162" ref_url="https://www.suse.com/security/cve/CVE-2025-71162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: tegra-adma: Fix use-after-free

A use-after-free bug exists in the Tegra ADMA driver when audio streams
are terminated, particularly during XRUN conditions. The issue occurs
when the DMA buffer is freed by tegra_adma_terminate_all() before the
vchan completion tasklet finishes accessing it.

The race condition follows this sequence:

  1. DMA transfer completes, triggering an interrupt that schedules the
     completion tasklet (tasklet has not executed yet)
  2. Audio playback stops, calling tegra_adma_terminate_all() which
     frees the DMA buffer memory via kfree()
  3. The scheduled tasklet finally executes, calling vchan_complete()
     which attempts to access the already-freed memory

Since tasklets can execute at any time after being scheduled, there is
no guarantee that the buffer will remain valid when vchan_complete()
runs.

Fix this by properly synchronizing the virtual channel completion:
 - Calling vchan_terminate_vdesc() in tegra_adma_stop() to mark the
   descriptors as terminated instead of freeing the descriptor.
 - Add the callback tegra_adma_synchronize() that calls
   vchan_synchronize() which kills any pending tasklets and frees any
   terminated descriptors.

Crash logs:
[  337.427523] BUG: KASAN: use-after-free in vchan_complete+0x124/0x3b0
[  337.427544] Read of size 8 at addr ffff000132055428 by task swapper/0/0

[  337.427562] Call trace:
[  337.427564]  dump_backtrace+0x0/0x320
[  337.427571]  show_stack+0x20/0x30
[  337.427575]  dump_stack_lvl+0x68/0x84
[  337.427584]  print_address_description.constprop.0+0x74/0x2b8
[  337.427590]  kasan_report+0x1f4/0x210
[  337.427598]  __asan_load8+0xa0/0xd0
[  337.427603]  vchan_complete+0x124/0x3b0
[  337.427609]  tasklet_action_common.constprop.0+0x190/0x1d0
[  337.427617]  tasklet_action+0x30/0x40
[  337.427623]  __do_softirq+0x1a0/0x5c4
[  337.427628]  irq_exit+0x110/0x140
[  337.427633]  handle_domain_irq+0xa4/0xe0
[  337.427640]  gic_handle_irq+0x64/0x160
[  337.427644]  call_on_irq_stack+0x20/0x4c
[  337.427649]  do_interrupt_handler+0x7c/0x90
[  337.427654]  el1_interrupt+0x30/0x80
[  337.427659]  el1h_64_irq_handler+0x18/0x30
[  337.427663]  el1h_64_irq+0x7c/0x80
[  337.427667]  cpuidle_enter_state+0xe4/0x540
[  337.427674]  cpuidle_enter+0x54/0x80
[  337.427679]  do_idle+0x2e0/0x380
[  337.427685]  cpu_startup_entry+0x2c/0x70
[  337.427690]  rest_init+0x114/0x130
[  337.427695]  arch_call_rest_init+0x18/0x24
[  337.427702]  start_kernel+0x380/0x3b4
[  337.427706]  __primary_switched+0xc0/0xc8
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71162/">CVE-2025-71162 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71162">CVE-2025-71162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257204">SUSE bug 1257204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71163</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71163" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71163" ref_url="https://www.suse.com/security/cve/CVE-2025-71163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: fix device leaks on compat bind and unbind

Make sure to drop the reference taken when looking up the idxd device as
part of the compat bind and unbind sysfs interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71163/">CVE-2025-71163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71163">CVE-2025-71163 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257215">SUSE bug 1257215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71182</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71182" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71182" ref_url="https://www.suse.com/security/cve/CVE-2025-71182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: make j1939_session_activate() fail if device is no longer registered

syzbot is still reporting

  unregister_netdevice: waiting for vcan0 to become free. Usage count = 2

even after commit 93a27b5891b8 ("can: j1939: add missing calls in
NETDEV_UNREGISTER notification handler") was added. A debug printk() patch
found that j1939_session_activate() can succeed even after
j1939_cancel_active_session() from j1939_netdev_notify(NETDEV_UNREGISTER)
has completed.

Since j1939_cancel_active_session() is processed with the session list lock
held, checking ndev-&gt;reg_state in j1939_session_activate() with the session
list lock held can reliably close the race window.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71182/">CVE-2025-71182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71182">CVE-2025-71182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257586">SUSE bug 1257586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71183</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71183" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71183" ref_url="https://www.suse.com/security/cve/CVE-2025-71183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: always detect conflicting inodes when logging inode refs

After rename exchanging (either with the rename exchange operation or
regular renames in multiple non-atomic steps) two inodes and at least
one of them is a directory, we can end up with a log tree that contains
only of the inodes and after a power failure that can result in an attempt
to delete the other inode when it should not because it was not deleted
before the power failure. In some case that delete attempt fails when
the target inode is a directory that contains a subvolume inside it, since
the log replay code is not prepared to deal with directory entries that
point to root items (only inode items).

1) We have directories "dir1" (inode A) and "dir2" (inode B) under the
   same parent directory;

2) We have a file (inode C) under directory "dir1" (inode A);

3) We have a subvolume inside directory "dir2" (inode B);

4) All these inodes were persisted in a past transaction and we are
   currently at transaction N;

5) We rename the file (inode C), so at btrfs_log_new_name() we update
   inode C's last_unlink_trans to N;

6) We get a rename exchange for "dir1" (inode A) and "dir2" (inode B),
   so after the exchange "dir1" is inode B and "dir2" is inode A.
   During the rename exchange we call btrfs_log_new_name() for inodes
   A and B, but because they are directories, we don't update their
   last_unlink_trans to N;

7) An fsync against the file (inode C) is done, and because its inode
   has a last_unlink_trans with a value of N we log its parent directory
   (inode A) (through btrfs_log_all_parents(), called from
   btrfs_log_inode_parent()).

8) So we end up with inode B not logged, which now has the old name
   of inode A. At copy_inode_items_to_log(), when logging inode A, we
   did not check if we had any conflicting inode to log because inode
   A has a generation lower than the current transaction (created in
   a past transaction);

9) After a power failure, when replaying the log tree, since we find that
   inode A has a new name that conflicts with the name of inode B in the
   fs tree, we attempt to delete inode B... this is wrong since that
   directory was never deleted before the power failure, and because there
   is a subvolume inside that directory, attempting to delete it will fail
   since replay_dir_deletes() and btrfs_unlink_inode() are not prepared
   to deal with dir items that point to roots instead of inodes.

   When that happens the mount fails and we get a stack trace like the
   following:

   [87.2314] BTRFS info (device dm-0): start tree-log replay
   [87.2318] BTRFS critical (device dm-0): failed to delete reference to subvol, root 5 inode 256 parent 259
   [87.2332] ------------[ cut here ]------------
   [87.2338] BTRFS: Transaction aborted (error -2)
   [87.2346] WARNING: CPU: 1 PID: 638968 at fs/btrfs/inode.c:4345 __btrfs_unlink_inode+0x416/0x440 [btrfs]
   [87.2368] Modules linked in: btrfs loop dm_thin_pool (...)
   [87.2470] CPU: 1 UID: 0 PID: 638968 Comm: mount Tainted: G        W           6.18.0-rc7-btrfs-next-218+ #2 PREEMPT(full)
   [87.2489] Tainted: [W]=WARN
   [87.2494] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org 04/01/2014
   [87.2514] RIP: 0010:__btrfs_unlink_inode+0x416/0x440 [btrfs]
   [87.2538] Code: c0 89 04 24 (...)
   [87.2568] RSP: 0018:ffffc0e741f4b9b8 EFLAGS: 00010286
   [87.2574] RAX: 0000000000000000 RBX: ffff9d3ec8a6cf60 RCX: 0000000000000000
   [87.2582] RDX: 0000000000000002 RSI: ffffffff84ab45a1 RDI: 00000000ffffffff
   [87.2591] RBP: ffff9d3ec8a6ef20 R08: 0000000000000000 R09: ffffc0e741f4b840
   [87.2599] R10: ffff9d45dc1fffa8 R11: 0000000000000003 R12: ffff9d3ee26d77e0
   [87.2608] R13: ffffc0e741f4ba98 R14: ffff9d4458040800 R15: ffff9d44b6b7ca10
   [87.2618] FS:  00007f7b9603a840(0000) GS:ffff9d4658982000(0000) knlGS:0000000000000000
   [87.
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71183/">CVE-2025-71183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71183">CVE-2025-71183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257631">SUSE bug 1257631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71184</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71184" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71184" ref_url="https://www.suse.com/security/cve/CVE-2025-71184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix NULL dereference on root when tracing inode eviction

When evicting an inode the first thing we do is to setup tracing for it,
which implies fetching the root's id. But in btrfs_evict_inode() the
root might be NULL, as implied in the next check that we do in
btrfs_evict_inode().

Hence, we either should set the -&gt;root_objectid to 0 in case the root is
NULL, or we move tracing setup after checking that the root is not
NULL. Setting the rootid to 0 at least gives us the possibility to trace
this call even in the case when the root is NULL, so that's the solution
taken here.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71184/">CVE-2025-71184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71184">CVE-2025-71184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257635">SUSE bug 1257635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71185</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71185" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71185" ref_url="https://www.suse.com/security/cve/CVE-2025-71185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: ti: dma-crossbar: fix device leak on am335x route allocation

Make sure to drop the reference taken when looking up the crossbar
platform device during am335x route allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71185/">CVE-2025-71185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71185">CVE-2025-71185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257560">SUSE bug 1257560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71186</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71186" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71186" ref_url="https://www.suse.com/security/cve/CVE-2025-71186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: stm32: dmamux: fix device leak on route allocation

Make sure to drop the reference taken when looking up the DMA mux
platform device during route allocation.

Note that holding a reference to a device does not prevent its driver
data from going away so there is no point in keeping the reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71186/">CVE-2025-71186 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71186">CVE-2025-71186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257565">SUSE bug 1257565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71188</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71188" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71188" ref_url="https://www.suse.com/security/cve/CVE-2025-71188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: lpc18xx-dmamux: fix device leak on route allocation

Make sure to drop the reference taken when looking up the DMA mux
platform device during route allocation.

Note that holding a reference to a device does not prevent its driver
data from going away so there is no point in keeping the reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71188/">CVE-2025-71188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71188">CVE-2025-71188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257576">SUSE bug 1257576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71189</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71189" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71189" ref_url="https://www.suse.com/security/cve/CVE-2025-71189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: dw: dmamux: fix OF node leak on route allocation failure

Make sure to drop the reference taken to the DMA master OF node also on
late route allocation failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71189/">CVE-2025-71189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71189">CVE-2025-71189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257573">SUSE bug 1257573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71190</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71190" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71190" ref_url="https://www.suse.com/security/cve/CVE-2025-71190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: bcm-sba-raid: fix device leak on probe

Make sure to drop the reference taken when looking up the mailbox device
during probe on probe failures and on driver unbind.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71190/">CVE-2025-71190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71190">CVE-2025-71190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257580">SUSE bug 1257580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71191</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71191" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71191" ref_url="https://www.suse.com/security/cve/CVE-2025-71191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: at_hdmac: fix device leak on of_dma_xlate()

Make sure to drop the reference taken when looking up the DMA platform
device during of_dma_xlate() when releasing channel resources.

Note that commit 3832b78b3ec2 ("dmaengine: at_hdmac: add missing
put_device() call in at_dma_xlate()") fixed the leak in a couple of
error paths but the reference is still leaking on successful allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71191/">CVE-2025-71191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71191">CVE-2025-71191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257579">SUSE bug 1257579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71192</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71192" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71192" ref_url="https://www.suse.com/security/cve/CVE-2025-71192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: ac97: fix a double free in snd_ac97_controller_register()

If ac97_add_adapter() fails, put_device() is the correct way to drop
the device reference. kfree() is not required.
Add kfree() if idr_alloc() fails and in ac97_adapter_release() to do
the cleanup.

Found by code review.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71192/">CVE-2025-71192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71192">CVE-2025-71192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257679">SUSE bug 1257679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71193</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71193" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71193" ref_url="https://www.suse.com/security/cve/CVE-2025-71193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: qcom-qusb2: Fix NULL pointer dereference on early suspend

Enabling runtime PM before attaching the QPHY instance as driver data
can lead to a NULL pointer dereference in runtime PM callbacks that
expect valid driver data. There is a small window where the suspend
callback may run after PM runtime enabling and before runtime forbid.
This causes a sporadic crash during boot:

```
Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a1
[...]
CPU: 0 UID: 0 PID: 11 Comm: kworker/0:1 Not tainted 6.16.7+ #116 PREEMPT
Workqueue: pm pm_runtime_work
pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : qusb2_phy_runtime_suspend+0x14/0x1e0 [phy_qcom_qusb2]
lr : pm_generic_runtime_suspend+0x2c/0x44
[...]
```

Attach the QPHY instance as driver data before enabling runtime PM to
prevent NULL pointer dereference in runtime PM callbacks.

Reorder pm_runtime_enable() and pm_runtime_forbid() to prevent a
short window where an unnecessary runtime suspend can occur.

Use the devres-managed version to ensure PM runtime is symmetrically
disabled during driver removal for proper cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71193/">CVE-2025-71193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71193">CVE-2025-71193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257686">SUSE bug 1257686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71194</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71194" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71194" ref_url="https://www.suse.com/security/cve/CVE-2025-71194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix deadlock in wait_current_trans() due to ignored transaction type

When wait_current_trans() is called during start_transaction(), it
currently waits for a blocked transaction without considering whether
the given transaction type actually needs to wait for that particular
transaction state. The btrfs_blocked_trans_types[] array already defines
which transaction types should wait for which transaction states, but
this check was missing in wait_current_trans().

This can lead to a deadlock scenario involving two transactions and
pending ordered extents:

  1. Transaction A is in TRANS_STATE_COMMIT_DOING state

  2. A worker processing an ordered extent calls start_transaction()
     with TRANS_JOIN

  3. join_transaction() returns -EBUSY because Transaction A is in
     TRANS_STATE_COMMIT_DOING

  4. Transaction A moves to TRANS_STATE_UNBLOCKED and completes

  5. A new Transaction B is created (TRANS_STATE_RUNNING)

  6. The ordered extent from step 2 is added to Transaction B's
     pending ordered extents

  7. Transaction B immediately starts commit by another task and
     enters TRANS_STATE_COMMIT_START

  8. The worker finally reaches wait_current_trans(), sees Transaction B
     in TRANS_STATE_COMMIT_START (a blocked state), and waits
     unconditionally

  9. However, TRANS_JOIN should NOT wait for TRANS_STATE_COMMIT_START
     according to btrfs_blocked_trans_types[]

  10. Transaction B is waiting for pending ordered extents to complete

  11. Deadlock: Transaction B waits for ordered extent, ordered extent
      waits for Transaction B

This can be illustrated by the following call stacks:
  CPU0                              CPU1
                                    btrfs_finish_ordered_io()
                                      start_transaction(TRANS_JOIN)
                                        join_transaction()
                                          # -EBUSY (Transaction A is
                                          # TRANS_STATE_COMMIT_DOING)
  # Transaction A completes
  # Transaction B created
  # ordered extent added to
  # Transaction B's pending list
  btrfs_commit_transaction()
    # Transaction B enters
    # TRANS_STATE_COMMIT_START
    # waiting for pending ordered
    # extents
                                        wait_current_trans()
                                          # waits for Transaction B
                                          # (should not wait!)

Task bstore_kv_sync in btrfs_commit_transaction waiting for ordered
extents:

  __schedule+0x2e7/0x8a0
  schedule+0x64/0xe0
  btrfs_commit_transaction+0xbf7/0xda0 [btrfs]
  btrfs_sync_file+0x342/0x4d0 [btrfs]
  __x64_sys_fdatasync+0x4b/0x80
  do_syscall_64+0x33/0x40
  entry_SYSCALL_64_after_hwframe+0x44/0xa9

Task kworker in wait_current_trans waiting for transaction commit:

  Workqueue: btrfs-syno_nocow btrfs_work_helper [btrfs]
  __schedule+0x2e7/0x8a0
  schedule+0x64/0xe0
  wait_current_trans+0xb0/0x110 [btrfs]
  start_transaction+0x346/0x5b0 [btrfs]
  btrfs_finish_ordered_io.isra.0+0x49b/0x9c0 [btrfs]
  btrfs_work_helper+0xe8/0x350 [btrfs]
  process_one_work+0x1d3/0x3c0
  worker_thread+0x4d/0x3e0
  kthread+0x12d/0x150
  ret_from_fork+0x1f/0x30

Fix this by passing the transaction type to wait_current_trans() and
checking btrfs_blocked_trans_types[cur_trans-&gt;state] against the given
type before deciding to wait. This ensures that transaction types which
are allowed to join during certain blocked states will not unnecessarily
wait and cause deadlocks.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71194/">CVE-2025-71194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71194">CVE-2025-71194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257687">SUSE bug 1257687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71195</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71195" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71195" ref_url="https://www.suse.com/security/cve/CVE-2025-71195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: xilinx: xdma: Fix regmap max_register

The max_register field is assigned the size of the register memory
region instead of the offset of the last register.
The result is that reading from the regmap via debugfs can cause
a segmentation fault:

tail /sys/kernel/debug/regmap/xdma.1.auto/registers
Unable to handle kernel paging request at virtual address ffff800082f70000
Mem abort info:
  ESR = 0x0000000096000007
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x07: level 3 translation fault
[...]
Call trace:
 regmap_mmio_read32le+0x10/0x30
 _regmap_bus_reg_read+0x74/0xc0
 _regmap_read+0x68/0x198
 regmap_read+0x54/0x88
 regmap_read_debugfs+0x140/0x380
 regmap_map_read_file+0x30/0x48
 full_proxy_read+0x68/0xc8
 vfs_read+0xcc/0x310
 ksys_read+0x7c/0x120
 __arm64_sys_read+0x24/0x40
 invoke_syscall.constprop.0+0x64/0x108
 do_el0_svc+0xb0/0xd8
 el0_svc+0x38/0x130
 el0t_64_sync_handler+0x120/0x138
 el0t_64_sync+0x194/0x198
Code: aa1e03e9 d503201f f9400000 8b214000 (b9400000)
---[ end trace 0000000000000000 ]---
note: tail[1217] exited with irqs disabled
note: tail[1217] exited with preempt_count 1
Segmentation fault
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71195/">CVE-2025-71195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71195">CVE-2025-71195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257704">SUSE bug 1257704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71196</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71196" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71196" ref_url="https://www.suse.com/security/cve/CVE-2025-71196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: stm32-usphyc: Fix off by one in probe()

The "index" variable is used as an index into the usbphyc-&gt;phys[] array
which has usbphyc-&gt;nphys elements.  So if it is equal to usbphyc-&gt;nphys
then it is one element out of bounds.  The "index" comes from the
device tree so it's data that we trust and it's unlikely to be wrong,
however it's obviously still worth fixing the bug.  Change the &gt; to &gt;=.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71196/">CVE-2025-71196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71196">CVE-2025-71196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257716">SUSE bug 1257716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71197</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71197" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71197" ref_url="https://www.suse.com/security/cve/CVE-2025-71197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

w1: therm: Fix off-by-one buffer overflow in alarms_store

The sysfs buffer passed to alarms_store() is allocated with 'size + 1'
bytes and a NUL terminator is appended. However, the 'size' argument
does not account for this extra byte. The original code then allocated
'size' bytes and used strcpy() to copy 'buf', which always writes one
byte past the allocated buffer since strcpy() copies until the NUL
terminator at index 'size'.

Fix this by parsing the 'buf' parameter directly using simple_strtoll()
without allocating any intermediate memory or string copying. This
removes the overflow while simplifying the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-71197/">CVE-2025-71197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71197">CVE-2025-71197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257743">SUSE bug 1257743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71198</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71198" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71198" ref_url="https://www.suse.com/security/cve/CVE-2025-71198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection

The st_lsm6dsx_acc_channels array of struct iio_chan_spec has a non-NULL
event_spec field, indicating support for IIO events. However, event
detection is not supported for all sensors, and if userspace tries to
configure accelerometer wakeup events on a sensor device that does not
support them (e.g. LSM6DS0), st_lsm6dsx_write_event() dereferences a NULL
pointer when trying to write to the wakeup register.
Define an additional struct iio_chan_spec array whose members have a NULL
event_spec field, and use this array instead of st_lsm6dsx_acc_channels for
sensors without event detection capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71198/">CVE-2025-71198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71198">CVE-2025-71198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257741">SUSE bug 1257741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71199</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71199" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71199" ref_url="https://www.suse.com/security/cve/CVE-2025-71199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: at91-sama5d2_adc: Fix potential use-after-free in sama5d2_adc driver

at91_adc_interrupt can call at91_adc_touch_data_handler function
to start the work by schedule_work(&amp;st-&gt;touch_st.workq).

If we remove the module which will call at91_adc_remove to
make cleanup, it will free indio_dev through iio_device_unregister but
quite a bit later. While the work mentioned above will be used. The
sequence of operations that may lead to a UAF bug is as follows:

CPU0                                      CPU1

                                     | at91_adc_workq_handler
at91_adc_remove                      |
iio_device_unregister(indio_dev)     |
//free indio_dev a bit later         |
                                     | iio_push_to_buffers(indio_dev)
                                     | //use indio_dev

Fix it by ensuring that the work is canceled before proceeding with
the cleanup in at91_adc_remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71199/">CVE-2025-71199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71199">CVE-2025-71199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257750">SUSE bug 1257750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71200</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71200" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71200" ref_url="https://www.suse.com/security/cve/CVE-2025-71200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode

When operating in HS200 or HS400 timing modes, reducing the clock frequency
below 52MHz will lead to link broken as the Rockchip DWC MSHC controller
requires maintaining a minimum clock of 52MHz in these modes.

Add a check to prevent illegal clock reduction through debugfs:

root@debian:/# echo 50000000 &gt; /sys/kernel/debug/mmc0/clock
root@debian:/# [   30.090146] mmc0: running CQE recovery
mmc0: cqhci: Failed to halt
mmc0: cqhci: spurious TCN for tag 0
WARNING: drivers/mmc/host/cqhci-core.c:797 at cqhci_irq+0x254/0x818, CPU#1: kworker/1:0H/24
Modules linked in:
CPU: 1 UID: 0 PID: 24 Comm: kworker/1:0H Not tainted 6.19.0-rc1-00001-g09db0998649d-dirty #204 PREEMPT
Hardware name: Rockchip RK3588 EVB1 V10 Board (DT)
Workqueue: kblockd blk_mq_run_work_fn
pstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : cqhci_irq+0x254/0x818
lr : cqhci_irq+0x254/0x818
...
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71200/">CVE-2025-71200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71200">CVE-2025-71200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258222">SUSE bug 1258222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71222</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71222" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71222" ref_url="https://www.suse.com/security/cve/CVE-2025-71222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wlcore: ensure skb headroom before skb_push

This avoids occasional skb_under_panic Oops from wl1271_tx_work. In this case, headroom is
less than needed (typically 110 - 94 = 16 bytes).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71222/">CVE-2025-71222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71222">CVE-2025-71222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258279">SUSE bug 1258279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71224</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71224" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71224" ref_url="https://www.suse.com/security/cve/CVE-2025-71224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: ocb: skip rx_no_sta when interface is not joined

ieee80211_ocb_rx_no_sta() assumes a valid channel context, which is only
present after JOIN_OCB.

RX may run before JOIN_OCB is executed, in which case the OCB interface
is not operational. Skip RX peer handling when the interface is not
joined to avoid warnings in the RX path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71224/">CVE-2025-71224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71224">CVE-2025-71224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258824">SUSE bug 1258824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71225</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71225" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71225" ref_url="https://www.suse.com/security/cve/CVE-2025-71225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: suspend array while updating raid_disks via sysfs

In raid1_reshape(), freeze_array() is called before modifying the r1bio
memory pool (conf-&gt;r1bio_pool) and conf-&gt;raid_disks, and
unfreeze_array() is called after the update is completed.

However, freeze_array() only waits until nr_sync_pending and
(nr_pending - nr_queued) of all buckets reaches zero. When an I/O error
occurs, nr_queued is increased and the corresponding r1bio is queued to
either retry_list or bio_end_io_list. As a result, freeze_array() may
unblock before these r1bios are released.

This can lead to a situation where conf-&gt;raid_disks and the mempool have
already been updated while queued r1bios, allocated with the old
raid_disks value, are later released. Consequently, free_r1bio() may
access memory out of bounds in put_all_bios() and release r1bios of the
wrong size to the new mempool, potentially causing issues with the
mempool as well.

Since only normal I/O might increase nr_queued while an I/O error occurs,
suspending the array avoids this issue.

Note: Updating raid_disks via ioctl SET_ARRAY_INFO already suspends
the array. Therefore, we suspend the array when updating raid_disks
via sysfs to avoid this issue too.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71225/">CVE-2025-71225 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71225">CVE-2025-71225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258411">SUSE bug 1258411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71229</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71229" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71229" ref_url="https://www.suse.com/security/cve/CVE-2025-71229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()

rtw_core_enable_beacon() reads 4 bytes from an address that is not a
multiple of 4. This results in a crash on some systems.

Do 1 byte reads/writes instead.

Unable to handle kernel paging request at virtual address ffff8000827e0522
Mem abort info:
  ESR = 0x0000000096000021
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x21: alignment fault
Data abort info:
  ISV = 0, ISS = 0x00000021, ISS2 = 0x00000000
  CM = 0, WnR = 0, TnD = 0, TagAccess = 0
  GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
swapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000005492000
[ffff8000827e0522] pgd=0000000000000000, p4d=10000001021d9403, pud=10000001021da403, pmd=100000011061c403, pte=00780000f3200f13
Internal error: Oops: 0000000096000021 [#1]  SMP
Modules linked in: [...] rtw88_8822ce rtw88_8822c rtw88_pci rtw88_core [...]
CPU: 0 UID: 0 PID: 73 Comm: kworker/u32:2 Tainted: G        W           6.17.9 #1-NixOS VOLUNTARY
Tainted: [W]=WARN
Hardware name: FriendlyElec NanoPC-T6 LTS (DT)
Workqueue: phy0 rtw_c2h_work [rtw88_core]
pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : rtw_pci_read32+0x18/0x40 [rtw88_pci]
lr : rtw_core_enable_beacon+0xe0/0x148 [rtw88_core]
sp : ffff800080cc3ca0
x29: ffff800080cc3ca0 x28: ffff0001031fc240 x27: ffff000102100828
x26: ffffd2cb7c9b4088 x25: ffff0001031fc2c0 x24: ffff000112fdef00
x23: ffff000112fdef18 x22: ffff000111c29970 x21: 0000000000000001
x20: 0000000000000001 x19: ffff000111c22040 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
x11: 0000000000000000 x10: 0000000000000000 x9 : ffffd2cb6507c090
x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000007f10 x1 : 0000000000000522 x0 : ffff8000827e0522
Call trace:
 rtw_pci_read32+0x18/0x40 [rtw88_pci] (P)
 rtw_hw_scan_chan_switch+0x124/0x1a8 [rtw88_core]
 rtw_fw_c2h_cmd_handle+0x254/0x290 [rtw88_core]
 rtw_c2h_work+0x50/0x98 [rtw88_core]
 process_one_work+0x178/0x3f8
 worker_thread+0x208/0x418
 kthread+0x120/0x220
 ret_from_fork+0x10/0x20
Code: d28fe202 8b020000 f9524400 8b214000 (b9400000)
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71229/">CVE-2025-71229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71229">CVE-2025-71229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258415">SUSE bug 1258415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71231</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71231" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71231" ref_url="https://www.suse.com/security/cve/CVE-2025-71231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode

The local variable 'i' is initialized with -EINVAL, but the for loop
immediately overwrites it and -EINVAL is never returned.

If no empty compression mode can be found, the function would return the
out-of-bounds index IAA_COMP_MODES_MAX, which would cause an invalid
array access in add_iaa_compression_mode().

Fix both issues by returning either a valid index or -EINVAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71231/">CVE-2025-71231 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71231">CVE-2025-71231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258424">SUSE bug 1258424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258425">SUSE bug 1258425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71232</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71232" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71232" ref_url="https://www.suse.com/security/cve/CVE-2025-71232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Free sp in error path to fix system crash

System crash seen during load/unload test in a loop,

[61110.449331] qla2xxx [0000:27:00.0]-0042:0: Disabled MSI-X.
[61110.467494] =============================================================================
[61110.467498] BUG qla2xxx_srbs (Tainted: G           OE    --------  --- ): Objects remaining in qla2xxx_srbs on __kmem_cache_shutdown()
[61110.467501] -----------------------------------------------------------------------------

[61110.467502] Slab 0x000000000ffc8162 objects=51 used=1 fp=0x00000000e25d3d85 flags=0x57ffffc0010200(slab|head|node=1|zone=2|lastcpupid=0x1fffff)
[61110.467509] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G           OE    --------  ---  5.14.0-284.11.1.el9_2.x86_64 #1
[61110.467513] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023
[61110.467515] Call Trace:
[61110.467516]  &lt;TASK&gt;
[61110.467519]  dump_stack_lvl+0x34/0x48
[61110.467526]  slab_err.cold+0x53/0x67
[61110.467534]  __kmem_cache_shutdown+0x16e/0x320
[61110.467540]  kmem_cache_destroy+0x51/0x160
[61110.467544]  qla2x00_module_exit+0x93/0x99 [qla2xxx]
[61110.467607]  ? __do_sys_delete_module.constprop.0+0x178/0x280
[61110.467613]  ? syscall_trace_enter.constprop.0+0x145/0x1d0
[61110.467616]  ? do_syscall_64+0x5c/0x90
[61110.467619]  ? exc_page_fault+0x62/0x150
[61110.467622]  ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
[61110.467626]  &lt;/TASK&gt;
[61110.467627] Disabling lock debugging due to kernel taint
[61110.467635] Object 0x0000000026f7e6e6 @offset=16000
[61110.467639] ------------[ cut here ]------------
[61110.467639] kmem_cache_destroy qla2xxx_srbs: Slab cache still has objects when called from qla2x00_module_exit+0x93/0x99 [qla2xxx]
[61110.467659] WARNING: CPU: 53 PID: 455206 at mm/slab_common.c:520 kmem_cache_destroy+0x14d/0x160
[61110.467718] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G    B      OE    --------  ---  5.14.0-284.11.1.el9_2.x86_64 #1
[61110.467720] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023
[61110.467721] RIP: 0010:kmem_cache_destroy+0x14d/0x160
[61110.467724] Code: 99 7d 07 00 48 89 ef e8 e1 6a 07 00 eb b3 48 8b 55 60 48 8b 4c 24 20 48 c7 c6 70 fc 66 90 48 c7 c7 f8 ef a1 90 e8 e1 ed 7c 00 &lt;0f&gt; 0b eb 93 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 55 48 89
[61110.467725] RSP: 0018:ffffa304e489fe80 EFLAGS: 00010282
[61110.467727] RAX: 0000000000000000 RBX: ffffffffc0d9a860 RCX: 0000000000000027
[61110.467729] RDX: ffff8fd5ff9598a8 RSI: 0000000000000001 RDI: ffff8fd5ff9598a0
[61110.467730] RBP: ffff8fb6aaf78700 R08: 0000000000000000 R09: 0000000100d863b7
[61110.467731] R10: ffffa304e489fd20 R11: ffffffff913bef48 R12: 0000000040002000
[61110.467731] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[61110.467733] FS:  00007f64c89fb740(0000) GS:ffff8fd5ff940000(0000) knlGS:0000000000000000
[61110.467734] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[61110.467735] CR2: 00007f0f02bfe000 CR3: 00000020ad6dc005 CR4: 0000000000770ee0
[61110.467736] PKRU: 55555554
[61110.467737] Call Trace:
[61110.467738]  &lt;TASK&gt;
[61110.467739]  qla2x00_module_exit+0x93/0x99 [qla2xxx]
[61110.467755]  ? __do_sys_delete_module.constprop.0+0x178/0x280

Free sp in the error path to fix the crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71232/">CVE-2025-71232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71232">CVE-2025-71232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258422">SUSE bug 1258422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71233</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71233" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71233" ref_url="https://www.suse.com/security/cve/CVE-2025-71233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: Avoid creating sub-groups asynchronously

The asynchronous creation of sub-groups by a delayed work could lead to a
NULL pointer dereference when the driver directory is removed before the
work completes.

The crash can be easily reproduced with the following commands:

  # cd /sys/kernel/config/pci_ep/functions/pci_epf_test
  # for i in {1..20}; do mkdir test &amp;&amp; rmdir test; done

  BUG: kernel NULL pointer dereference, address: 0000000000000088
  ...
  Call Trace:
   configfs_register_group+0x3d/0x190
   pci_epf_cfs_work+0x41/0x110
   process_one_work+0x18f/0x350
   worker_thread+0x25a/0x3a0

Fix this issue by using configfs_add_default_group() API which does not
have the deadlock problem as configfs_register_group() and does not require
the delayed work handler.

[mani: slightly reworded the description and added stable list]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71233/">CVE-2025-71233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71233">CVE-2025-71233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258421">SUSE bug 1258421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71234</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71234" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71234" ref_url="https://www.suse.com/security/cve/CVE-2025-71234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add

The driver does not set hw-&gt;sta_data_size, which causes mac80211 to
allocate insufficient space for driver private station data in
__sta_info_alloc(). When rtl8xxxu_sta_add() accesses members of
struct rtl8xxxu_sta_info through sta-&gt;drv_priv, this results in a
slab-out-of-bounds write.

KASAN report on RISC-V (VisionFive 2) with RTL8192EU adapter:

  BUG: KASAN: slab-out-of-bounds in rtl8xxxu_sta_add+0x31c/0x346
  Write of size 8 at addr ffffffd6d3e9ae88 by task kworker/u16:0/12

Set hw-&gt;sta_data_size to sizeof(struct rtl8xxxu_sta_info) during
probe, similar to how hw-&gt;vif_data_size is configured. This ensures
mac80211 allocates sufficient space for the driver's per-station
private data.

Tested on StarFive VisionFive 2 v1.2A board.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71234/">CVE-2025-71234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71234">CVE-2025-71234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258419">SUSE bug 1258419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258420">SUSE bug 1258420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71235</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71235" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71235" ref_url="https://www.suse.com/security/cve/CVE-2025-71235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Delay module unload while fabric scan in progress

System crash seen during load/unload test in a loop.

[105954.384919] RBP: ffff914589838dc0 R08: 0000000000000000 R09: 0000000000000086
[105954.384920] R10: 000000000000000f R11: ffffa31240904be5 R12: ffff914605f868e0
[105954.384921] R13: ffff914605f86910 R14: 0000000000008010 R15: 00000000ddb7c000
[105954.384923] FS:  0000000000000000(0000) GS:ffff9163fec40000(0000) knlGS:0000000000000000
[105954.384925] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[105954.384926] CR2: 000055d31ce1d6a0 CR3: 0000000119f5e001 CR4: 0000000000770ee0
[105954.384928] PKRU: 55555554
[105954.384929] Call Trace:
[105954.384931]  &lt;IRQ&gt;
[105954.384934]  qla24xx_sp_unmap+0x1f3/0x2a0 [qla2xxx]
[105954.384962]  ? qla_async_scan_sp_done+0x114/0x1f0 [qla2xxx]
[105954.384980]  ? qla24xx_els_ct_entry+0x4de/0x760 [qla2xxx]
[105954.384999]  ? __wake_up_common+0x80/0x190
[105954.385004]  ? qla24xx_process_response_queue+0xc2/0xaa0 [qla2xxx]
[105954.385023]  ? qla24xx_msix_rsp_q+0x44/0xb0 [qla2xxx]
[105954.385040]  ? __handle_irq_event_percpu+0x3d/0x190
[105954.385044]  ? handle_irq_event+0x58/0xb0
[105954.385046]  ? handle_edge_irq+0x93/0x240
[105954.385050]  ? __common_interrupt+0x41/0xa0
[105954.385055]  ? common_interrupt+0x3e/0xa0
[105954.385060]  ? asm_common_interrupt+0x22/0x40

The root cause of this was that there was a free (dma_free_attrs) in the
interrupt context.  There was a device discovery/fabric scan in
progress.  A module unload was issued which set the UNLOADING flag.  As
part of the discovery, after receiving an interrupt a work queue was
scheduled (which involved a work to be queued).  Since the UNLOADING
flag is set, the work item was not allocated and the mapped memory had
to be freed.  The free occurred in interrupt context leading to system
crash.  Delay the driver unload until the fabric scan is complete to
avoid the crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71235/">CVE-2025-71235 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71235">CVE-2025-71235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258469">SUSE bug 1258469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71236</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71236" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71236" ref_url="https://www.suse.com/security/cve/CVE-2025-71236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Validate sp before freeing associated memory

System crash with the following signature
[154563.214890] nvme nvme2: NVME-FC{1}: controller connect complete
[154564.169363] qla2xxx [0000:b0:00.1]-3002:2: nvme: Sched: Set ZIO exchange threshold to 3.
[154564.169405] qla2xxx [0000:b0:00.1]-ffffff:2: SET ZIO Activity exchange threshold to 5.
[154565.539974] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed - 0078 0080 0000.
[154565.545744] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed - 0078 00a0 0000.
[154565.545857] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).
[154565.552760] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).
[154565.553079] BUG: kernel NULL pointer dereference, address: 00000000000000f8
[154565.553080] #PF: supervisor read access in kernel mode
[154565.553082] #PF: error_code(0x0000) - not-present page
[154565.553084] PGD 80000010488ab067 P4D 80000010488ab067 PUD 104978a067 PMD 0
[154565.553089] Oops: 0000 1 PREEMPT SMP PTI
[154565.553092] CPU: 10 PID: 858 Comm: qla2xxx_2_dpc Kdump: loaded Tainted: G           OE     -------  ---  5.14.0-503.11.1.el9_5.x86_64 #1
[154565.553096] Hardware name: HPE Synergy 660 Gen10/Synergy 660 Gen10 Compute Module, BIOS I43 09/30/2024
[154565.553097] RIP: 0010:qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]
[154565.553141] Code: 00 00 e8 58 a3 ec d4 49 89 e9 ba 12 20 00 00 4c 89 e6 49 c7 c0 00 ee a8 c0 48 c7 c1 66 c0 a9 c0 bf 00 80 00 10 e8 15 69 00 00 &lt;4c&gt; 8b 8d f8 00 00 00 4d 85 c9 74 35 49 8b 84 24 00 19 00 00 48 8b
[154565.553143] RSP: 0018:ffffb4dbc8aebdd0 EFLAGS: 00010286
[154565.553145] RAX: 0000000000000000 RBX: ffff8ec2cf0908d0 RCX: 0000000000000002
[154565.553147] RDX: 0000000000000000 RSI: ffffffffc0a9c896 RDI: ffffb4dbc8aebd47
[154565.553148] RBP: 0000000000000000 R08: ffffb4dbc8aebd45 R09: 0000000000ffff0a
[154565.553150] R10: 0000000000000000 R11: 000000000000000f R12: ffff8ec2cf0908d0
[154565.553151] R13: ffff8ec2cf090900 R14: 0000000000000102 R15: ffff8ec2cf084000
[154565.553152] FS:  0000000000000000(0000) GS:ffff8ed27f800000(0000) knlGS:0000000000000000
[154565.553154] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[154565.553155] CR2: 00000000000000f8 CR3: 000000113ae0a005 CR4: 00000000007706f0
[154565.553157] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[154565.553158] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[154565.553159] PKRU: 55555554
[154565.553160] Call Trace:
[154565.553162]  &lt;TASK&gt;
[154565.553165]  ? show_trace_log_lvl+0x1c4/0x2df
[154565.553172]  ? show_trace_log_lvl+0x1c4/0x2df
[154565.553177]  ? qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]
[154565.553215]  ? __die_body.cold+0x8/0xd
[154565.553218]  ? page_fault_oops+0x134/0x170
[154565.553223]  ? snprintf+0x49/0x70
[154565.553229]  ? exc_page_fault+0x62/0x150
[154565.553238]  ? asm_exc_page_fault+0x22/0x30

Check for sp being non NULL before freeing any associated memory
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71236/">CVE-2025-71236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71236">CVE-2025-71236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258442">SUSE bug 1258442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71238</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71238" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71238" ref_url="https://www.suse.com/security/cve/CVE-2025-71238" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6571" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002650.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix bsg_done() causing double free

Kernel panic observed on system,

[5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000
[5353358.825194] #PF: supervisor write access in kernel mode
[5353358.825195] #PF: error_code(0x0002) - not-present page
[5353358.825196] PGD 100006067 P4D 0
[5353358.825198] Oops: 0002 [#1] PREEMPT SMP NOPTI
[5353358.825200] CPU: 5 PID: 2132085 Comm: qlafwupdate.sub Kdump: loaded Tainted: G        W    L    -------  ---  5.14.0-503.34.1.el9_5.x86_64 #1
[5353358.825203] Hardware name: HPE ProLiant DL360 Gen11/ProLiant DL360 Gen11, BIOS 2.44 01/17/2025
[5353358.825204] RIP: 0010:memcpy_erms+0x6/0x10
[5353358.825211] RSP: 0018:ff591da8f4f6b710 EFLAGS: 00010246
[5353358.825212] RAX: ff5f5e897b024000 RBX: 0000000000007090 RCX: 0000000000001000
[5353358.825213] RDX: 0000000000001000 RSI: ff591da8f4fed090 RDI: ff5f5e897b024000
[5353358.825214] RBP: 0000000000010000 R08: ff5f5e897b024000 R09: 0000000000000000
[5353358.825215] R10: ff46cf8c40517000 R11: 0000000000000001 R12: 0000000000008090
[5353358.825216] R13: ff591da8f4f6b720 R14: 0000000000001000 R15: 0000000000000000
[5353358.825218] FS:  00007f1e88d47740(0000) GS:ff46cf935f940000(0000) knlGS:0000000000000000
[5353358.825219] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[5353358.825220] CR2: ff5f5e897b024000 CR3: 0000000231532004 CR4: 0000000000771ef0
[5353358.825221] PKRU: 55555554
[5353358.825222] Call Trace:
[5353358.825223]  &lt;TASK&gt;
[5353358.825224]  ? show_trace_log_lvl+0x1c4/0x2df
[5353358.825229]  ? show_trace_log_lvl+0x1c4/0x2df
[5353358.825232]  ? sg_copy_buffer+0xc8/0x110
[5353358.825236]  ? __die_body.cold+0x8/0xd
[5353358.825238]  ? page_fault_oops+0x134/0x170
[5353358.825242]  ? kernelmode_fixup_or_oops+0x84/0x110
[5353358.825244]  ? exc_page_fault+0xa8/0x150
[5353358.825247]  ? asm_exc_page_fault+0x22/0x30
[5353358.825252]  ? memcpy_erms+0x6/0x10
[5353358.825253]  sg_copy_buffer+0xc8/0x110
[5353358.825259]  qla2x00_process_vendor_specific+0x652/0x1320 [qla2xxx]
[5353358.825317]  qla24xx_bsg_request+0x1b2/0x2d0 [qla2xxx]

Most routines in qla_bsg.c call bsg_done() only for success cases.
However a few invoke it for failure case as well leading to a double
free. Validate before calling bsg_done().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71238/">CVE-2025-71238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71238">CVE-2025-71238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259186">SUSE bug 1259186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71268</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71268" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71268" ref_url="https://www.suse.com/security/cve/CVE-2025-71268" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix reservation leak in some error paths when inserting inline extent

If we fail to allocate a path or join a transaction, we return from
__cow_file_range_inline() without freeing the reserved qgroup data,
resulting in a leak. Fix this by ensuring we call btrfs_qgroup_free_data()
in such cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71268/">CVE-2025-71268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71268">CVE-2025-71268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259865">SUSE bug 1259865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71269</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71269" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71269" ref_url="https://www.suse.com/security/cve/CVE-2025-71269" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not free data reservation in fallback from inline due to -ENOSPC

If we fail to create an inline extent due to -ENOSPC, we will attempt to
go through the normal COW path, reserve an extent, create an ordered
extent, etc. However we were always freeing the reserved qgroup data,
which is wrong since we will use data. Fix this by freeing the reserved
qgroup data in __cow_file_range_inline() only if we are not doing the
fallback (ret is &lt;= 0).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71269/">CVE-2025-71269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71269">CVE-2025-71269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259889">SUSE bug 1259889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20257345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-7345</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-7345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7345" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-7345" ref_url="https://www.suse.com/security/cve/CVE-2025-7345" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001903.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13315" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02954-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03373-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20128-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023946.html" source="SUSE-SU"/>
    <description>
    A flaw exists in gdk-pixbuf within the gdk_pixbuf__jpeg_image_load_increment function (io-jpeg.c) and in glib's g_base64_encode_step (glib/gbase64.c). When processing maliciously crafted JPEG images, a heap buffer overflow can occur during Base64 encoding, allowing out-of-bounds reads from heap memory, potentially causing application crashes or arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7345/">CVE-2025-7345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7345">CVE-2025-7345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246114">SUSE bug 1246114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039695" comment="gdk-pixbuf-query-loaders-2.42.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039697" comment="libgdk_pixbuf-2_0-0-2.42.12-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039698" comment="typelib-1_0-GdkPixbuf-2_0-2.42.12-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20257545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-7545</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-7545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7545" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-7545" ref_url="https://www.suse.com/security/cve/CVE-2025-7545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7545/">CVE-2025-7545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-7545">CVE-2025-7545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246481">SUSE bug 1246481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20257546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-7546</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-7546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7546" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-7546" ref_url="https://www.suse.com/security/cve/CVE-2025-7546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as problematic, has been found in GNU Binutils 2.45. Affected by this issue is the function bfd_elf_set_group_contents of the file bfd/elf.c. The manipulation leads to out-of-bounds write. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The name of the patch is 41461010eb7c79fee7a9d5f6209accdaac66cc6b. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7546/">CVE-2025-7546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-7546">CVE-2025-7546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246485">SUSE bug 1246485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8067</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8067" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8067" ref_url="https://www.suse.com/security/cve/CVE-2025-8067" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15017" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001975.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15018" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03016-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03017-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20718-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024073.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Udisks daemon, where it allows unprivileged users to create loop devices using the D-BUS system. This is achieved via the loop device handler, which handles requests sent through the D-BUS interface. As two of the parameters of this handle, it receives the file descriptor list and index specifying the file where the loop device should be backed. The function itself validates the index value to ensure it isn't bigger than the maximum value allowed. However, it fails to validate the lower bound, allowing the index parameter to be a negative value. Under these circumstances, an attacker can cause the UDisks daemon to crash or perform a local privilege escalation by gaining access to files owned by privileged users.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-8067/">CVE-2025-8067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8067">CVE-2025-8067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248502">SUSE bug 1248502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041463" comment="libudisks2-0-2.10.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041465" comment="libudisks2-0_btrfs-2.10.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041467" comment="libudisks2-0_lvm2-2.10.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041469" comment="udisks2-2.10.1-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8176</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8176" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8176" ref_url="https://www.suse.com/security/cve/CVE-2025-8176" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19113" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002132.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002202.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20956" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02815-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023396.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as critical. This vulnerability affects the function get_histogram of the file tools/tiffmedian.c. The manipulation leads to use after free. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as fe10872e53efba9cc36c66ac4ab3b41a839d5172. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8176/">CVE-2025-8176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8176">CVE-2025-8176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247108">SUSE bug 1247108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030535" comment="libtiff6-4.7.1-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8177</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8177" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8177" ref_url="https://www.suse.com/security/cve/CVE-2025-8177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02815-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023396.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in LibTIFF up to 4.7.0. It has been rated as critical. This issue affects the function setrow of the file tools/thumbnail.c. The manipulation leads to buffer overflow. An attack has to be approached locally. The patch is named e8c9d6c616b19438695fd829e58ae4fde5bfbc22. It is recommended to apply a patch to fix this issue. This vulnerability only affects products that are no longer supported by the maintainer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8177/">CVE-2025-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8177">CVE-2025-8177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247106">SUSE bug 1247106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030535" comment="libtiff6-4.7.1-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8194</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8194" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14546" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002047.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001955.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001949.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14900" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001954.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15007" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001968.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15010" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001970.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15019" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02787-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02948-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03032-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
    <description>
    There is a defect in the CPython “tarfile” module affecting the “TarFile” extraction and entry enumeration APIs. The tar implementation would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously crafted tar archives. 

This vulnerability can be mitigated by including the following patch after importing the “tarfile” module:   https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247249">SUSE bug 1247249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039656" comment="libpython3_13-1_0-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039659" comment="python313-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039660" comment="python313-base-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039662" comment="python313-curses-3.13.11-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8224</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8224" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8224" ref_url="https://www.suse.com/security/cve/CVE-2025-8224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in GNU Binutils 2.44 and classified as problematic. This vulnerability affects the function bfd_elf_get_str_section of the file bfd/elf.c of the component BFD Library. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The name of the patch is db856d41004301b3a56438efd957ef5cabb91530. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8224/">CVE-2025-8224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8224">CVE-2025-8224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247114">SUSE bug 1247114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8225</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8225" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8225" ref_url="https://www.suse.com/security/cve/CVE-2025-8225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.44 and classified as problematic. This issue affects the function process_debug_info of the file binutils/dwarf.c of the component DWARF Section Handler. The manipulation leads to memory leak. Attacking locally is a requirement. The identifier of the patch is e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8225/">CVE-2025-8225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8225">CVE-2025-8225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247117">SUSE bug 1247117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8291</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8291" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8291" ref_url="https://www.suse.com/security/cve/CVE-2025-8291" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23323" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003148.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23342" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003140.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23530" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002308.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002346.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0355" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4257-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
    <description>
    The 'zipfile' module would not check the validity of the ZIP64 End of
Central Directory (EOCD) Locator record offset value would not be used to
locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be
assumed to be the previous record in the ZIP archive. This could be abused
to create ZIP archives that are handled differently by the 'zipfile' module
compared to other ZIP implementations.


Remediation maintains this behavior, but checks that the offset specified
in the ZIP64 EOCD Locator record matches the expected value.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8291/">CVE-2025-8291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8291">CVE-2025-8291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251305">SUSE bug 1251305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039656" comment="libpython3_13-1_0-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039659" comment="python313-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039660" comment="python313-base-3.13.11-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039662" comment="python313-curses-3.13.11-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8534</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8534" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8534" ref_url="https://www.suse.com/security/cve/CVE-2025-8534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023396.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as problematic was found in libtiff 4.6.0. This vulnerability affects the function PS_Lvl2page of the file tools/tiff2ps.c of the component tiff2ps. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 6ba36f159fd396ad11bf6b7874554197736ecc8b. It is recommended to apply a patch to fix this issue. One of the maintainers explains, that "[t]his error only occurs if DEFER_STRILE_LOAD (defer-strile-load:BOOL=ON) or TIFFOpen( .. "rD") option is used."
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8534/">CVE-2025-8534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8534">CVE-2025-8534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247582">SUSE bug 1247582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030535" comment="libtiff6-4.7.1-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8732</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8732" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8732" ref_url="https://www.suse.com/security/cve/CVE-2025-8732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024731.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libxml2 up to 2.14.5. It has been declared as problematic. This vulnerability affects the function xmlParseSGMLCatalog of the component xmlcatalog. The manipulation leads to uncontrolled recursion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The code maintainer explains, that "[t]he issue can only be triggered with untrusted SGML catalogs and it makes absolutely no sense to use untrusted catalogs. I also doubt that anyone is still using SGML catalogs at all."
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8732/">CVE-2025-8732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8732">CVE-2025-8732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247850">SUSE bug 1247850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010047326" comment="libexslt0-1.1.43-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047327" comment="libxml2-2-2.13.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047330" comment="libxml2-tools-2.13.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047333" comment="libxslt1-1.1.43-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047334" comment="python313-libxml2-2.13.8-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8851</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8851" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8851" ref_url="https://www.suse.com/security/cve/CVE-2025-8851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:3957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023180.html" source="SUSE-SU"/>
    <description>
    A vulnerability was determined in LibTIFF up to 4.5.1. Affected by this issue is the function readSeparateStripsetoBuffer of the file tools/tiffcrop.c of the component tiffcrop. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The patch is identified as 8a7a48d7a645992ca83062b3a1873c951661e2b3. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-21"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8851/">CVE-2025-8851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8851">CVE-2025-8851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248274">SUSE bug 1248274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859129" comment="libtiff6 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8961</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8961" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8961" ref_url="https://www.suse.com/security/cve/CVE-2025-8961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023396.html" source="SUSE-SU"/>
    <description>
    A weakness has been identified in LibTIFF 4.7.0. This affects the function main of the file tiffcrop.c of the component tiffcrop. Executing manipulation can lead to memory corruption. The attack can only be executed locally. The exploit has been made available to the public and could be exploited.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8961/">CVE-2025-8961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8961">CVE-2025-8961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248117">SUSE bug 1248117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030535" comment="libtiff6-4.7.1-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9086</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9086" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9086" ref_url="https://www.suse.com/security/cve/CVE-2025-9086" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002290.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23383" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002323.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03198-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03267-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023512.html" source="SUSE-SU"/>
    <description>
    1. A cookie is set using the `secure` keyword for `https://target` 
 2. curl is redirected to or otherwise made to speak with `http://target` (same 
   hostname, but using clear text HTTP) using the same cookie set 
 3. The same cookie name is set - but with just a slash as path (`path=\"/\",`).
   Since this site is not secure, the cookie *should* just be ignored.
4. A bug in the path comparison logic makes curl read outside a heap buffer
   boundary

The bug either causes a crash or it potentially makes the comparison come to
the wrong conclusion and lets the clear-text site override the contents of the
secure cookie, contrary to expectations and depending on the memory contents
immediately following the single-byte allocation that holds the path.

The presumed and correct behavior would be to plainly ignore the second set of
the cookie since it was already set as secure on a secure host so overriding
it on an insecure host should not be okay.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9086/">CVE-2025-9086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9086">CVE-2025-9086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249191">SUSE bug 1249191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031702" comment="curl-8.14.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031707" comment="libcurl4-8.14.1-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9165</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9165" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9165" ref_url="https://www.suse.com/security/cve/CVE-2025-9165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023396.html" source="SUSE-SU"/>
    <description>
    A flaw has been found in LibTIFF 4.7.0. This affects the function _TIFFmallocExt/_TIFFCheckRealloc/TIFFHashSetNew/InitCCITTFax3 of the file tools/tiffcmp.c of the component tiffcmp. Executing manipulation can lead to memory leak. The attack is restricted to local execution. This attack is characterized by high complexity. It is indicated that the exploitability is difficult. The exploit has been published and may be used. There is ongoing doubt regarding the real existence of this vulnerability. This patch is called ed141286a37f6e5ddafb5069347ff5d587e7a4e0. It is best practice to apply a patch to resolve this issue. A researcher disputes the security impact of this issue, because "this is a memory leak on a command line tool that is about to exit anyway". In the reply the project maintainer declares this issue as "a simple 'bug' when leaving the command line tool and (...) not a security issue at all".
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9165/">CVE-2025-9165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9165">CVE-2025-9165 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248326">SUSE bug 1248326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030535" comment="libtiff6-4.7.1-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9230</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9230" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9230" ref_url="https://www.suse.com/security/cve/CVE-2025-9230" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21174" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002260.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21255" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003124.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1720" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002463.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2776" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03441-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03442-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03443-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03464-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03522-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03523-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03630-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024609.html" source="SUSE-SU"/>
    <description>
    Issue summary: An application trying to decrypt CMS messages encrypted using
password based encryption can trigger an out-of-bounds read and write.

Impact summary: This out-of-bounds read may trigger a crash which leads to
Denial of Service for an application. The out-of-bounds write can cause
a memory corruption which can have various consequences including
a Denial of Service or Execution of attacker-supplied code.

Although the consequences of a successful exploit of this vulnerability
could be severe, the probability that the attacker would be able to
perform it is low. Besides, password based (PWRI) encryption support in CMS
messages is very rarely used. For that reason the issue was assessed as
Moderate severity according to our Security Policy.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue, as the CMS implementation is outside the OpenSSL FIPS module
boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-19"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9230/">CVE-2025-9230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230">CVE-2025-9230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250232">SUSE bug 1250232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250410">SUSE bug 1250410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010034150" comment="libopenssl-3-devel-3.5.0-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034151" comment="libopenssl-3-fips-provider-3.5.0-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034153" comment="libopenssl3-3.5.0-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034155" comment="openssl-3-3.5.0-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047375" comment="openssl-3-livepatches-0.3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9231</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9231" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9231" ref_url="https://www.suse.com/security/cve/CVE-2025-9231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: A timing side-channel which could potentially allow remote
recovery of the private key exists in the SM2 algorithm implementation on 64 bit
ARM platforms.

Impact summary: A timing side-channel in SM2 signature computations on 64 bit
ARM platforms could allow recovering the private key by an attacker..

While remote key recovery over a network was not attempted by the reporter,
timing measurements revealed a timing signal which may allow such an attack.

OpenSSL does not directly support certificates with SM2 keys in TLS, and so
this CVE is not relevant in most TLS contexts.  However, given that it is
possible to add support for such certificates via a custom provider, coupled
with the fact that in such a custom provider context the private key may be
recoverable via remote timing measurements, we consider this to be a Moderate
severity issue.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue, as SM2 is not an approved algorithm.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-19"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9231/">CVE-2025-9231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9231">CVE-2025-9231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250233">SUSE bug 1250233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010034150" comment="libopenssl-3-devel-3.5.0-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034151" comment="libopenssl-3-fips-provider-3.5.0-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034153" comment="libopenssl3-3.5.0-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034155" comment="openssl-3-3.5.0-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9232</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9232" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9232" ref_url="https://www.suse.com/security/cve/CVE-2025-9232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: An application using the OpenSSL HTTP client API functions may
trigger an out-of-bounds read if the 'no_proxy' environment variable is set and
the host portion of the authority component of the HTTP URL is an IPv6 address.

Impact summary: An out-of-bounds read can trigger a crash which leads to
Denial of Service for an application.

The OpenSSL HTTP client API functions can be used directly by applications
but they are also used by the OCSP client functions and CMP (Certificate
Management Protocol) client implementation in OpenSSL. However the URLs used
by these implementations are unlikely to be controlled by an attacker.

In this vulnerable code the out of bounds read can only trigger a crash.
Furthermore the vulnerability requires an attacker-controlled URL to be
passed from an application to the OpenSSL function and the user has to have
a 'no_proxy' environment variable set. For the aforementioned reasons the
issue was assessed as Low severity.

The vulnerable code was introduced in the following patch releases:
3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue, as the HTTP client implementation is outside the OpenSSL FIPS module
boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-19"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9232/">CVE-2025-9232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9232">CVE-2025-9232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250234">SUSE bug 1250234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010034150" comment="libopenssl-3-devel-3.5.0-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034151" comment="libopenssl-3-fips-provider-3.5.0-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034153" comment="libopenssl3-3.5.0-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034155" comment="openssl-3-3.5.0-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9403</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9403" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9403" ref_url="https://www.suse.com/security/cve/CVE-2025-9403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024775.html" source="SUSE-SU"/>
    <description>
    A vulnerability was determined in jqlang jq up to 1.6. Impacted is the function run_jq_tests of the file jq_test.c of the component JSON Parser. Executing manipulation can lead to reachable assertion. The attack requires local access. The exploit has been publicly disclosed and may be utilized. Other versions might be affected as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-20"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-9403/">CVE-2025-9403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9403">CVE-2025-9403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248600">SUSE bug 1248600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009815811" comment="jq is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009815813" comment="libjq1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9566</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9566" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9566" ref_url="https://www.suse.com/security/cve/CVE-2025-9566" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15900" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002019.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15904" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002024.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20909" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03584-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
    <description>
    There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file.

Binary-Affected: podman
Upstream-version-introduced: v4.0.0
Upstream-version-fixed: v5.6.1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9566/">CVE-2025-9566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9566">CVE-2025-9566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249154">SUSE bug 1249154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010047314" comment="podman-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047315" comment="podman-docker-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047316" comment="podman-remote-5.4.2-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047317" comment="podmansh-5.4.2-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9640</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9640" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9640" ref_url="https://www.suse.com/security/cve/CVE-2025-9640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03603-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03604-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03618-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042218.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Samba, in the vfs_streams_xattr module, where uninitialized heap memory could be written into alternate data streams. This allows an authenticated user to read residual memory content that may include sensitive data, resulting in an information disclosure vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-9640/">CVE-2025-9640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9640">CVE-2025-9640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251279">SUSE bug 1251279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010030512" comment="libldb2-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030519" comment="samba-client-libs-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9714</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9714" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9714" ref_url="https://www.suse.com/security/cve/CVE-2025-9714" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22376" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003133.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22377" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023291.html" source="SUSE-SU"/>
    <description>
    Uncontrolled recursion in  XPath evaluation  in libxml2 up to and including version 2.9.14 allows a local attacker to cause a stack overflow via crafted expressions. XPath processing functions `xmlXPathRunEval`, `xmlXPathCtxtCompile`, and `xmlXPathEvalExpr` were resetting recursion depth to zero before making potentially recursive calls. When such functions were called recursively this could allow for uncontrolled recursion and lead to a stack overflow. These functions now preserve recursion depth across recursive calls, allowing recursion depth to be controlled.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-17"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9714/">CVE-2025-9714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9714">CVE-2025-9714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249076">SUSE bug 1249076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010012763" comment="libexslt0 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008347" comment="libxslt1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9820</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9820" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9820" ref_url="https://www.suse.com/security/cve/CVE-2025-9820" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003274.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5585" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20962-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20968-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045347.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9820/">CVE-2025-9820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9820">CVE-2025-9820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254132">SUSE bug 1254132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010052615" comment="gnutls-3.8.10-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052618" comment="libgnutls30-3.8.10-160000.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9900</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9900" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9900" ref_url="https://www.suse.com/security/cve/CVE-2025-9900" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17675" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002075.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19113" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002132.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19276" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002139.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20956" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023168.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file.

By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9900/">CVE-2025-9900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9900">CVE-2025-9900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250404">SUSE bug 1250404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030535" comment="libtiff6-4.7.1-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0665</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0665" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0665" ref_url="https://www.suse.com/security/cve/CVE-2026-0665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024769.html" source="SUSE-SU"/>
    <description>
    An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0665/">CVE-2026-0665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0665">CVE-2026-0665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256484">SUSE bug 1256484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010048658" comment="qemu-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048659" comment="qemu-SLOF-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010049216" comment="qemu-arm-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048668" comment="qemu-audio-spice-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048671" comment="qemu-block-iscsi-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048674" comment="qemu-block-ssh-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048676" comment="qemu-chardev-spice-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048679" comment="qemu-guest-agent-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048681" comment="qemu-hw-display-qxl-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048682" comment="qemu-hw-display-virtio-gpu-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048683" comment="qemu-hw-display-virtio-gpu-pci-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048684" comment="qemu-hw-display-virtio-vga-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010049217" comment="qemu-hw-s390x-virtio-gpu-ccw-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048686" comment="qemu-hw-usb-host-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048687" comment="qemu-hw-usb-redirect-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048689" comment="qemu-img-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048690" comment="qemu-ipxe-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048692" comment="qemu-ksm-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048693" comment="qemu-lang-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010049218" comment="qemu-ppc-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048697" comment="qemu-pr-helper-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010049219" comment="qemu-s390x-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048699" comment="qemu-seabios-10.0.81.16.3_3_g3d33c746-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048702" comment="qemu-tools-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048706" comment="qemu-ui-opengl-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048708" comment="qemu-ui-spice-core-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048709" comment="qemu-vgabios-10.0.81.16.3_3_g3d33c746-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010048711" comment="qemu-vmsr-helper-10.0.8-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010049220" comment="qemu-x86-10.0.8-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0672</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0672" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0672" ref_url="https://www.suse.com/security/cve/CVE-2026-0672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
    <description>
    When using http.cookies.Morsel, user-controlled cookie values and parameters can allow injecting HTTP headers into messages. Patch rejects all control characters within cookie names, values, and parameters.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0672/">CVE-2026-0672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0672">CVE-2026-0672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257031">SUSE bug 1257031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010044584" comment="libpython3_13-1_0-3.13.12-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044587" comment="python313-3.13.12-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044588" comment="python313-base-3.13.12-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044590" comment="python313-curses-3.13.12-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0716</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0716" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0716" ref_url="https://www.suse.com/security/cve/CVE-2026-0716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1178-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1179-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024798.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup's WebSocket frame processing when handling incoming messages. If a non-default configuration is used where the maximum incoming payload size is unset, the library may read memory outside the intended bounds. This can cause unintended memory exposure or a crash. Applications using libsoup's WebSocket support with this configuration may be impacted.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0716/">CVE-2026-0716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0716">CVE-2026-0716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256418">SUSE bug 1256418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041474" comment="libsoup-3_0-0-3.6.5-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0719</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0719" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0719" ref_url="https://www.suse.com/security/cve/CVE-2026-0719" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2049" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002479.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2214" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002486.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2215" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002487.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2216" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024323.html" source="SUSE-SU"/>
    <description>
    A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0719/">CVE-2026-0719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0719">CVE-2026-0719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256399">SUSE bug 1256399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041474" comment="libsoup-3_0-0-3.6.5-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0861</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0861" ref_url="https://www.suse.com/security/cve/CVE-2026-0861" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2786" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024608.html" source="SUSE-SU"/>
    <description>
    Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.

Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this.  The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument.  This limits the malicious inputs for the alignment for memalign to the range [1&lt;&lt;62+ 1, 1&lt;&lt;63] and exactly 1&lt;&lt;63 for posix_memalign and aligned_alloc.

Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice.  An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0861/">CVE-2026-0861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0861">CVE-2026-0861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256766">SUSE bug 1256766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256913">SUSE bug 1256913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041425" comment="glibc-2.40-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041426" comment="glibc-devel-2.40-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041667" comment="glibc-gconv-modules-extra-2.40-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047376" comment="glibc-livepatches-0.3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041434" comment="glibc-locale-2.40-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041435" comment="glibc-locale-base-2.40-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037673" comment="linux-glibc-devel is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0865</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0865" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0865" ref_url="https://www.suse.com/security/cve/CVE-2026-0865" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002475.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4168" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003263.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002569.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
    <description>
    User-controlled header names and values containing newlines can allow injecting HTTP headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0865/">CVE-2026-0865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0865">CVE-2026-0865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257042">SUSE bug 1257042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010044584" comment="libpython3_13-1_0-3.13.12-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044587" comment="python313-3.13.12-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044588" comment="python313-base-3.13.12-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044590" comment="python313-curses-3.13.12-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0915</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0915" ref_url="https://www.suse.com/security/cve/CVE-2026-0915" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2786" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003249.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4772" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024576.html" source="SUSE-SU"/>
    <description>
    Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0915/">CVE-2026-0915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0915">CVE-2026-0915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256822">SUSE bug 1256822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041425" comment="glibc-2.40-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041426" comment="glibc-devel-2.40-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041667" comment="glibc-gconv-modules-extra-2.40-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041434" comment="glibc-locale-2.40-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041435" comment="glibc-locale-base-2.40-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0988</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0988" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0988" ref_url="https://www.suse.com/security/cve/CVE-2026-0988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024480.html" source="SUSE-SU"/>
    <description>
    A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0988/">CVE-2026-0988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0988">CVE-2026-0988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257049">SUSE bug 1257049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041576" comment="glib2-tools-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041577" comment="libgio-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041578" comment="libgirepository-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041579" comment="libglib-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041580" comment="libgmodule-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041581" comment="libgobject-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041584" comment="typelib-1_0-GLib-2_0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041586" comment="typelib-1_0-GModule-2_0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041587" comment="typelib-1_0-GObject-2_0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041588" comment="typelib-1_0-Gio-2_0-2.84.4-160000.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0989</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0989" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0989" ref_url="https://www.suse.com/security/cve/CVE-2026-0989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024731.html" source="SUSE-SU"/>
    <description>
    A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested &lt;include&gt; directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0989/">CVE-2026-0989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0989">CVE-2026-0989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256804">SUSE bug 1256804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010042230" comment="libxml2-2-2.13.8-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042233" comment="libxml2-tools-2.13.8-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042234" comment="python313-libxml2-2.13.8-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0990</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0990" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0990" ref_url="https://www.suse.com/security/cve/CVE-2026-0990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024731.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0990/">CVE-2026-0990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0990">CVE-2026-0990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256806">SUSE bug 1256806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010047326" comment="libexslt0-1.1.43-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047327" comment="libxml2-2-2.13.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047330" comment="libxml2-tools-2.13.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047333" comment="libxslt1-1.1.43-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047334" comment="python313-libxml2-2.13.8-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0992</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0992" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0992" ref_url="https://www.suse.com/security/cve/CVE-2026-0992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024731.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated &lt;nextCatalog&gt; elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0992/">CVE-2026-0992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0992">CVE-2026-0992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256808">SUSE bug 1256808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010047326" comment="libexslt0-1.1.43-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047327" comment="libxml2-2-2.13.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047330" comment="libxml2-tools-2.13.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047333" comment="libxslt1-1.1.43-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047334" comment="python313-libxml2-2.13.8-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0994</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0994" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0994" ref_url="https://www.suse.com/security/cve/CVE-2026-0994" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3095" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003209.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3219" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025106.html" source="SUSE-SU"/>
    <description>
    A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages.

Due to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursion limit, eventually exhausting Python's recursion stack and causing a RecursionError.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0994/">CVE-2026-0994 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0994">CVE-2026-0994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257173">SUSE bug 1257173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050016" comment="libprotobuf28_3_0-28.3-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050017" comment="libutf8_range-28_3_0-28.3-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1299</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1299" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1299" ref_url="https://www.suse.com/security/cve/CVE-2026-1299" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002475.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003253.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4168" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003263.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4216" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003265.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002569.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002580.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002594.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6464" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045283.html" source="SUSE-SU"/>
    <description>
    The 
email module, specifically the "BytesGenerator" class, didn't properly quote newlines for email headers when 
serializing an email message allowing for header injection when an email
 is serialized. This is only applicable if using "LiteralHeader" writing headers that don't respect email folding rules, the new behavior will reject the incorrectly folded headers in "BytesGenerator".
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1299/">CVE-2026-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1299">CVE-2026-1299 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257181">SUSE bug 1257181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010044584" comment="libpython3_13-1_0-3.13.12-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044587" comment="python313-3.13.12-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044588" comment="python313-base-3.13.12-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044590" comment="python313-curses-3.13.12-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1467</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1467" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1467" ref_url="https://www.suse.com/security/cve/CVE-2026-1467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup, an HTTP client library. This vulnerability, known as CRLF (Carriage Return Line Feed) Injection, occurs when an HTTP proxy is configured and the library improperly handles URL-decoded input used to create the Host header. A remote attacker can exploit this by providing a specially crafted URL containing CRLF sequences, allowing them to inject additional HTTP headers or complete HTTP request bodies. This can lead to unintended or unauthorized HTTP requests being forwarded by the proxy, potentially impacting downstream services.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1467/">CVE-2026-1467 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1467">CVE-2026-1467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257398">SUSE bug 1257398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1484</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1484" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1484" ref_url="https://www.suse.com/security/cve/CVE-2026-1484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024480.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1484/">CVE-2026-1484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1484">CVE-2026-1484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257355">SUSE bug 1257355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041576" comment="glib2-tools-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041577" comment="libgio-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041578" comment="libgirepository-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041579" comment="libglib-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041580" comment="libgmodule-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041581" comment="libgobject-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041584" comment="typelib-1_0-GLib-2_0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041586" comment="typelib-1_0-GModule-2_0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041587" comment="typelib-1_0-GObject-2_0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041588" comment="typelib-1_0-Gio-2_0-2.84.4-160000.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1485</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1485" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1485" ref_url="https://www.suse.com/security/cve/CVE-2026-1485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024480.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1485/">CVE-2026-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1485">CVE-2026-1485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257354">SUSE bug 1257354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041576" comment="glib2-tools-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041577" comment="libgio-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041578" comment="libgirepository-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041579" comment="libglib-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041580" comment="libgmodule-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041581" comment="libgobject-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041584" comment="typelib-1_0-GLib-2_0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041586" comment="typelib-1_0-GModule-2_0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041587" comment="typelib-1_0-GObject-2_0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041588" comment="typelib-1_0-Gio-2_0-2.84.4-160000.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1489</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1489" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1489" ref_url="https://www.suse.com/security/cve/CVE-2026-1489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024480.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1489/">CVE-2026-1489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1489">CVE-2026-1489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257353">SUSE bug 1257353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041576" comment="glib2-tools-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041577" comment="libgio-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041578" comment="libgirepository-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041579" comment="libglib-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041580" comment="libgmodule-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041581" comment="libgobject-2_0-0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041584" comment="typelib-1_0-GLib-2_0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041586" comment="typelib-1_0-GModule-2_0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041587" comment="typelib-1_0-GObject-2_0-2.84.4-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041588" comment="typelib-1_0-Gio-2_0-2.84.4-160000.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1536</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1536" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1536" ref_url="https://www.suse.com/security/cve/CVE-2026-1536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. An attacker who can control the input for the Content-Disposition header can inject CRLF (Carriage Return Line Feed) sequences into the header value. These sequences are then interpreted verbatim when the HTTP request or response is constructed, allowing arbitrary HTTP headers to be injected. This vulnerability can lead to HTTP header injection or HTTP response splitting without requiring authentication or user interaction.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1536/">CVE-2026-1536 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1536">CVE-2026-1536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257440">SUSE bug 1257440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042593" comment="libsoup-3_0-0-3.6.5-160000.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1539</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1539" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1539" ref_url="https://www.suse.com/security/cve/CVE-2026-1539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the libsoup HTTP library that can cause proxy authentication credentials to be sent to unintended destinations. When handling HTTP redirects, libsoup removes the Authorization header but does not remove the Proxy-Authorization header if the request is redirected to a different host. As a result, sensitive proxy credentials may be leaked to third-party servers. Applications using libsoup for HTTP communication may unintentionally expose proxy authentication data.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1539/">CVE-2026-1539 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1539">CVE-2026-1539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257441">SUSE bug 1257441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1757</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1757" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1757" ref_url="https://www.suse.com/security/cve/CVE-2026-1757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024731.html" source="SUSE-SU"/>
    <description>
    A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1757/">CVE-2026-1757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1757">CVE-2026-1757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257593">SUSE bug 1257593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010047326" comment="libexslt0-1.1.43-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047327" comment="libxml2-2-2.13.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047330" comment="libxml2-tools-2.13.8-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047333" comment="libxslt1-1.1.43-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047334" comment="python313-libxml2-2.13.8-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1760</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1760" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1760" ref_url="https://www.suse.com/security/cve/CVE-2026-1760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw was found in SoupServer. This HTTP request smuggling vulnerability occurs because SoupServer improperly handles requests that combine Transfer-Encoding: chunked and Connection: keep-alive headers. A remote, unauthenticated client can exploit this by sending specially crafted requests, causing SoupServer to fail to close the connection as required by RFC 9112. This allows the attacker to smuggle additional requests over the persistent connection, leading to unintended request processing and potential denial-of-service (DoS) conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1760/">CVE-2026-1760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1760">CVE-2026-1760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257597">SUSE bug 1257597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1761</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1761" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1761" ref_url="https://www.suse.com/security/cve/CVE-2026-1761" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2049" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002479.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2214" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002486.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2215" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002487.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2216" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1761/">CVE-2026-1761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1761">CVE-2026-1761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257598">SUSE bug 1257598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042593" comment="libsoup-3_0-0-3.6.5-160000.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1965</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1965" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1965" ref_url="https://www.suse.com/security/cve/CVE-2026-1965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025098.html" source="SUSE-SU"/>
    <description>
    libcurl can in some circumstances reuse the wrong connection when asked to do
an Negotiate-authenticated HTTP or HTTPS request.

libcurl features a pool of recent connections so that subsequent requests can
reuse an existing connection to avoid overhead.

When reusing a connection a range of criterion must first be met. Due to a
logical error in the code, a request that was issued by an application could
wrongfully reuse an existing connection to the same server that was
authenticated using different credentials. One underlying reason being that
Negotiate sometimes authenticates *connections* and not *requests*, contrary
to how HTTP is designed to work.

An application that allows Negotiate authentication to a server (that responds
wanting Negotiate) with `user1:password1` and then does another operation to
the same server also using Negotiate but with `user2:password2` (while the
previous connection is still alive) - the second request wrongly reused the
same connection and since it then sees that the Negotiate negotiation is
already made, it just sends the request over that connection thinking it uses
the user2 credentials when it is in fact still using the connection
authenticated for user1...

The set of authentication methods to use is set with  `CURLOPT_HTTPAUTH`.

Applications can disable libcurl's reuse of connections and thus mitigate this
problem, by using one of the following libcurl options to alter how
connections are or are not reused: `CURLOPT_FRESH_CONNECT`,
`CURLOPT_MAXCONNECTS` and `CURLMOPT_MAX_HOST_CONNECTIONS` (if using the
curl_multi API).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1965/">CVE-2026-1965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1965">CVE-2026-1965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259362">SUSE bug 1259362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050024" comment="curl-8.14.1-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050025" comment="libcurl4-8.14.1-160000.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21441</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21441" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21441" ref_url="https://www.suse.com/security/cve/CVE-2026-21441" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1087" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003188.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003216.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1089" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003205.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1239" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003190.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1240" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002454.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1619" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002467.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1704" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002462.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1706" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002464.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024616.html" source="SUSE-SU"/>
    <description>
    urllib3 is an HTTP client library for Python. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21441/">CVE-2026-21441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21441">CVE-2026-21441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256331">SUSE bug 1256331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039707" comment="python313-urllib3-2.5.0-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22184</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22184" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22184" ref_url="https://www.suse.com/security/cve/CVE-2026-22184" source="SUSE CVE"/>
    <description>
    zlib versions up to and including 1.3.1.2 include a global buffer overflow in the untgz utility located under contrib/untgz. The vulnerability is limited to the standalone demonstration utility and does not affect the core zlib compression library. The flaw occurs when a user executes the untgz command with an excessively long archive name supplied via the command line, leading to an out-of-bounds write in a fixed-size global buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-09"/>
	<updated date="2026-03-29"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22184/">CVE-2026-22184 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22184">CVE-2026-22184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256327">SUSE bug 1256327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679007" comment="libz1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679010" comment="zlib-devel is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22185</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22185" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22185" ref_url="https://www.suse.com/security/cve/CVE-2026-22185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023892.html" source="SUSE-SU"/>
    <description>
    OpenLDAP Lightning Memory-Mapped Database (LMDB) versions up to and including 0.9.14, prior to commit 8e1fda8, contain a heap buffer underflow in the readline() function of mdb_load. When processing malformed input containing an embedded NUL byte, an unsigned offset calculation can underflow and cause an out-of-bounds read of one byte before the allocated heap buffer. This can cause mdb_load to crash, leading to a limited denial-of-service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22185/">CVE-2026-22185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22185">CVE-2026-22185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256297">SUSE bug 1256297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010052476" comment="libldap-2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009727410" comment="libldap-data is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22693</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22693" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22693" ref_url="https://www.suse.com/security/cve/CVE-2026-22693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20922-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045230.html" source="SUSE-SU"/>
    <description>
    HarfBuzz is a text shaping engine. Prior to version 12.3.0, a null pointer dereference vulnerability exists in the SubtableUnicodesCache::create function located in src/hb-ot-cmap-table.hh. The function fails to check if hb_malloc returns NULL before using placement new to construct an object at the returned pointer address. When hb_malloc fails to allocate memory (which can occur in low-memory conditions or when using custom allocators that simulate allocation failures), it returns NULL. The code then attempts to call the constructor on this null pointer using placement new syntax, resulting in undefined behavior and a Segmentation Fault. This issue has been patched in version 12.3.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22693/">CVE-2026-22693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22693">CVE-2026-22693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256459">SUSE bug 1256459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050027" comment="libharfbuzz-gobject0-11.4.5-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050028" comment="libharfbuzz0-11.4.5-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050029" comment="typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22695</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22695" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22695" ref_url="https://www.suse.com/security/cve/CVE-2026-22695" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003222.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3576" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002577.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002568.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4728" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20127-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024563.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.51 to 1.6.53, there is a heap buffer over-read in the libpng simplified API function png_image_finish_read when processing interlaced 16-bit PNGs with 8-bit output format and non-minimal row stride. This is a regression introduced by the fix for CVE-2025-65018. This vulnerability is fixed in 1.6.54.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22695/">CVE-2026-22695 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22695">CVE-2026-22695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256525">SUSE bug 1256525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039686" comment="libpng16-16-1.6.44-160000.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22772</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22772" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22772" ref_url="https://www.suse.com/security/cve/CVE-2026-22772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025109.html" source="SUSE-SU"/>
    <description>
    Fulcio is a certificate authority for issuing code signing certificates for an OpenID Connect (OIDC) identity. Prior to 1.8.5, Fulcio's metaRegex() function uses unanchored regex, allowing attackers to bypass MetaIssuer URL validation and trigger SSRF to arbitrary internal services. Since the SSRF only can trigger GET requests, the request cannot mutate state. The response from the GET request is not returned to the caller so data exfiltration is not possible. A malicious actor could attempt to probe an internal network through Blind SSRF. This vulnerability is fixed in 1.8.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22772/">CVE-2026-22772 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22772">CVE-2026-22772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256532">SUSE bug 1256532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009343329" comment="podman is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958376" comment="podman-docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871694" comment="podman-remote is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958377" comment="podmansh is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659876" comment="skopeo is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22791</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22791" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22791" ref_url="https://www.suse.com/security/cve/CVE-2026-22791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024341.html" source="SUSE-SU"/>
    <description>
    openCryptoki is a PKCS#11 library and tools for Linux and AIX. In 3.25.0 and 3.26.0, there is a heap buffer overflow vulnerability in the CKM_ECDH_AES_KEY_WRAP implementation allows an attacker with local access to cause out-of-bounds writes in the host process by supplying a compressed EC public key and invoking C_WrapKey. This can lead to heap corruption, or denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-17"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22791/">CVE-2026-22791 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22791">CVE-2026-22791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256673">SUSE bug 1256673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044105" comment="openCryptoki-3.26.0-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22795</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22795" ref_url="https://www.suse.com/security/cve/CVE-2026-22795" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: An invalid or NULL pointer dereference can happen in
an application processing a malformed PKCS#12 file.

Impact summary: An application processing a malformed PKCS#12 file can be
caused to dereference an invalid or NULL pointer on memory read, resulting
in a Denial of Service.

A type confusion vulnerability exists in PKCS#12 parsing code where
an ASN1_TYPE union member is accessed without first validating the type,
causing an invalid pointer read.

The location is constrained to a 1-byte address space, meaning any
attempted pointer manipulation can only target addresses between 0x00 and 0xFF.
This range corresponds to the zero page, which is unmapped on most modern
operating systems and will reliably result in a crash, leading only to a
Denial of Service. Exploiting this issue also requires a user or application
to process a maliciously crafted PKCS#12 file. It is uncommon to accept
untrusted PKCS#12 files in applications as they are usually used to store
private keys which are trusted by definition. For these reasons, the issue
was assessed as Low severity.

The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the PKCS12 implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.

OpenSSL 1.0.2 is not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-04"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22795/">CVE-2026-22795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22795">CVE-2026-22795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256839">SUSE bug 1256839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941029" comment="openssl-3-livepatches is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22796</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22796" ref_url="https://www.suse.com/security/cve/CVE-2026-22796" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: A type confusion vulnerability exists in the signature
verification of signed PKCS#7 data where an ASN1_TYPE union member is
accessed without first validating the type, causing an invalid or NULL
pointer dereference when processing malformed PKCS#7 data.

Impact summary: An application performing signature verification of PKCS#7
data or calling directly the PKCS7_digest_from_attributes() function can be
caused to dereference an invalid or NULL pointer when reading, resulting in
a Denial of Service.

The function PKCS7_digest_from_attributes() accesses the message digest attribute
value without validating its type. When the type is not V_ASN1_OCTET_STRING,
this results in accessing invalid memory through the ASN1_TYPE union, causing
a crash.

Exploiting this vulnerability requires an attacker to provide a malformed
signed PKCS#7 to an application that verifies it. The impact of the
exploit is just a Denial of Service, the PKCS7 API is legacy and applications
should be using the CMS API instead. For these reasons the issue was
assessed as Low severity.

The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the PKCS#7 parsing implementation is outside the OpenSSL FIPS module
boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-04"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-22796/">CVE-2026-22796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22796">CVE-2026-22796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256840">SUSE bug 1256840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941029" comment="openssl-3-livepatches is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22801</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22801" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22801" ref_url="https://www.suse.com/security/cve/CVE-2026-22801" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003222.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3576" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002577.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002568.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4728" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20127-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024563.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit systems. This vulnerability is fixed in 1.6.54.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22801/">CVE-2026-22801 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22801">CVE-2026-22801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256526">SUSE bug 1256526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039686" comment="libpng16-16-1.6.44-160000.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22976</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22976" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22976" ref_url="https://www.suse.com/security/cve/CVE-2026-22976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset

`qfq_class-&gt;leaf_qdisc-&gt;q.qlen &gt; 0` does not imply that the class
itself is active.

Two qfq_class objects may point to the same leaf_qdisc. This happens
when:

1. one QFQ qdisc is attached to the dev as the root qdisc, and

2. another QFQ qdisc is temporarily referenced (e.g., via qdisc_get()
/ qdisc_put()) and is pending to be destroyed, as in function
tc_new_tfilter.

When packets are enqueued through the root QFQ qdisc, the shared
leaf_qdisc-&gt;q.qlen increases. At the same time, the second QFQ
qdisc triggers qdisc_put and qdisc_destroy: the qdisc enters
qfq_reset() with its own q-&gt;q.qlen == 0, but its class's leaf
qdisc-&gt;q.qlen &gt; 0. Therefore, the qfq_reset would wrongly deactivate
an inactive aggregate and trigger a null-deref in qfq_deactivate_agg:

[    0.903172] BUG: kernel NULL pointer dereference, address: 0000000000000000
[    0.903571] #PF: supervisor write access in kernel mode
[    0.903860] #PF: error_code(0x0002) - not-present page
[    0.904177] PGD 10299b067 P4D 10299b067 PUD 10299c067 PMD 0
[    0.904502] Oops: Oops: 0002 [#1] SMP NOPTI
[    0.904737] CPU: 0 UID: 0 PID: 135 Comm: exploit Not tainted 6.19.0-rc3+ #2 NONE
[    0.905157] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.17.0-0-gb52ca86e094d-prebuilt.qemu.org 04/01/2014
[    0.905754] RIP: 0010:qfq_deactivate_agg (include/linux/list.h:992 (discriminator 2) include/linux/list.h:1006 (discriminator 2) net/sched/sch_qfq.c:1367 (discriminator 2) net/sched/sch_qfq.c:1393 (discriminator 2))
[    0.906046] Code: 0f 84 4d 01 00 00 48 89 70 18 8b 4b 10 48 c7 c2 ff ff ff ff 48 8b 78 08 48 d3 e2 48 21 f2 48 2b 13 48 8b 30 48 d3 ea 8b 4b 18 0

Code starting with the faulting instruction
===========================================
   0:	0f 84 4d 01 00 00    	je     0x153
   6:	48 89 70 18          	mov    %rsi,0x18(%rax)
   a:	8b 4b 10             	mov    0x10(%rbx),%ecx
   d:	48 c7 c2 ff ff ff ff 	mov    $0xffffffffffffffff,%rdx
  14:	48 8b 78 08          	mov    0x8(%rax),%rdi
  18:	48 d3 e2             	shl    %cl,%rdx
  1b:	48 21 f2             	and    %rsi,%rdx
  1e:	48 2b 13             	sub    (%rbx),%rdx
  21:	48 8b 30             	mov    (%rax),%rsi
  24:	48 d3 ea             	shr    %cl,%rdx
  27:	8b 4b 18             	mov    0x18(%rbx),%ecx
	...
[    0.907095] RSP: 0018:ffffc900004a39a0 EFLAGS: 00010246
[    0.907368] RAX: ffff8881043a0880 RBX: ffff888102953340 RCX: 0000000000000000
[    0.907723] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[    0.908100] RBP: ffff888102952180 R08: 0000000000000000 R09: 0000000000000000
[    0.908451] R10: ffff8881043a0000 R11: 0000000000000000 R12: ffff888102952000
[    0.908804] R13: ffff888102952180 R14: ffff8881043a0ad8 R15: ffff8881043a0880
[    0.909179] FS:  000000002a1a0380(0000) GS:ffff888196d8d000(0000) knlGS:0000000000000000
[    0.909572] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    0.909857] CR2: 0000000000000000 CR3: 0000000102993002 CR4: 0000000000772ef0
[    0.910247] PKRU: 55555554
[    0.910391] Call Trace:
[    0.910527]  &lt;TASK&gt;
[    0.910638]  qfq_reset_qdisc (net/sched/sch_qfq.c:357 net/sched/sch_qfq.c:1485)
[    0.910826]  qdisc_reset (include/linux/skbuff.h:2195 include/linux/skbuff.h:2501 include/linux/skbuff.h:3424 include/linux/skbuff.h:3430 net/sched/sch_generic.c:1036)
[    0.911040]  __qdisc_destroy (net/sched/sch_generic.c:1076)
[    0.911236]  tc_new_tfilter (net/sched/cls_api.c:2447)
[    0.911447]  rtnetlink_rcv_msg (net/core/rtnetlink.c:6958)
[    0.911663]  ? __pfx_rtnetlink_rcv_msg (net/core/rtnetlink.c:6861)
[    0.911894]  netlink_rcv_skb (net/netlink/af_netlink.c:2550)
[    0.912100]  netlink_unicast (net/netlink/af_netlink.c:1319 net/netlink/af_netlink.c:1344)
[    0.912296]  ? __alloc_skb (net/core/skbuff.c:706)
[    0.912484]  netlink_sendmsg (net/netlink/af
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22976/">CVE-2026-22976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22976">CVE-2026-22976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257035">SUSE bug 1257035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22977</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22977" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22977" ref_url="https://www.suse.com/security/cve/CVE-2026-22977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sock: fix hardened usercopy panic in sock_recv_errqueue

skbuff_fclone_cache was created without defining a usercopy region,
[1] unlike skbuff_head_cache which properly whitelists the cb[] field.
[2] This causes a usercopy BUG() when CONFIG_HARDENED_USERCOPY is
enabled and the kernel attempts to copy sk_buff.cb data to userspace
via sock_recv_errqueue() -&gt; put_cmsg().

The crash occurs when: 1. TCP allocates an skb using alloc_skb_fclone()
   (from skbuff_fclone_cache) [1]
2. The skb is cloned via skb_clone() using the pre-allocated fclone
[3] 3. The cloned skb is queued to sk_error_queue for timestamp
reporting 4. Userspace reads the error queue via recvmsg(MSG_ERRQUEUE)
5. sock_recv_errqueue() calls put_cmsg() to copy serr-&gt;ee from skb-&gt;cb
[4] 6. __check_heap_object() fails because skbuff_fclone_cache has no
   usercopy whitelist [5]

When cloned skbs allocated from skbuff_fclone_cache are used in the
socket error queue, accessing the sock_exterr_skb structure in skb-&gt;cb
via put_cmsg() triggers a usercopy hardening violation:

[    5.379589] usercopy: Kernel memory exposure attempt detected from SLUB object 'skbuff_fclone_cache' (offset 296, size 16)!
[    5.382796] kernel BUG at mm/usercopy.c:102!
[    5.383923] Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI
[    5.384903] CPU: 1 UID: 0 PID: 138 Comm: poc_put_cmsg Not tainted 6.12.57 #7
[    5.384903] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[    5.384903] RIP: 0010:usercopy_abort+0x6c/0x80
[    5.384903] Code: 1a 86 51 48 c7 c2 40 15 1a 86 41 52 48 c7 c7 c0 15 1a 86 48 0f 45 d6 48 c7 c6 80 15 1a 86 48 89 c1 49 0f 45 f3 e8 84 27 88 ff &lt;0f&gt; 0b 490
[    5.384903] RSP: 0018:ffffc900006f77a8 EFLAGS: 00010246
[    5.384903] RAX: 000000000000006f RBX: ffff88800f0ad2a8 RCX: 1ffffffff0f72e74
[    5.384903] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffffff87b973a0
[    5.384903] RBP: 0000000000000010 R08: 0000000000000000 R09: fffffbfff0f72e74
[    5.384903] R10: 0000000000000003 R11: 79706f6372657375 R12: 0000000000000001
[    5.384903] R13: ffff88800f0ad2b8 R14: ffffea00003c2b40 R15: ffffea00003c2b00
[    5.384903] FS:  0000000011bc4380(0000) GS:ffff8880bf100000(0000) knlGS:0000000000000000
[    5.384903] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    5.384903] CR2: 000056aa3b8e5fe4 CR3: 000000000ea26004 CR4: 0000000000770ef0
[    5.384903] PKRU: 55555554
[    5.384903] Call Trace:
[    5.384903]  &lt;TASK&gt;
[    5.384903]  __check_heap_object+0x9a/0xd0
[    5.384903]  __check_object_size+0x46c/0x690
[    5.384903]  put_cmsg+0x129/0x5e0
[    5.384903]  sock_recv_errqueue+0x22f/0x380
[    5.384903]  tls_sw_recvmsg+0x7ed/0x1960
[    5.384903]  ? srso_alias_return_thunk+0x5/0xfbef5
[    5.384903]  ? schedule+0x6d/0x270
[    5.384903]  ? srso_alias_return_thunk+0x5/0xfbef5
[    5.384903]  ? mutex_unlock+0x81/0xd0
[    5.384903]  ? __pfx_mutex_unlock+0x10/0x10
[    5.384903]  ? __pfx_tls_sw_recvmsg+0x10/0x10
[    5.384903]  ? _raw_spin_lock_irqsave+0x8f/0xf0
[    5.384903]  ? _raw_read_unlock_irqrestore+0x20/0x40
[    5.384903]  ? srso_alias_return_thunk+0x5/0xfbef5

The crash offset 296 corresponds to skb2-&gt;cb within skbuff_fclones:
  - sizeof(struct sk_buff) = 232 - offsetof(struct sk_buff, cb) = 40 -
  offset of skb2.cb in fclones = 232 + 40 = 272 - crash offset 296 =
  272 + 24 (inside sock_exterr_skb.ee)

This patch uses a local stack variable as a bounce buffer to avoid the hardened usercopy check failure.

[1] https://elixir.bootlin.com/linux/v6.12.62/source/net/ipv4/tcp.c#L885
[2] https://elixir.bootlin.com/linux/v6.12.62/source/net/core/skbuff.c#L5104
[3] https://elixir.bootlin.com/linux/v6.12.62/source/net/core/skbuff.c#L5566
[4] https://elixir.bootlin.com/linux/v6.12.62/source/net/core/skbuff.c#L5491
[5] https://elixir.bootlin.com/linux/v6.12.62/source/mm/slub.c#L5719
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22977/">CVE-2026-22977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22977">CVE-2026-22977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257053">SUSE bug 1257053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22978</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22978" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22978" ref_url="https://www.suse.com/security/cve/CVE-2026-22978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: avoid kernel-infoleak from struct iw_point

struct iw_point has a 32bit hole on 64bit arches.

struct iw_point {
  void __user   *pointer;       /* Pointer to the data  (in user space) */
  __u16         length;         /* number of fields or size in bytes */
  __u16         flags;          /* Optional params */
};

Make sure to zero the structure to avoid disclosing 32bits of kernel data
to user space.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22978/">CVE-2026-22978 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22978">CVE-2026-22978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257227">SUSE bug 1257227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22979</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22979" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22979" ref_url="https://www.suse.com/security/cve/CVE-2026-22979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix memory leak in skb_segment_list for GRO packets

When skb_segment_list() is called during packet forwarding, it handles
packets that were aggregated by the GRO engine.

Historically, the segmentation logic in skb_segment_list assumes that
individual segments are split from a parent SKB and may need to carry
their own socket memory accounting. Accordingly, the code transfers
truesize from the parent to the newly created segments.

Prior to commit ed4cccef64c1 ("gro: fix ownership transfer"), this
truesize subtraction in skb_segment_list() was valid because fragments
still carry a reference to the original socket.

However, commit ed4cccef64c1 ("gro: fix ownership transfer") changed
this behavior by ensuring that fraglist entries are explicitly
orphaned (skb-&gt;sk = NULL) to prevent illegal orphaning later in the
stack. This change meant that the entire socket memory charge remained
with the head SKB, but the corresponding accounting logic in
skb_segment_list() was never updated.

As a result, the current code unconditionally adds each fragment's
truesize to delta_truesize and subtracts it from the parent SKB. Since
the fragments are no longer charged to the socket, this subtraction
results in an effective under-count of memory when the head is freed.
This causes sk_wmem_alloc to remain non-zero, preventing socket
destruction and leading to a persistent memory leak.

The leak can be observed via KMEMLEAK when tearing down the networking
environment:

unreferenced object 0xffff8881e6eb9100 (size 2048):
  comm "ping", pid 6720, jiffies 4295492526
  backtrace:
    kmem_cache_alloc_noprof+0x5c6/0x800
    sk_prot_alloc+0x5b/0x220
    sk_alloc+0x35/0xa00
    inet6_create.part.0+0x303/0x10d0
    __sock_create+0x248/0x640
    __sys_socket+0x11b/0x1d0

Since skb_segment_list() is exclusively used for SKB_GSO_FRAGLIST
packets constructed by GRO, the truesize adjustment is removed.

The call to skb_release_head_state() must be preserved. As documented in
commit cf673ed0e057 ("net: fix fraglist segmentation reference count
leak"), it is still required to correctly drop references to SKB
extensions that may be overwritten during __copy_skb_header().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-22979/">CVE-2026-22979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22979">CVE-2026-22979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257228">SUSE bug 1257228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22980</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22980" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22980" ref_url="https://www.suse.com/security/cve/CVE-2026-22980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: provide locking for v4_end_grace

Writing to v4_end_grace can race with server shutdown and result in
memory being accessed after it was freed - reclaim_str_hashtbl in
particularly.

We cannot hold nfsd_mutex across the nfsd4_end_grace() call as that is
held while client_tracking_op-&gt;init() is called and that can wait for
an upcall to nfsdcltrack which can write to v4_end_grace, resulting in a
deadlock.

nfsd4_end_grace() is also called by the landromat work queue and this
doesn't require locking as server shutdown will stop the work and wait
for it before freeing anything that nfsd4_end_grace() might access.

However, we must be sure that writing to v4_end_grace doesn't restart
the work item after shutdown has already waited for it.  For this we
add a new flag protected with nn-&gt;client_lock.  It is set only while it
is safe to make client tracking calls, and v4_end_grace only schedules
work while the flag is set with the spinlock held.

So this patch adds a nfsd_net field "client_tracking_active" which is
set as described.  Another field "grace_end_forced", is set when
v4_end_grace is written.  After this is set, and providing
client_tracking_active is set, the laundromat is scheduled.
This "grace_end_forced" field bypasses other checks for whether the
grace period has finished.

This resolves a race which can result in use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-22980/">CVE-2026-22980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22980">CVE-2026-22980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257222">SUSE bug 1257222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22981</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22981" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22981" ref_url="https://www.suse.com/security/cve/CVE-2026-22981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: detach and close netdevs while handling a reset

Protect the reset path from callbacks by setting the netdevs to detached
state and close any netdevs in UP state until the reset handling has
completed. During a reset, the driver will de-allocate resources for the
vport, and there is no guarantee that those will recover, which is why the
existing vport_ctrl_lock does not provide sufficient protection.

idpf_detach_and_close() is called right before reset handling. If the
reset handling succeeds, the netdevs state is recovered via call to
idpf_attach_and_open(). If the reset handling fails the netdevs remain
down. The detach/down calls are protected with RTNL lock to avoid racing
with callbacks. On the recovery side the attach can be done without
holding the RTNL lock as there are no callbacks expected at that point,
due to detach/close always being done first in that flow.

The previous logic restoring the netdevs state based on the
IDPF_VPORT_UP_REQUESTED flag in the init task is not needed anymore, hence
the removal of idpf_set_vport_state(). The IDPF_VPORT_UP_REQUESTED is
still being used to restore the state of the netdevs following the reset,
but has no use outside of the reset handling flow.

idpf_init_hard_reset() is converted to void, since it was used as such and
there is no error handling being done based on its return value.

Before this change, invoking hard and soft resets simultaneously will
cause the driver to lose the vport state:
ip -br a
&lt;inf&gt;	UP
echo 1 &gt; /sys/class/net/ens801f0/device/reset&amp; \
ethtool -L ens801f0 combined 8
ip -br a
&lt;inf&gt;	DOWN
ip link set &lt;inf&gt; up
ip -br a
&lt;inf&gt;	DOWN

Also in case of a failure in the reset path, the netdev is left
exposed to external callbacks, while vport resources are not
initialized, leading to a crash on subsequent ifup/down:
[408471.398966] idpf 0000:83:00.0: HW reset detected
[408471.411744] idpf 0000:83:00.0: Device HW Reset initiated
[408472.277901] idpf 0000:83:00.0: The driver was unable to contact the device's firmware. Check that the FW is running. Driver state= 0x2
[408508.125551] BUG: kernel NULL pointer dereference, address: 0000000000000078
[408508.126112] #PF: supervisor read access in kernel mode
[408508.126687] #PF: error_code(0x0000) - not-present page
[408508.127256] PGD 2aae2f067 P4D 0
[408508.127824] Oops: Oops: 0000 [#1] SMP NOPTI
...
[408508.130871] RIP: 0010:idpf_stop+0x39/0x70 [idpf]
...
[408508.139193] Call Trace:
[408508.139637]  &lt;TASK&gt;
[408508.140077]  __dev_close_many+0xbb/0x260
[408508.140533]  __dev_change_flags+0x1cf/0x280
[408508.140987]  netif_change_flags+0x26/0x70
[408508.141434]  dev_change_flags+0x3d/0xb0
[408508.141878]  devinet_ioctl+0x460/0x890
[408508.142321]  inet_ioctl+0x18e/0x1d0
[408508.142762]  ? _copy_to_user+0x22/0x70
[408508.143207]  sock_do_ioctl+0x3d/0xe0
[408508.143652]  sock_ioctl+0x10e/0x330
[408508.144091]  ? find_held_lock+0x2b/0x80
[408508.144537]  __x64_sys_ioctl+0x96/0xe0
[408508.144979]  do_syscall_64+0x79/0x3d0
[408508.145415]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[408508.145860] RIP: 0033:0x7f3e0bb4caff
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22981/">CVE-2026-22981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22981">CVE-2026-22981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257225">SUSE bug 1257225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22982</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22982" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22982" ref_url="https://www.suse.com/security/cve/CVE-2026-22982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mscc: ocelot: Fix crash when adding interface under a lag

Commit 15faa1f67ab4 ("lan966x: Fix crash when adding interface under a lag")
fixed a similar issue in the lan966x driver caused by a NULL pointer dereference.
The ocelot_set_aggr_pgids() function in the ocelot driver has similar logic
and is susceptible to the same crash.

This issue specifically affects the ocelot_vsc7514.c frontend, which leaves
unused ports as NULL pointers. The felix_vsc9959.c frontend is unaffected as
it uses the DSA framework which registers all ports.

Fix this by checking if the port pointer is valid before accessing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22982/">CVE-2026-22982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22982">CVE-2026-22982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257179">SUSE bug 1257179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22984</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22984" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22984" ref_url="https://www.suse.com/security/cve/CVE-2026-22984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: prevent potential out-of-bounds reads in handle_auth_done()

Perform an explicit bounds check on payload_len to avoid a possible
out-of-bounds access in the callout.

[ idryomov: changelog ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22984/">CVE-2026-22984 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22984">CVE-2026-22984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257217">SUSE bug 1257217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22985</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22985" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22985" ref_url="https://www.suse.com/security/cve/CVE-2026-22985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: Fix RSS LUT NULL pointer crash on early ethtool operations

The RSS LUT is not initialized until the interface comes up, causing
the following NULL pointer crash when ethtool operations like rxhash on/off
are performed before the interface is brought up for the first time.

Move RSS LUT initialization from ndo_open to vport creation to ensure LUT
is always available. This enables RSS configuration via ethtool before
bringing the interface up. Simplify LUT management by maintaining all
changes in the driver's soft copy and programming zeros to the indirection
table when rxhash is disabled. Defer HW programming until the interface
comes up if it is down during rxhash and LUT configuration changes.

Steps to reproduce:
** Load idpf driver; interfaces will be created
	modprobe idpf
** Before bringing the interfaces up, turn rxhash off
	ethtool -K eth2 rxhash off

[89408.371875] BUG: kernel NULL pointer dereference, address: 0000000000000000
[89408.371908] #PF: supervisor read access in kernel mode
[89408.371924] #PF: error_code(0x0000) - not-present page
[89408.371940] PGD 0 P4D 0
[89408.371953] Oops: Oops: 0000 [#1] SMP NOPTI
&lt;snip&gt;
[89408.372052] RIP: 0010:memcpy_orig+0x16/0x130
[89408.372310] Call Trace:
[89408.372317]  &lt;TASK&gt;
[89408.372326]  ? idpf_set_features+0xfc/0x180 [idpf]
[89408.372363]  __netdev_update_features+0x295/0xde0
[89408.372384]  ethnl_set_features+0x15e/0x460
[89408.372406]  genl_family_rcv_msg_doit+0x11f/0x180
[89408.372429]  genl_rcv_msg+0x1ad/0x2b0
[89408.372446]  ? __pfx_ethnl_set_features+0x10/0x10
[89408.372465]  ? __pfx_genl_rcv_msg+0x10/0x10
[89408.372482]  netlink_rcv_skb+0x58/0x100
[89408.372502]  genl_rcv+0x2c/0x50
[89408.372516]  netlink_unicast+0x289/0x3e0
[89408.372533]  netlink_sendmsg+0x215/0x440
[89408.372551]  __sys_sendto+0x234/0x240
[89408.372571]  __x64_sys_sendto+0x28/0x30
[89408.372585]  x64_sys_call+0x1909/0x1da0
[89408.372604]  do_syscall_64+0x7a/0xfa0
[89408.373140]  ? clear_bhb_loop+0x60/0xb0
[89408.373647]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[89408.378887]  &lt;/TASK&gt;
&lt;snip&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22985/">CVE-2026-22985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22985">CVE-2026-22985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257277">SUSE bug 1257277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22986</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22986" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22986" ref_url="https://www.suse.com/security/cve/CVE-2026-22986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpiolib: fix race condition for gdev-&gt;srcu

If two drivers were calling gpiochip_add_data_with_key(), one may be
traversing the srcu-protected list in gpio_name_to_desc(), meanwhile
other has just added its gdev in gpiodev_add_to_list_unlocked().
This creates a non-mutexed and non-protected timeframe, when one
instance is dereferencing and using &amp;gdev-&gt;srcu, before the other
has initialized it, resulting in crash:

[    4.935481] Unable to handle kernel paging request at virtual address ffff800272bcc000
[    4.943396] Mem abort info:
[    4.943400]   ESR = 0x0000000096000005
[    4.943403]   EC = 0x25: DABT (current EL), IL = 32 bits
[    4.943407]   SET = 0, FnV = 0
[    4.943410]   EA = 0, S1PTW = 0
[    4.943413]   FSC = 0x05: level 1 translation fault
[    4.943416] Data abort info:
[    4.943418]   ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000
[    4.946220]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[    4.955261]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[    4.955268] swapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000038e6c000
[    4.961449] [ffff800272bcc000] pgd=0000000000000000
[    4.969203] , p4d=1000000039739003
[    4.979730] , pud=0000000000000000
[    4.980210] phandle (CPU): 0x0000005e, phandle (BE): 0x5e000000 for node "reset"
[    4.991736] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
...
[    5.121359] pc : __srcu_read_lock+0x44/0x98
[    5.131091] lr : gpio_name_to_desc+0x60/0x1a0
[    5.153671] sp : ffff8000833bb430
[    5.298440]
[    5.298443] Call trace:
[    5.298445]  __srcu_read_lock+0x44/0x98
[    5.309484]  gpio_name_to_desc+0x60/0x1a0
[    5.320692]  gpiochip_add_data_with_key+0x488/0xf00
    5.946419] ---[ end trace 0000000000000000 ]---

Move initialization code for gdev fields before it is added to
gpio_devices, with adjacent initialization code.
Adjust goto statements  to reflect modified order of operations

[Bartosz: fixed a build issue, removed stray newline]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22986/">CVE-2026-22986 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22986">CVE-2026-22986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257276">SUSE bug 1257276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22988</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22988" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22988" ref_url="https://www.suse.com/security/cve/CVE-2026-22988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arp: do not assume dev_hard_header() does not change skb-&gt;head

arp_create() is the only dev_hard_header() caller
making assumption about skb-&gt;head being unchanged.

A recent commit broke this assumption.

Initialize @arp pointer after dev_hard_header() call.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22988/">CVE-2026-22988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22988">CVE-2026-22988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257282">SUSE bug 1257282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22989</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22989" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22989" ref_url="https://www.suse.com/security/cve/CVE-2026-22989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: check that server is running in unlock_filesystem

If we are trying to unlock the filesystem via an administrative
interface and nfsd isn't running, it crashes the server. This
happens currently because nfsd4_revoke_states() access state
structures (eg., conf_id_hashtbl) that has been freed as a part
of the server shutdown.

[   59.465072] Call trace:
[   59.465308]  nfsd4_revoke_states+0x1b4/0x898 [nfsd] (P)
[   59.465830]  write_unlock_fs+0x258/0x440 [nfsd]
[   59.466278]  nfsctl_transaction_write+0xb0/0x120 [nfsd]
[   59.466780]  vfs_write+0x1f0/0x938
[   59.467088]  ksys_write+0xfc/0x1f8
[   59.467395]  __arm64_sys_write+0x74/0xb8
[   59.467746]  invoke_syscall.constprop.0+0xdc/0x1e8
[   59.468177]  do_el0_svc+0x154/0x1d8
[   59.468489]  el0_svc+0x40/0xe0
[   59.468767]  el0t_64_sync_handler+0xa0/0xe8
[   59.469138]  el0t_64_sync+0x1ac/0x1b0

Ensure this can't happen by taking the nfsd_mutex and checking that
the server is still up, and then holding the mutex across the call to
nfsd4_revoke_states().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22989/">CVE-2026-22989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22989">CVE-2026-22989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257279">SUSE bug 1257279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22990</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22990" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22990" ref_url="https://www.suse.com/security/cve/CVE-2026-22990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: replace overzealous BUG_ON in osdmap_apply_incremental()

If the osdmap is (maliciously) corrupted such that the incremental
osdmap epoch is different from what is expected, there is no need to
BUG.  Instead, just declare the incremental osdmap to be invalid.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22990/">CVE-2026-22990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22990">CVE-2026-22990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257221">SUSE bug 1257221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22991</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22991" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22991" ref_url="https://www.suse.com/security/cve/CVE-2026-22991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: make free_choose_arg_map() resilient to partial allocation

free_choose_arg_map() may dereference a NULL pointer if its caller fails
after a partial allocation.

For example, in decode_choose_args(), if allocation of arg_map-&gt;args
fails, execution jumps to the fail label and free_choose_arg_map() is
called. Since arg_map-&gt;size is updated to a non-zero value before memory
allocation, free_choose_arg_map() will iterate over arg_map-&gt;args and
dereference a NULL pointer.

To prevent this potential NULL pointer dereference and make
free_choose_arg_map() more resilient, add checks for pointers before
iterating.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22991/">CVE-2026-22991 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22991">CVE-2026-22991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257220">SUSE bug 1257220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22992</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22992" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22992" ref_url="https://www.suse.com/security/cve/CVE-2026-22992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: return the handler error from mon_handle_auth_done()

Currently any error from ceph_auth_handle_reply_done() is propagated
via finish_auth() but isn't returned from mon_handle_auth_done().  This
results in higher layers learning that (despite the monitor considering
us to be successfully authenticated) something went wrong in the
authentication phase and reacting accordingly, but msgr2 still trying
to proceed with establishing the session in the background.  In the
case of secure mode this can trigger a WARN in setup_crypto() and later
lead to a NULL pointer dereference inside of prepare_auth_signature().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22992/">CVE-2026-22992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22992">CVE-2026-22992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257218">SUSE bug 1257218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22993</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22993" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22993" ref_url="https://www.suse.com/security/cve/CVE-2026-22993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: Fix RSS LUT NULL ptr issue after soft reset

During soft reset, the RSS LUT is freed and not restored unless the
interface is up. If an ethtool command that accesses the rss lut is
attempted immediately after reset, it will result in NULL ptr
dereference. Also, there is no need to reset the rss lut if the soft reset
does not involve queue count change.

After soft reset, set the RSS LUT to default values based on the updated
queue count only if the reset was a result of a queue count change and
the LUT was not configured by the user. In all other cases, don't touch
the LUT.

Steps to reproduce:

** Bring the interface down (if up)
ifconfig eth1 down

** update the queue count (eg., 27-&gt;20)
ethtool -L eth1 combined 20

** display the RSS LUT
ethtool -x eth1

[82375.558338] BUG: kernel NULL pointer dereference, address: 0000000000000000
[82375.558373] #PF: supervisor read access in kernel mode
[82375.558391] #PF: error_code(0x0000) - not-present page
[82375.558408] PGD 0 P4D 0
[82375.558421] Oops: Oops: 0000 [#1] SMP NOPTI
&lt;snip&gt;
[82375.558516] RIP: 0010:idpf_get_rxfh+0x108/0x150 [idpf]
[82375.558786] Call Trace:
[82375.558793]  &lt;TASK&gt;
[82375.558804]  rss_prepare.isra.0+0x187/0x2a0
[82375.558827]  rss_prepare_data+0x3a/0x50
[82375.558845]  ethnl_default_doit+0x13d/0x3e0
[82375.558863]  genl_family_rcv_msg_doit+0x11f/0x180
[82375.558886]  genl_rcv_msg+0x1ad/0x2b0
[82375.558902]  ? __pfx_ethnl_default_doit+0x10/0x10
[82375.558920]  ? __pfx_genl_rcv_msg+0x10/0x10
[82375.558937]  netlink_rcv_skb+0x58/0x100
[82375.558957]  genl_rcv+0x2c/0x50
[82375.558971]  netlink_unicast+0x289/0x3e0
[82375.558988]  netlink_sendmsg+0x215/0x440
[82375.559005]  __sys_sendto+0x234/0x240
[82375.559555]  __x64_sys_sendto+0x28/0x30
[82375.560068]  x64_sys_call+0x1909/0x1da0
[82375.560576]  do_syscall_64+0x7a/0xfa0
[82375.561076]  ? clear_bhb_loop+0x60/0xb0
[82375.561567]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
&lt;snip&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22993/">CVE-2026-22993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22993">CVE-2026-22993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257180">SUSE bug 1257180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22996</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22996" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22996" ref_url="https://www.suse.com/security/cve/CVE-2026-22996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv

mlx5e_priv is an unstable structure that can be memset(0) if profile
attaching fails, mlx5e_priv in mlx5e_dev devlink private is used to
reference the netdev and mdev associated with that struct. Instead,
store netdev directly into mlx5e_dev and get mdev from the containing
mlx5_adev aux device structure.

This fixes a kernel oops in mlx5e_remove when switchdev mode fails due
to change profile failure.

$ devlink dev eswitch set pci/0000:00:03.0 mode switchdev
Error: mlx5_core: Failed setting eswitch to offloads.
dmesg:
workqueue: Failed to create a rescuer kthread for wq "mlx5e": -EINTR
mlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12
mlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: new profile init failed, -12
workqueue: Failed to create a rescuer kthread for wq "mlx5e": -EINTR
mlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12
mlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12

$ devlink dev reload pci/0000:00:03.0 ==&gt; oops

BUG: kernel NULL pointer dereference, address: 0000000000000520
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
Oops: Oops: 0000 [#1] SMP NOPTI
CPU: 3 UID: 0 PID: 521 Comm: devlink Not tainted 6.18.0-rc5+ #117 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014
RIP: 0010:mlx5e_remove+0x68/0x130
RSP: 0018:ffffc900034838f0 EFLAGS: 00010246
RAX: ffff88810283c380 RBX: ffff888101874400 RCX: ffffffff826ffc45
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffff888102d789c0 R08: ffff8881007137f0 R09: ffff888100264e10
R10: ffffc90003483898 R11: ffffc900034838a0 R12: ffff888100d261a0
R13: ffff888100d261a0 R14: ffff8881018749a0 R15: ffff888101874400
FS:  00007f8565fea740(0000) GS:ffff88856a759000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000520 CR3: 000000010b11a004 CR4: 0000000000370ef0
Call Trace:
 &lt;TASK&gt;
 device_release_driver_internal+0x19c/0x200
 bus_remove_device+0xc6/0x130
 device_del+0x160/0x3d0
 ? devl_param_driverinit_value_get+0x2d/0x90
 mlx5_detach_device+0x89/0xe0
 mlx5_unload_one_devl_locked+0x3a/0x70
 mlx5_devlink_reload_down+0xc8/0x220
 devlink_reload+0x7d/0x260
 devlink_nl_reload_doit+0x45b/0x5a0
 genl_family_rcv_msg_doit+0xe8/0x140
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22996/">CVE-2026-22996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22996">CVE-2026-22996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257203">SUSE bug 1257203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22997</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22997" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22997" ref_url="https://www.suse.com/security/cve/CVE-2026-22997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon receiving the second rts

Since j1939_session_deactivate_activate_next() in j1939_tp_rxtimer() is
called only when the timer is enabled, we need to call
j1939_session_deactivate_activate_next() if we cancelled the timer.
Otherwise, refcount for j1939_session leaks, which will later appear as

| unregister_netdevice: waiting for vcan0 to become free. Usage count = 2.

problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22997/">CVE-2026-22997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22997">CVE-2026-22997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257202">SUSE bug 1257202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22998</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22998" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22998" ref_url="https://www.suse.com/security/cve/CVE-2026-22998" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec

Commit efa56305908b ("nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length")
added ttag bounds checking and data_offset
validation in nvmet_tcp_handle_h2c_data_pdu(), but it did not validate
whether the command's data structures (cmd-&gt;req.sg and cmd-&gt;iov) have
been properly initialized before processing H2C_DATA PDUs.

The nvmet_tcp_build_pdu_iovec() function dereferences these pointers
without NULL checks. This can be triggered by sending H2C_DATA PDU
immediately after the ICREQ/ICRESP handshake, before
sending a CONNECT command or NVMe write command.

Attack vectors that trigger NULL pointer dereferences:
1. H2C_DATA PDU sent before CONNECT -&gt; both pointers NULL
2. H2C_DATA PDU for READ command -&gt; cmd-&gt;req.sg allocated, cmd-&gt;iov NULL
3. H2C_DATA PDU for uninitialized command slot -&gt; both pointers NULL

The fix validates both cmd-&gt;req.sg and cmd-&gt;iov before calling
nvmet_tcp_build_pdu_iovec(). Both checks are required because:
- Uninitialized commands: both NULL
- READ commands: cmd-&gt;req.sg allocated, cmd-&gt;iov NULL
- WRITE commands: both allocated
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22998/">CVE-2026-22998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22998">CVE-2026-22998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257209">SUSE bug 1257209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22999</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22999" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22999" ref_url="https://www.suse.com/security/cve/CVE-2026-22999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1263-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1279-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1284-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1285-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1287-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1288-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21006-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21071-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_qfq: do not free existing class in qfq_change_class()

Fixes qfq_change_class() error case.

cl-&gt;qdisc and cl should only be freed if a new class and qdisc
were allocated, or we risk various UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22999/">CVE-2026-22999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22999">CVE-2026-22999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257236">SUSE bug 1257236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257238">SUSE bug 1257238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056309" comment="kernel-livepatch-6_12_0-160000_5-rt-7-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056310" comment="kernel-livepatch-6_12_0-160000_6-rt-6-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056311" comment="kernel-livepatch-6_12_0-160000_7-rt-4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056308" comment="kernel-livepatch-6_12_0-160000_8-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056330" comment="kernel-livepatch-6_12_0-160000_9-default-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056307" comment="kernel-livepatch-6_12_0-160000_9-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23000</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23000" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23000" ref_url="https://www.suse.com/security/cve/CVE-2026-23000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix crash on profile change rollback failure

mlx5e_netdev_change_profile can fail to attach a new profile and can
fail to rollback to old profile, in such case, we could end up with a
dangling netdev with a fully reset netdev_priv. A retry to change
profile, e.g. another attempt to call mlx5e_netdev_change_profile via
switchdev mode change, will crash trying to access the now NULL
priv-&gt;mdev.

This fix allows mlx5e_netdev_change_profile() to handle previous
failures and an empty priv, by not assuming priv is valid.

Pass netdev and mdev to all flows requiring
mlx5e_netdev_change_profile() and avoid passing priv.
In mlx5e_netdev_change_profile() check if current priv is valid, and if
not, just attach the new profile without trying to access the old one.

This fixes the following oops, when enabling switchdev mode for the 2nd
time after first time failure:

 ## Enabling switchdev mode first time:

mlx5_core 0012:03:00.1: E-Switch: Supported tc chains and prios offload
workqueue: Failed to create a rescuer kthread for wq "mlx5e": -EINTR
mlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12
mlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: new profile init failed, -12
workqueue: Failed to create a rescuer kthread for wq "mlx5e": -EINTR
mlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12
mlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12
                                                                         ^^^^^^^^
mlx5_core 0000:00:03.0: E-Switch: Disable: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)

 ## retry: Enabling switchdev mode 2nd time:

mlx5_core 0000:00:03.0: E-Switch: Supported tc chains and prios offload
BUG: kernel NULL pointer dereference, address: 0000000000000038
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
Oops: Oops: 0000 [#1] SMP NOPTI
CPU: 13 UID: 0 PID: 520 Comm: devlink Not tainted 6.18.0-rc4+ #91 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014
RIP: 0010:mlx5e_detach_netdev+0x3c/0x90
Code: 50 00 00 f0 80 4f 78 02 48 8b bf e8 07 00 00 48 85 ff 74 16 48 8b 73 78 48 d1 ee 83 e6 01 83 f6 01 40 0f b6 f6 e8 c4 42 00 00 &lt;48&gt; 8b 45 38 48 85 c0 74 08 48 89 df e8 cc 47 40 1e 48 8b bb f0 07
RSP: 0018:ffffc90000673890 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff8881036a89c0 RCX: 0000000000000000
RDX: ffff888113f63800 RSI: ffffffff822fe720 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000002dcd R09: 0000000000000000
R10: ffffc900006738e8 R11: 00000000ffffffff R12: 0000000000000000
R13: 0000000000000000 R14: ffff8881036a89c0 R15: 0000000000000000
FS:  00007fdfb8384740(0000) GS:ffff88856a9d6000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000038 CR3: 0000000112ae0005 CR4: 0000000000370ef0
Call Trace:
 &lt;TASK&gt;
 mlx5e_netdev_change_profile+0x45/0xb0
 mlx5e_vport_rep_load+0x27b/0x2d0
 mlx5_esw_offloads_rep_load+0x72/0xf0
 esw_offloads_enable+0x5d0/0x970
 mlx5_eswitch_enable_locked+0x349/0x430
 ? is_mp_supported+0x57/0xb0
 mlx5_devlink_eswitch_mode_set+0x26b/0x430
 devlink_nl_eswitch_set_doit+0x6f/0xf0
 genl_family_rcv_msg_doit+0xe8/0x140
 genl_rcv_msg+0x18b/0x290
 ? __pfx_devlink_nl_pre_doit+0x10/0x10
 ? __pfx_devlink_nl_eswitch_set_doit+0x10/0x10
 ? __pfx_devlink_nl_post_doit+0x10/0x10
 ? __pfx_genl_rcv_msg+0x10/0x10
 netlink_rcv_skb+0x52/0x100
 genl_rcv+0x28/0x40
 netlink_unicast+0x282/0x3e0
 ? __alloc_skb+0xd6/0x190
 netlink_sendmsg+0x1f7/0x430
 __sys_sendto+0x213/0x220
 ? __sys_recvmsg+0x6a/0xd0
 __x64_sys_sendto+0x24/0x30
 do_syscall_64+0x50/0x1f0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7fdfb8495047
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23000/">CVE-2026-23000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23000">CVE-2026-23000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257234">SUSE bug 1257234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23001</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23001" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23001" ref_url="https://www.suse.com/security/cve/CVE-2026-23001" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3963" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002557.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

macvlan: fix possible UAF in macvlan_forward_source()

Add RCU protection on (struct macvlan_source_entry)-&gt;vlan.

Whenever macvlan_hash_del_source() is called, we must clear
entry-&gt;vlan pointer before RCU grace period starts.

This allows macvlan_forward_source() to skip over
entries queued for freeing.

Note that macvlan_dev are already RCU protected, as they
are embedded in a standard netdev (netdev_priv(ndev)).

https: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23001/">CVE-2026-23001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23001">CVE-2026-23001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257232">SUSE bug 1257232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257233">SUSE bug 1257233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23002</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23002" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23002" ref_url="https://www.suse.com/security/cve/CVE-2026-23002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib/buildid: use __kernel_read() for sleepable context

Prevent a "BUG: unable to handle kernel NULL pointer dereference in
filemap_read_folio".

For the sleepable context, convert freader to use __kernel_read() instead
of direct page cache access via read_cache_folio().  This simplifies the
faultable code path by using the standard kernel file reading interface
which handles all the complexity of reading file data.

At the moment we are not changing the code for non-sleepable context which
uses filemap_get_folio() and only succeeds if the target folios are
already in memory and up-to-date.  The reason is to keep the patch simple
and easier to backport to stable kernels.

Syzbot repro does not crash the kernel anymore and the selftests run
successfully.

In the follow up we will make __kernel_read() with IOCB_NOWAIT work for
non-sleepable contexts.  In addition, I would like to replace the
secretmem check with a more generic approach and will add fstest for the
buildid code.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23002/">CVE-2026-23002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23002">CVE-2026-23002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257243">SUSE bug 1257243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23003</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23003" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23003" ref_url="https://www.suse.com/security/cve/CVE-2026-23003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv()

Blamed commit did not take care of VLAN encapsulations
as spotted by syzbot [1].

Use skb_vlan_inet_prepare() instead of pskb_inet_may_pull().

[1]
 BUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]
 BUG: KMSAN: uninit-value in INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]
 BUG: KMSAN: uninit-value in IP6_ECN_decapsulate+0x7a8/0x1fa0 include/net/inet_ecn.h:321
  __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]
  INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]
  IP6_ECN_decapsulate+0x7a8/0x1fa0 include/net/inet_ecn.h:321
  ip6ip6_dscp_ecn_decapsulate+0x16f/0x1b0 net/ipv6/ip6_tunnel.c:729
  __ip6_tnl_rcv+0xed9/0x1b50 net/ipv6/ip6_tunnel.c:860
  ip6_tnl_rcv+0xc3/0x100 net/ipv6/ip6_tunnel.c:903
 gre_rcv+0x1529/0x1b90 net/ipv6/ip6_gre.c:-1
  ip6_protocol_deliver_rcu+0x1c89/0x2c60 net/ipv6/ip6_input.c:438
  ip6_input_finish+0x1f4/0x4a0 net/ipv6/ip6_input.c:489
  NF_HOOK include/linux/netfilter.h:318 [inline]
  ip6_input+0x9c/0x330 net/ipv6/ip6_input.c:500
  ip6_mc_input+0x7ca/0xc10 net/ipv6/ip6_input.c:590
  dst_input include/net/dst.h:474 [inline]
  ip6_rcv_finish+0x958/0x990 net/ipv6/ip6_input.c:79
  NF_HOOK include/linux/netfilter.h:318 [inline]
  ipv6_rcv+0xf1/0x3c0 net/ipv6/ip6_input.c:311
  __netif_receive_skb_one_core net/core/dev.c:6139 [inline]
  __netif_receive_skb+0x1df/0xac0 net/core/dev.c:6252
  netif_receive_skb_internal net/core/dev.c:6338 [inline]
  netif_receive_skb+0x57/0x630 net/core/dev.c:6397
  tun_rx_batched+0x1df/0x980 drivers/net/tun.c:1485
  tun_get_user+0x5c0e/0x6c60 drivers/net/tun.c:1953
  tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1999
  new_sync_write fs/read_write.c:593 [inline]
  vfs_write+0xbe2/0x15d0 fs/read_write.c:686
  ksys_write fs/read_write.c:738 [inline]
  __do_sys_write fs/read_write.c:749 [inline]
  __se_sys_write fs/read_write.c:746 [inline]
  __x64_sys_write+0x1fb/0x4d0 fs/read_write.c:746
  x64_sys_call+0x30ab/0x3e70 arch/x86/include/generated/asm/syscalls_64.h:2
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xd3/0xf80 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:4960 [inline]
  slab_alloc_node mm/slub.c:5263 [inline]
  kmem_cache_alloc_node_noprof+0x9e7/0x17a0 mm/slub.c:5315
  kmalloc_reserve+0x13c/0x4b0 net/core/skbuff.c:586
  __alloc_skb+0x805/0x1040 net/core/skbuff.c:690
  alloc_skb include/linux/skbuff.h:1383 [inline]
  alloc_skb_with_frags+0xc5/0xa60 net/core/skbuff.c:6712
  sock_alloc_send_pskb+0xacc/0xc60 net/core/sock.c:2995
  tun_alloc_skb drivers/net/tun.c:1461 [inline]
  tun_get_user+0x1142/0x6c60 drivers/net/tun.c:1794
  tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1999
  new_sync_write fs/read_write.c:593 [inline]
  vfs_write+0xbe2/0x15d0 fs/read_write.c:686
  ksys_write fs/read_write.c:738 [inline]
  __do_sys_write fs/read_write.c:749 [inline]
  __se_sys_write fs/read_write.c:746 [inline]
  __x64_sys_write+0x1fb/0x4d0 fs/read_write.c:746
  x64_sys_call+0x30ab/0x3e70 arch/x86/include/generated/asm/syscalls_64.h:2
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xd3/0xf80 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

CPU: 0 UID: 0 PID: 6465 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(none)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23003/">CVE-2026-23003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23003">CVE-2026-23003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257246">SUSE bug 1257246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23004</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23004" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23004" ref_url="https://www.suse.com/security/cve/CVE-2026-23004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list()

syzbot was able to crash the kernel in rt6_uncached_list_flush_dev()
in an interesting way [1]

Crash happens in list_del_init()/INIT_LIST_HEAD() while writing
list-&gt;prev, while the prior write on list-&gt;next went well.

static inline void INIT_LIST_HEAD(struct list_head *list)
{
	WRITE_ONCE(list-&gt;next, list); // This went well
	WRITE_ONCE(list-&gt;prev, list); // Crash, @list has been freed.
}

Issue here is that rt6_uncached_list_del() did not attempt to lock
ul-&gt;lock, as list_empty(&amp;rt-&gt;dst.rt_uncached) returned
true because the WRITE_ONCE(list-&gt;next, list) happened on the other CPU.

We might use list_del_init_careful() and list_empty_careful(),
or make sure rt6_uncached_list_del() always grabs the spinlock
whenever rt-&gt;dst.rt_uncached_list has been set.

A similar fix is neeed for IPv4.

[1]

 BUG: KASAN: slab-use-after-free in INIT_LIST_HEAD include/linux/list.h:46 [inline]
 BUG: KASAN: slab-use-after-free in list_del_init include/linux/list.h:296 [inline]
 BUG: KASAN: slab-use-after-free in rt6_uncached_list_flush_dev net/ipv6/route.c:191 [inline]
 BUG: KASAN: slab-use-after-free in rt6_disable_ip+0x633/0x730 net/ipv6/route.c:5020
Write of size 8 at addr ffff8880294cfa78 by task kworker/u8:14/3450

CPU: 0 UID: 0 PID: 3450 Comm: kworker/u8:14 Tainted: G             L      syzkaller #0 PREEMPT_{RT,(full)}
Tainted: [L]=SOFTLOCKUP
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
Workqueue: netns cleanup_net
Call Trace:
 &lt;TASK&gt;
  dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120
  print_address_description mm/kasan/report.c:378 [inline]
  print_report+0xca/0x240 mm/kasan/report.c:482
  kasan_report+0x118/0x150 mm/kasan/report.c:595
  INIT_LIST_HEAD include/linux/list.h:46 [inline]
  list_del_init include/linux/list.h:296 [inline]
  rt6_uncached_list_flush_dev net/ipv6/route.c:191 [inline]
  rt6_disable_ip+0x633/0x730 net/ipv6/route.c:5020
  addrconf_ifdown+0x143/0x18a0 net/ipv6/addrconf.c:3853
 addrconf_notify+0x1bc/0x1050 net/ipv6/addrconf.c:-1
  notifier_call_chain+0x19d/0x3a0 kernel/notifier.c:85
  call_netdevice_notifiers_extack net/core/dev.c:2268 [inline]
  call_netdevice_notifiers net/core/dev.c:2282 [inline]
  netif_close_many+0x29c/0x410 net/core/dev.c:1785
  unregister_netdevice_many_notify+0xb50/0x2330 net/core/dev.c:12353
  ops_exit_rtnl_list net/core/net_namespace.c:187 [inline]
  ops_undo_list+0x3dc/0x990 net/core/net_namespace.c:248
  cleanup_net+0x4de/0x7b0 net/core/net_namespace.c:696
  process_one_work kernel/workqueue.c:3257 [inline]
  process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340
  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421
  kthread+0x711/0x8a0 kernel/kthread.c:463
  ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246
 &lt;/TASK&gt;

Allocated by task 803:
  kasan_save_stack mm/kasan/common.c:57 [inline]
  kasan_save_track+0x3e/0x80 mm/kasan/common.c:78
  unpoison_slab_object mm/kasan/common.c:340 [inline]
  __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:366
  kasan_slab_alloc include/linux/kasan.h:253 [inline]
  slab_post_alloc_hook mm/slub.c:4953 [inline]
  slab_alloc_node mm/slub.c:5263 [inline]
  kmem_cache_alloc_noprof+0x18d/0x6c0 mm/slub.c:5270
  dst_alloc+0x105/0x170 net/core/dst.c:89
  ip6_dst_alloc net/ipv6/route.c:342 [inline]
  icmp6_dst_alloc+0x75/0x460 net/ipv6/route.c:3333
  mld_sendpack+0x683/0xe60 net/ipv6/mcast.c:1844
  mld_send_cr net/ipv6/mcast.c:2154 [inline]
  mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693
  process_one_work kernel/workqueue.c:3257 [inline]
  process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340
  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421
  kthread+0x711/0x8a0 kernel/kthread.c:463
  ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entr
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23004/">CVE-2026-23004 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23004">CVE-2026-23004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257231">SUSE bug 1257231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258655">SUSE bug 1258655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23005</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23005" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23005" ref_url="https://www.suse.com/security/cve/CVE-2026-23005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/fpu: Clear XSTATE_BV[i] in guest XSAVE state whenever XFD[i]=1

When loading guest XSAVE state via KVM_SET_XSAVE, and when updating XFD in
response to a guest WRMSR, clear XFD-disabled features in the saved (or to
be restored) XSTATE_BV to ensure KVM doesn't attempt to load state for
features that are disabled via the guest's XFD.  Because the kernel
executes XRSTOR with the guest's XFD, saving XSTATE_BV[i]=1 with XFD[i]=1
will cause XRSTOR to #NM and panic the kernel.

E.g. if fpu_update_guest_xfd() sets XFD without clearing XSTATE_BV:

  ------------[ cut here ]------------
  WARNING: arch/x86/kernel/traps.c:1524 at exc_device_not_available+0x101/0x110, CPU#29: amx_test/848
  Modules linked in: kvm_intel kvm irqbypass
  CPU: 29 UID: 1000 PID: 848 Comm: amx_test Not tainted 6.19.0-rc2-ffa07f7fd437-x86_amx_nm_xfd_non_init-vm #171 NONE
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  RIP: 0010:exc_device_not_available+0x101/0x110
  Call Trace:
   &lt;TASK&gt;
   asm_exc_device_not_available+0x1a/0x20
  RIP: 0010:restore_fpregs_from_fpstate+0x36/0x90
   switch_fpu_return+0x4a/0xb0
   kvm_arch_vcpu_ioctl_run+0x1245/0x1e40 [kvm]
   kvm_vcpu_ioctl+0x2c3/0x8f0 [kvm]
   __x64_sys_ioctl+0x8f/0xd0
   do_syscall_64+0x62/0x940
   entry_SYSCALL_64_after_hwframe+0x4b/0x53
   &lt;/TASK&gt;
  ---[ end trace 0000000000000000 ]---

This can happen if the guest executes WRMSR(MSR_IA32_XFD) to set XFD[18] = 1,
and a host IRQ triggers kernel_fpu_begin() prior to the vmexit handler's
call to fpu_update_guest_xfd().

and if userspace stuffs XSTATE_BV[i]=1 via KVM_SET_XSAVE:

  ------------[ cut here ]------------
  WARNING: arch/x86/kernel/traps.c:1524 at exc_device_not_available+0x101/0x110, CPU#14: amx_test/867
  Modules linked in: kvm_intel kvm irqbypass
  CPU: 14 UID: 1000 PID: 867 Comm: amx_test Not tainted 6.19.0-rc2-2dace9faccd6-x86_amx_nm_xfd_non_init-vm #168 NONE
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  RIP: 0010:exc_device_not_available+0x101/0x110
  Call Trace:
   &lt;TASK&gt;
   asm_exc_device_not_available+0x1a/0x20
  RIP: 0010:restore_fpregs_from_fpstate+0x36/0x90
   fpu_swap_kvm_fpstate+0x6b/0x120
   kvm_load_guest_fpu+0x30/0x80 [kvm]
   kvm_arch_vcpu_ioctl_run+0x85/0x1e40 [kvm]
   kvm_vcpu_ioctl+0x2c3/0x8f0 [kvm]
   __x64_sys_ioctl+0x8f/0xd0
   do_syscall_64+0x62/0x940
   entry_SYSCALL_64_after_hwframe+0x4b/0x53
   &lt;/TASK&gt;
  ---[ end trace 0000000000000000 ]---

The new behavior is consistent with the AMX architecture.  Per Intel's SDM,
XSAVE saves XSTATE_BV as '0' for components that are disabled via XFD
(and non-compacted XSAVE saves the initial configuration of the state
component):

  If XSAVE, XSAVEC, XSAVEOPT, or XSAVES is saving the state component i,
  the instruction does not generate #NM when XCR0[i] = IA32_XFD[i] = 1;
  instead, it operates as if XINUSE[i] = 0 (and the state component was
  in its initial state): it saves bit i of XSTATE_BV field of the XSAVE
  header as 0; in addition, XSAVE saves the initial configuration of the
  state component (the other instructions do not save state component i).

Alternatively, KVM could always do XRSTOR with XFD=0, e.g. by using
a constant XFD based on the set of enabled features when XSAVEing for
a struct fpu_guest.  However, having XSTATE_BV[i]=1 for XFD-disabled
features can only happen in the above interrupt case, or in similar
scenarios involving preemption on preemptible kernels, because
fpu_swap_kvm_fpstate()'s call to save_fpregs_to_fpstate() saves the
outgoing FPU state with the current XFD; and that is (on all but the
first WRMSR to XFD) the guest XFD.

Therefore, XFD can only go out of sync with XSTATE_BV in the above
interrupt case, or in similar scenarios involving preemption on
preemptible kernels, and it we can consider it (de facto) part of KVM
ABI that KVM_GET_XSAVE returns XSTATE_BV[i]=0 for XFD-disabled features.

[Move clea
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23005/">CVE-2026-23005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23005">CVE-2026-23005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257245">SUSE bug 1257245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23006</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23006" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23006" ref_url="https://www.suse.com/security/cve/CVE-2026-23006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: tlv320adcx140: fix null pointer

The "snd_soc_component" in "adcx140_priv" was only used once but never
set. It was only used for reaching "dev" which is already present in
"adcx140_priv".
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23006/">CVE-2026-23006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23006">CVE-2026-23006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257208">SUSE bug 1257208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23010</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23010" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23010" ref_url="https://www.suse.com/security/cve/CVE-2026-23010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: Fix use-after-free in inet6_addr_del().

syzbot reported use-after-free of inet6_ifaddr in
inet6_addr_del(). [0]

The cited commit accidentally moved ipv6_del_addr() for
mngtmpaddr before reading its ifp-&gt;flags for temporary
addresses in inet6_addr_del().

Let's move ipv6_del_addr() down to fix the UAF.

[0]:
BUG: KASAN: slab-use-after-free in inet6_addr_del.constprop.0+0x67a/0x6b0 net/ipv6/addrconf.c:3117
Read of size 4 at addr ffff88807b89c86c by task syz.3.1618/9593

CPU: 0 UID: 0 PID: 9593 Comm: syz.3.1618 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xcd/0x630 mm/kasan/report.c:482
 kasan_report+0xe0/0x110 mm/kasan/report.c:595
 inet6_addr_del.constprop.0+0x67a/0x6b0 net/ipv6/addrconf.c:3117
 addrconf_del_ifaddr+0x11e/0x190 net/ipv6/addrconf.c:3181
 inet6_ioctl+0x1e5/0x2b0 net/ipv6/af_inet6.c:582
 sock_do_ioctl+0x118/0x280 net/socket.c:1254
 sock_ioctl+0x227/0x6b0 net/socket.c:1375
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:597 [inline]
 __se_sys_ioctl fs/ioctl.c:583 [inline]
 __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:583
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f164cf8f749
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f164de64038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f164d1e5fa0 RCX: 00007f164cf8f749
RDX: 0000200000000000 RSI: 0000000000008936 RDI: 0000000000000003
RBP: 00007f164d013f91 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f164d1e6038 R14: 00007f164d1e5fa0 R15: 00007ffde15c8288
 &lt;/TASK&gt;

Allocated by task 9593:
 kasan_save_stack+0x33/0x60 mm/kasan/common.c:56
 kasan_save_track+0x14/0x30 mm/kasan/common.c:77
 poison_kmalloc_redzone mm/kasan/common.c:397 [inline]
 __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:414
 kmalloc_noprof include/linux/slab.h:957 [inline]
 kzalloc_noprof include/linux/slab.h:1094 [inline]
 ipv6_add_addr+0x4e3/0x2010 net/ipv6/addrconf.c:1120
 inet6_addr_add+0x256/0x9b0 net/ipv6/addrconf.c:3050
 addrconf_add_ifaddr+0x1fc/0x450 net/ipv6/addrconf.c:3160
 inet6_ioctl+0x103/0x2b0 net/ipv6/af_inet6.c:580
 sock_do_ioctl+0x118/0x280 net/socket.c:1254
 sock_ioctl+0x227/0x6b0 net/socket.c:1375
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:597 [inline]
 __se_sys_ioctl fs/ioctl.c:583 [inline]
 __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:583
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 6099:
 kasan_save_stack+0x33/0x60 mm/kasan/common.c:56
 kasan_save_track+0x14/0x30 mm/kasan/common.c:77
 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:584
 poison_slab_object mm/kasan/common.c:252 [inline]
 __kasan_slab_free+0x5f/0x80 mm/kasan/common.c:284
 kasan_slab_free include/linux/kasan.h:234 [inline]
 slab_free_hook mm/slub.c:2540 [inline]
 slab_free_freelist_hook mm/slub.c:2569 [inline]
 slab_free_bulk mm/slub.c:6696 [inline]
 kmem_cache_free_bulk mm/slub.c:7383 [inline]
 kmem_cache_free_bulk+0x2bf/0x680 mm/slub.c:7362
 kfree_bulk include/linux/slab.h:830 [inline]
 kvfree_rcu_bulk+0x1b7/0x1e0 mm/slab_common.c:1523
 kvfree_rcu_drain_ready mm/slab_common.c:1728 [inline]
 kfree_rcu_monitor+0x1d0/0x2f0 mm/slab_common.c:1801
 process_one_work+0x9ba/0x1b20 kernel/workqueue.c:3257
 process_scheduled_works kernel/workqu
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23010/">CVE-2026-23010 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23010">CVE-2026-23010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257332">SUSE bug 1257332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23011</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23011" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23011" ref_url="https://www.suse.com/security/cve/CVE-2026-23011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: ip_gre: make ipgre_header() robust

Analog to commit db5b4e39c4e6 ("ip6_gre: make ip6gre_header() robust")

Over the years, syzbot found many ways to crash the kernel
in ipgre_header() [1].

This involves team or bonding drivers ability to dynamically
change their dev-&gt;needed_headroom and/or dev-&gt;hard_header_len

In this particular crash mld_newpack() allocated an skb
with a too small reserve/headroom, and by the time mld_sendpack()
was called, syzbot managed to attach an ipgre device.

[1]
skbuff: skb_under_panic: text:ffffffff89ea3cb7 len:2030915468 put:2030915372 head:ffff888058b43000 data:ffff887fdfa6e194 tail:0x120 end:0x6c0 dev:team0
 kernel BUG at net/core/skbuff.c:213 !
Oops: invalid opcode: 0000 [#1] SMP KASAN PTI
CPU: 1 UID: 0 PID: 1322 Comm: kworker/1:9 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
Workqueue: mld mld_ifc_work
 RIP: 0010:skb_panic+0x157/0x160 net/core/skbuff.c:213
Call Trace:
 &lt;TASK&gt;
  skb_under_panic net/core/skbuff.c:223 [inline]
  skb_push+0xc3/0xe0 net/core/skbuff.c:2641
  ipgre_header+0x67/0x290 net/ipv4/ip_gre.c:897
  dev_hard_header include/linux/netdevice.h:3436 [inline]
  neigh_connected_output+0x286/0x460 net/core/neighbour.c:1618
  NF_HOOK_COND include/linux/netfilter.h:307 [inline]
  ip6_output+0x340/0x550 net/ipv6/ip6_output.c:247
  NF_HOOK+0x9e/0x380 include/linux/netfilter.h:318
  mld_sendpack+0x8d4/0xe60 net/ipv6/mcast.c:1855
  mld_send_cr net/ipv6/mcast.c:2154 [inline]
  mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693
  process_one_work kernel/workqueue.c:3257 [inline]
  process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340
  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421
  kthread+0x711/0x8a0 kernel/kthread.c:463
  ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23011/">CVE-2026-23011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23011">CVE-2026-23011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257207">SUSE bug 1257207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047381" comment="kernel-default-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047432" comment="kernel-rt-livepatch-6.12.0-160000.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23017</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23017" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23017" ref_url="https://www.suse.com/security/cve/CVE-2026-23017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix error handling in the init_task on load

If the init_task fails during a driver load, we end up without vports and
netdevs, effectively failing the entire process. In that state a
subsequent reset will result in a crash as the service task attempts to
access uninitialized resources. Following trace is from an error in the
init_task where the CREATE_VPORT (op 501) is rejected by the FW:

[40922.763136] idpf 0000:83:00.0: Device HW Reset initiated
[40924.449797] idpf 0000:83:00.0: Transaction failed (op 501)
[40958.148190] idpf 0000:83:00.0: HW reset detected
[40958.161202] BUG: kernel NULL pointer dereference, address: 00000000000000a8
...
[40958.168094] Workqueue: idpf-0000:83:00.0-vc_event idpf_vc_event_task [idpf]
[40958.168865] RIP: 0010:idpf_vc_event_task+0x9b/0x350 [idpf]
...
[40958.177932] Call Trace:
[40958.178491]  &lt;TASK&gt;
[40958.179040]  process_one_work+0x226/0x6d0
[40958.179609]  worker_thread+0x19e/0x340
[40958.180158]  ? __pfx_worker_thread+0x10/0x10
[40958.180702]  kthread+0x10f/0x250
[40958.181238]  ? __pfx_kthread+0x10/0x10
[40958.181774]  ret_from_fork+0x251/0x2b0
[40958.182307]  ? __pfx_kthread+0x10/0x10
[40958.182834]  ret_from_fork_asm+0x1a/0x30
[40958.183370]  &lt;/TASK&gt;

Fix the error handling in the init_task to make sure the service and
mailbox tasks are disabled if the error happens during load. These are
started in idpf_vc_core_init(), which spawns the init_task and has no way
of knowing if it failed. If the error happens on reset, following
successful driver load, the tasks can still run, as that will allow the
netdevs to attempt recovery through another reset. Stop the PTP callbacks
either way as those will be restarted by the call to idpf_vc_core_init()
during a successful reset.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23017/">CVE-2026-23017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23017">CVE-2026-23017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257552">SUSE bug 1257552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23018</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23018" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23018" ref_url="https://www.suse.com/security/cve/CVE-2026-23018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: release path before initializing extent tree in btrfs_read_locked_inode()

In btrfs_read_locked_inode() we are calling btrfs_init_file_extent_tree()
while holding a path with a read locked leaf from a subvolume tree, and
btrfs_init_file_extent_tree() may do a GFP_KERNEL allocation, which can
trigger reclaim.

This can create a circular lock dependency which lockdep warns about with
the following splat:

   [6.1433] ======================================================
   [6.1574] WARNING: possible circular locking dependency detected
   [6.1583] 6.18.0+ #4 Tainted: G     U
   [6.1591] ------------------------------------------------------
   [6.1599] kswapd0/117 is trying to acquire lock:
   [6.1606] ffff8d9b6333c5b8 (&amp;delayed_node-&gt;mutex){+.+.}-{3:3}, at: __btrfs_release_delayed_node.part.0+0x39/0x2f0
   [6.1625]
            but task is already holding lock:
   [6.1633] ffffffffa4ab8ce0 (fs_reclaim){+.+.}-{0:0}, at: balance_pgdat+0x195/0xc60
   [6.1646]
            which lock already depends on the new lock.

   [6.1657]
            the existing dependency chain (in reverse order) is:
   [6.1667]
            -&gt; #2 (fs_reclaim){+.+.}-{0:0}:
   [6.1677]        fs_reclaim_acquire+0x9d/0xd0
   [6.1685]        __kmalloc_cache_noprof+0x59/0x750
   [6.1694]        btrfs_init_file_extent_tree+0x90/0x100
   [6.1702]        btrfs_read_locked_inode+0xc3/0x6b0
   [6.1710]        btrfs_iget+0xbb/0xf0
   [6.1716]        btrfs_lookup_dentry+0x3c5/0x8e0
   [6.1724]        btrfs_lookup+0x12/0x30
   [6.1731]        lookup_open.isra.0+0x1aa/0x6a0
   [6.1739]        path_openat+0x5f7/0xc60
   [6.1746]        do_filp_open+0xd6/0x180
   [6.1753]        do_sys_openat2+0x8b/0xe0
   [6.1760]        __x64_sys_openat+0x54/0xa0
   [6.1768]        do_syscall_64+0x97/0x3e0
   [6.1776]        entry_SYSCALL_64_after_hwframe+0x76/0x7e
   [6.1784]
            -&gt; #1 (btrfs-tree-00){++++}-{3:3}:
   [6.1794]        lock_release+0x127/0x2a0
   [6.1801]        up_read+0x1b/0x30
   [6.1808]        btrfs_search_slot+0x8e0/0xff0
   [6.1817]        btrfs_lookup_inode+0x52/0xd0
   [6.1825]        __btrfs_update_delayed_inode+0x73/0x520
   [6.1833]        btrfs_commit_inode_delayed_inode+0x11a/0x120
   [6.1842]        btrfs_log_inode+0x608/0x1aa0
   [6.1849]        btrfs_log_inode_parent+0x249/0xf80
   [6.1857]        btrfs_log_dentry_safe+0x3e/0x60
   [6.1865]        btrfs_sync_file+0x431/0x690
   [6.1872]        do_fsync+0x39/0x80
   [6.1879]        __x64_sys_fsync+0x13/0x20
   [6.1887]        do_syscall_64+0x97/0x3e0
   [6.1894]        entry_SYSCALL_64_after_hwframe+0x76/0x7e
   [6.1903]
            -&gt; #0 (&amp;delayed_node-&gt;mutex){+.+.}-{3:3}:
   [6.1913]        __lock_acquire+0x15e9/0x2820
   [6.1920]        lock_acquire+0xc9/0x2d0
   [6.1927]        __mutex_lock+0xcc/0x10a0
   [6.1934]        __btrfs_release_delayed_node.part.0+0x39/0x2f0
   [6.1944]        btrfs_evict_inode+0x20b/0x4b0
   [6.1952]        evict+0x15a/0x2f0
   [6.1958]        prune_icache_sb+0x91/0xd0
   [6.1966]        super_cache_scan+0x150/0x1d0
   [6.1974]        do_shrink_slab+0x155/0x6f0
   [6.1981]        shrink_slab+0x48e/0x890
   [6.1988]        shrink_one+0x11a/0x1f0
   [6.1995]        shrink_node+0xbfd/0x1320
   [6.1002]        balance_pgdat+0x67f/0xc60
   [6.1321]        kswapd+0x1dc/0x3e0
   [6.1643]        kthread+0xff/0x240
   [6.1965]        ret_from_fork+0x223/0x280
   [6.1287]        ret_from_fork_asm+0x1a/0x30
   [6.1616]
            other info that might help us debug this:

   [6.1561] Chain exists of:
              &amp;delayed_node-&gt;mutex --&gt; btrfs-tree-00 --&gt; fs_reclaim

   [6.1503]  Possible unsafe locking scenario:

   [6.1110]        CPU0                    CPU1
   [6.1411]        ----                    ----
   [6.1707]   lock(fs_reclaim);
   [6.1998]                                lock(btrfs-tree-00);
   [6.1291]                                lock(fs_reclaim);
   [6.1581]   lock(&amp;del
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23018/">CVE-2026-23018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23018">CVE-2026-23018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257551">SUSE bug 1257551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23021</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23021" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23021" ref_url="https://www.suse.com/security/cve/CVE-2026-23021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: pegasus: fix memory leak in update_eth_regs_async()

When asynchronously writing to the device registers and if usb_submit_urb()
fail, the code fail to release allocated to this point resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23021/">CVE-2026-23021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23021">CVE-2026-23021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257557">SUSE bug 1257557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23022</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23022" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23022" ref_url="https://www.suse.com/security/cve/CVE-2026-23022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix memory leak in idpf_vc_core_deinit()

Make sure to free hw-&gt;lan_regs. Reported by kmemleak during reset:

unreferenced object 0xff1b913d02a936c0 (size 96):
  comm "kworker/u258:14", pid 2174, jiffies 4294958305
  hex dump (first 32 bytes):
    00 00 00 c0 a8 ba 2d ff 00 00 00 00 00 00 00 00  ......-.........
    00 00 40 08 00 00 00 00 00 00 25 b3 a8 ba 2d ff  ..@.......%...-.
  backtrace (crc 36063c4f):
    __kmalloc_noprof+0x48f/0x890
    idpf_vc_core_init+0x6ce/0x9b0 [idpf]
    idpf_vc_event_task+0x1fb/0x350 [idpf]
    process_one_work+0x226/0x6d0
    worker_thread+0x19e/0x340
    kthread+0x10f/0x250
    ret_from_fork+0x251/0x2b0
    ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23022/">CVE-2026-23022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23022">CVE-2026-23022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257581">SUSE bug 1257581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23023</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23023" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23023" ref_url="https://www.suse.com/security/cve/CVE-2026-23023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix memory leak in idpf_vport_rel()

Free vport-&gt;rx_ptype_lkup in idpf_vport_rel() to avoid leaking memory
during a reset. Reported by kmemleak:

unreferenced object 0xff450acac838a000 (size 4096):
  comm "kworker/u258:5", pid 7732, jiffies 4296830044
  hex dump (first 32 bytes):
    00 00 00 00 00 10 00 00 00 10 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00  ................
  backtrace (crc 3da81902):
    __kmalloc_cache_noprof+0x469/0x7a0
    idpf_send_get_rx_ptype_msg+0x90/0x570 [idpf]
    idpf_init_task+0x1ec/0x8d0 [idpf]
    process_one_work+0x226/0x6d0
    worker_thread+0x19e/0x340
    kthread+0x10f/0x250
    ret_from_fork+0x251/0x2b0
    ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23023/">CVE-2026-23023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23023">CVE-2026-23023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257556">SUSE bug 1257556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23024</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23024" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23024" ref_url="https://www.suse.com/security/cve/CVE-2026-23024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix memory leak of flow steer list on rmmod

The flow steering list maintains entries that are added and removed as
ethtool creates and deletes flow steering rules. Module removal with active
entries causes memory leak as the list is not properly cleaned up.

Prevent this by iterating through the remaining entries in the list and
freeing the associated memory during module removal. Add a spinlock
(flow_steer_list_lock) to protect the list access from multiple threads.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23024/">CVE-2026-23024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23024">CVE-2026-23024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257572">SUSE bug 1257572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23026</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23026" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23026" ref_url="https://www.suse.com/security/cve/CVE-2026-23026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config()

Fix a memory leak in gpi_peripheral_config() where the original memory
pointed to by gchan-&gt;config could be lost if krealloc() fails.

The issue occurs when:
1. gchan-&gt;config points to previously allocated memory
2. krealloc() fails and returns NULL
3. The function directly assigns NULL to gchan-&gt;config, losing the
   reference to the original memory
4. The original memory becomes unreachable and cannot be freed

Fix this by using a temporary variable to hold the krealloc() result
and only updating gchan-&gt;config when the allocation succeeds.

Found via static analysis and code review.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23026/">CVE-2026-23026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23026">CVE-2026-23026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257562">SUSE bug 1257562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23030</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23030" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23030" ref_url="https://www.suse.com/security/cve/CVE-2026-23030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: rockchip: inno-usb2: Fix a double free bug in rockchip_usb2phy_probe()

The for_each_available_child_of_node() calls of_node_put() to
release child_np in each success loop. After breaking from the
loop with the child_np has been released, the code will jump to
the put_child label and will call the of_node_put() again if the
devm_request_threaded_irq() fails. These cause a double free bug.

Fix by returning directly to avoid the duplicate of_node_put().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23030/">CVE-2026-23030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23030">CVE-2026-23030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257561">SUSE bug 1257561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23031</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23031" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23031" ref_url="https://www.suse.com/security/cve/CVE-2026-23031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak

In gs_can_open(), the URBs for USB-in transfers are allocated, added to the
parent-&gt;rx_submitted anchor and submitted. In the complete callback
gs_usb_receive_bulk_callback(), the URB is processed and resubmitted. In
gs_can_close() the URBs are freed by calling
usb_kill_anchored_urbs(parent-&gt;rx_submitted).

However, this does not take into account that the USB framework unanchors
the URB before the complete function is called. This means that once an
in-URB has been completed, it is no longer anchored and is ultimately not
released in gs_can_close().

Fix the memory leak by anchoring the URB in the
gs_usb_receive_bulk_callback() to the parent-&gt;rx_submitted anchor.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23031/">CVE-2026-23031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23031">CVE-2026-23031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257600">SUSE bug 1257600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23033</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23033" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23033" ref_url="https://www.suse.com/security/cve/CVE-2026-23033" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: omap-dma: fix dma_pool resource leak in error paths

The dma_pool created by dma_pool_create() is not destroyed when
dma_async_device_register() or of_dma_controller_register() fails,
causing a resource leak in the probe error paths.

Add dma_pool_destroy() in both error paths to properly release the
allocated dma_pool resource.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23033/">CVE-2026-23033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23033">CVE-2026-23033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257570">SUSE bug 1257570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23035</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23035" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23035" ref_url="https://www.suse.com/security/cve/CVE-2026-23035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv

mlx5e_priv is an unstable structure that can be memset(0) if profile
attaching fails.

Pass netdev to mlx5e_destroy_netdev() to guarantee it will work on a
valid netdev.

On mlx5e_remove: Check validity of priv-&gt;profile, before attempting
to cleanup any resources that might be not there.

This fixes a kernel oops in mlx5e_remove when switchdev mode fails due
to change profile failure.

$ devlink dev eswitch set pci/0000:00:03.0 mode switchdev
Error: mlx5_core: Failed setting eswitch to offloads.
dmesg:
workqueue: Failed to create a rescuer kthread for wq "mlx5e": -EINTR
mlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12
mlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: new profile init failed, -12
workqueue: Failed to create a rescuer kthread for wq "mlx5e": -EINTR
mlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12
mlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12

$ devlink dev reload pci/0000:00:03.0 ==&gt; oops

BUG: kernel NULL pointer dereference, address: 0000000000000370
PGD 0 P4D 0
Oops: Oops: 0000 [#1] SMP NOPTI
CPU: 15 UID: 0 PID: 520 Comm: devlink Not tainted 6.18.0-rc5+ #115 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014
RIP: 0010:mlx5e_dcbnl_dscp_app+0x23/0x100
RSP: 0018:ffffc9000083f8b8 EFLAGS: 00010286
RAX: ffff8881126fc380 RBX: ffff8881015ac400 RCX: ffffffff826ffc45
RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8881035109c0
RBP: ffff8881035109c0 R08: ffff888101e3e838 R09: ffff888100264e10
R10: ffffc9000083f898 R11: ffffc9000083f8a0 R12: ffff888101b921a0
R13: ffff888101b921a0 R14: ffff8881015ac9a0 R15: ffff8881015ac400
FS:  00007f789a3c8740(0000) GS:ffff88856aa59000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000370 CR3: 000000010b6c0001 CR4: 0000000000370ef0
Call Trace:
 &lt;TASK&gt;
 mlx5e_remove+0x57/0x110
 device_release_driver_internal+0x19c/0x200
 bus_remove_device+0xc6/0x130
 device_del+0x160/0x3d0
 ? devl_param_driverinit_value_get+0x2d/0x90
 mlx5_detach_device+0x89/0xe0
 mlx5_unload_one_devl_locked+0x3a/0x70
 mlx5_devlink_reload_down+0xc8/0x220
 devlink_reload+0x7d/0x260
 devlink_nl_reload_doit+0x45b/0x5a0
 genl_family_rcv_msg_doit+0xe8/0x140
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23035/">CVE-2026-23035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23035">CVE-2026-23035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257559">SUSE bug 1257559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23037</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23037" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23037" ref_url="https://www.suse.com/security/cve/CVE-2026-23037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: etas_es58x: allow partial RX URB allocation to succeed

When es58x_alloc_rx_urbs() fails to allocate the requested number of
URBs but succeeds in allocating some, it returns an error code.
This causes es58x_open() to return early, skipping the cleanup label
'free_urbs', which leads to the anchored URBs being leaked.

As pointed out by maintainer Vincent Mailhol, the driver is designed
to handle partial URB allocation gracefully. Therefore, partial
allocation should not be treated as a fatal error.

Modify es58x_alloc_rx_urbs() to return 0 if at least one URB has been
allocated, restoring the intended behavior and preventing the leak
in es58x_open().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23037/">CVE-2026-23037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23037">CVE-2026-23037 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257554">SUSE bug 1257554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23038</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23038" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23038" ref_url="https://www.suse.com/security/cve/CVE-2026-23038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pnfs/flexfiles: Fix memory leak in nfs4_ff_alloc_deviceid_node()

In nfs4_ff_alloc_deviceid_node(), if the allocation for ds_versions fails,
the function jumps to the out_scratch label without freeing the already
allocated dsaddrs list, leading to a memory leak.

Fix this by jumping to the out_err_drain_dsaddrs label, which properly
frees the dsaddrs list before cleaning up other resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23038/">CVE-2026-23038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23038">CVE-2026-23038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257553">SUSE bug 1257553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23042</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23042" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23042" ref_url="https://www.suse.com/security/cve/CVE-2026-23042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix aux device unplugging when rdma is not supported by vport

If vport flags do not contain VIRTCHNL2_VPORT_ENABLE_RDMA, driver does not
allocate vdev_info for this vport. This leads to kernel NULL pointer
dereference in idpf_idc_vport_dev_down(), which references vdev_info for
every vport regardless.

Check, if vdev_info was ever allocated before unplugging aux device.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23042/">CVE-2026-23042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23042">CVE-2026-23042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257705">SUSE bug 1257705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23047</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23047" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23047" ref_url="https://www.suse.com/security/cve/CVE-2026-23047" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: make calc_target() set t-&gt;paused, not just clear it

Currently calc_target() clears t-&gt;paused if the request shouldn't be
paused anymore, but doesn't ever set t-&gt;paused even though it's able to
determine when the request should be paused.  Setting t-&gt;paused is left
to __submit_request() which is fine for regular requests but doesn't
work for linger requests -- since __submit_request() doesn't operate
on linger requests, there is nowhere for lreq-&gt;t.paused to be set.
One consequence of this is that watches don't get reestablished on
paused -&gt; unpaused transitions in cases where requests have been paused
long enough for the (paused) unwatch request to time out and for the
subsequent (re)watch request to enter the paused state.  On top of the
watch not getting reestablished, rbd_reregister_watch() gets stuck with
rbd_dev-&gt;watch_mutex held:

  rbd_register_watch
    __rbd_register_watch
      ceph_osdc_watch
        linger_reg_commit_wait

It's waiting for lreq-&gt;reg_commit_wait to be completed, but for that to
happen the respective request needs to end up on need_resend_linger list
and be kicked when requests are unpaused.  There is no chance for that
if the request in question is never marked paused in the first place.

The fact that rbd_dev-&gt;watch_mutex remains taken out forever then
prevents the image from getting unmapped -- "rbd unmap" would inevitably
hang in D state on an attempt to grab the mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23047/">CVE-2026-23047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23047">CVE-2026-23047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257682">SUSE bug 1257682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23049</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23049" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23049" ref_url="https://www.suse.com/security/cve/CVE-2026-23049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel

The connector type for the DataImage SCF0700C48GGU18 panel is missing and
devm_drm_panel_bridge_add() requires connector type to be set. This leads
to a warning and a backtrace in the kernel log and panel does not work:
"
WARNING: CPU: 3 PID: 38 at drivers/gpu/drm/bridge/panel.c:379 devm_drm_of_get_bridge+0xac/0xb8
"
The warning is triggered by a check for valid connector type in
devm_drm_panel_bridge_add(). If there is no valid connector type
set for a panel, the warning is printed and panel is not added.
Fill in the missing connector type to fix the warning and make
the panel operational once again.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23049/">CVE-2026-23049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23049">CVE-2026-23049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257723">SUSE bug 1257723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23050</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23050" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23050" ref_url="https://www.suse.com/security/cve/CVE-2026-23050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pNFS: Fix a deadlock when returning a delegation during open()

Ben Coddington reports seeing a hang in the following stack trace:
  0 [ffffd0b50e1774e0] __schedule at ffffffff9ca05415
  1 [ffffd0b50e177548] schedule at ffffffff9ca05717
  2 [ffffd0b50e177558] bit_wait at ffffffff9ca061e1
  3 [ffffd0b50e177568] __wait_on_bit at ffffffff9ca05cfb
  4 [ffffd0b50e1775c8] out_of_line_wait_on_bit at ffffffff9ca05ea5
  5 [ffffd0b50e177618] pnfs_roc at ffffffffc154207b [nfsv4]
  6 [ffffd0b50e1776b8] _nfs4_proc_delegreturn at ffffffffc1506586 [nfsv4]
  7 [ffffd0b50e177788] nfs4_proc_delegreturn at ffffffffc1507480 [nfsv4]
  8 [ffffd0b50e1777f8] nfs_do_return_delegation at ffffffffc1523e41 [nfsv4]
  9 [ffffd0b50e177838] nfs_inode_set_delegation at ffffffffc1524a75 [nfsv4]
 10 [ffffd0b50e177888] nfs4_process_delegation at ffffffffc14f41dd [nfsv4]
 11 [ffffd0b50e1778a0] _nfs4_opendata_to_nfs4_state at ffffffffc1503edf [nfsv4]
 12 [ffffd0b50e1778c0] _nfs4_open_and_get_state at ffffffffc1504e56 [nfsv4]
 13 [ffffd0b50e177978] _nfs4_do_open at ffffffffc15051b8 [nfsv4]
 14 [ffffd0b50e1779f8] nfs4_do_open at ffffffffc150559c [nfsv4]
 15 [ffffd0b50e177a80] nfs4_atomic_open at ffffffffc15057fb [nfsv4]
 16 [ffffd0b50e177ad0] nfs4_file_open at ffffffffc15219be [nfsv4]
 17 [ffffd0b50e177b78] do_dentry_open at ffffffff9c09e6ea
 18 [ffffd0b50e177ba8] vfs_open at ffffffff9c0a082e
 19 [ffffd0b50e177bd0] dentry_open at ffffffff9c0a0935

The issue is that the delegreturn is being asked to wait for a layout
return that cannot complete because a state recovery was initiated. The
state recovery cannot complete until the open() finishes processing the
delegations it was given.

The solution is to propagate the existing flags that indicate a
non-blocking call to the function pnfs_roc(), so that it knows not to
wait in this situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23050/">CVE-2026-23050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23050">CVE-2026-23050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257688">SUSE bug 1257688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23053</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23053" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23053" ref_url="https://www.suse.com/security/cve/CVE-2026-23053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix a deadlock involving nfs_release_folio()

Wang Zhaolong reports a deadlock involving NFSv4.1 state recovery
waiting on kthreadd, which is attempting to reclaim memory by calling
nfs_release_folio(). The latter cannot make progress due to state
recovery being needed.

It seems that the only safe thing to do here is to kick off a writeback
of the folio, without waiting for completion, or else kicking off an
asynchronous commit.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23053/">CVE-2026-23053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23053">CVE-2026-23053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257718">SUSE bug 1257718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23054</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23054" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23054" ref_url="https://www.suse.com/security/cve/CVE-2026-23054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hv_netvsc: reject RSS hash key programming without RX indirection table

RSS configuration requires a valid RX indirection table. When the device
reports a single receive queue, rndis_filter_device_add() does not
allocate an indirection table, accepting RSS hash key updates in this
state leads to a hang.

Fix this by gating netvsc_set_rxfh() on ndc-&gt;rx_table_sz and return
-EOPNOTSUPP when the table is absent. This aligns set_rxfh with the device
capabilities and prevents incorrect behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23054/">CVE-2026-23054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23054">CVE-2026-23054 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257732">SUSE bug 1257732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23055</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23055" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23055" ref_url="https://www.suse.com/security/cve/CVE-2026-23055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: riic: Move suspend handling to NOIRQ phase

Commit 53326135d0e0 ("i2c: riic: Add suspend/resume support") added
suspend support for the Renesas I2C driver and following this change
on RZ/G3E the following WARNING is seen on entering suspend ...

[  134.275704] Freezing remaining freezable tasks completed (elapsed 0.001 seconds)
[  134.285536] ------------[ cut here ]------------
[  134.290298] i2c i2c-2: Transfer while suspended
[  134.295174] WARNING: drivers/i2c/i2c-core.h:56 at __i2c_smbus_xfer+0x1e4/0x214, CPU#0: systemd-sleep/388
[  134.365507] Tainted: [W]=WARN
[  134.368485] Hardware name: Renesas SMARC EVK version 2 based on r9a09g047e57 (DT)
[  134.375961] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  134.382935] pc : __i2c_smbus_xfer+0x1e4/0x214
[  134.387329] lr : __i2c_smbus_xfer+0x1e4/0x214
[  134.391717] sp : ffff800083f23860
[  134.395040] x29: ffff800083f23860 x28: 0000000000000000 x27: ffff800082ed5d60
[  134.402226] x26: 0000001f4395fd74 x25: 0000000000000007 x24: 0000000000000001
[  134.409408] x23: 0000000000000000 x22: 000000000000006f x21: ffff800083f23936
[  134.416589] x20: ffff0000c090e140 x19: ffff0000c090e0d0 x18: 0000000000000006
[  134.423771] x17: 6f63657320313030 x16: 2e30206465737061 x15: ffff800083f23280
[  134.430953] x14: 0000000000000000 x13: ffff800082b16ce8 x12: 0000000000000f09
[  134.438134] x11: 0000000000000503 x10: ffff800082b6ece8 x9 : ffff800082b16ce8
[  134.445315] x8 : 00000000ffffefff x7 : ffff800082b6ece8 x6 : 80000000fffff000
[  134.452495] x5 : 0000000000000504 x4 : 0000000000000000 x3 : 0000000000000000
[  134.459672] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000c9ee9e80
[  134.466851] Call trace:
[  134.469311]  __i2c_smbus_xfer+0x1e4/0x214 (P)
[  134.473715]  i2c_smbus_xfer+0xbc/0x120
[  134.477507]  i2c_smbus_read_byte_data+0x4c/0x84
[  134.482077]  isl1208_i2c_read_time+0x44/0x178 [rtc_isl1208]
[  134.487703]  isl1208_rtc_read_time+0x14/0x20 [rtc_isl1208]
[  134.493226]  __rtc_read_time+0x44/0x88
[  134.497012]  rtc_read_time+0x3c/0x68
[  134.500622]  rtc_suspend+0x9c/0x170

The warning is triggered because I2C transfers can still be attempted
while the controller is already suspended, due to inappropriate ordering
of the system sleep callbacks.

If the controller is autosuspended, there is no way to wake it up once
runtime PM disabled (in suspend_late()). During system resume, the I2C
controller will be available only after runtime PM is re-enabled
(in resume_early()). However, this may be too late for some devices.

Wake up the controller in the suspend() callback while runtime PM is
still enabled. The I2C controller will remain available until the
suspend_noirq() callback (pm_runtime_force_suspend()) is called. During
resume, the I2C controller can be restored by the resume_noirq() callback
(pm_runtime_force_resume()). Finally, the resume() callback re-enables
autosuspend. As a result, the I2C controller can remain available until
the system enters suspend_noirq() and from resume_noirq().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23055/">CVE-2026-23055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23055">CVE-2026-23055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257730">SUSE bug 1257730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23056</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23056" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23056" ref_url="https://www.suse.com/security/cve/CVE-2026-23056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uacce: implement mremap in uacce_vm_ops to return -EPERM

The current uacce_vm_ops does not support the mremap operation of
vm_operations_struct. Implement .mremap to return -EPERM to remind
users.

The reason we need to explicitly disable mremap is that when the
driver does not implement .mremap, it uses the default mremap
method. This could lead to a risk scenario:

An application might first mmap address p1, then mremap to p2,
followed by munmap(p1), and finally munmap(p2). Since the default
mremap copies the original vma's vm_private_data (i.e., q) to the
new vma, both munmap operations would trigger vma_close, causing
q-&gt;qfr to be freed twice(qfr will be set to null here, so repeated
release is ok).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23056/">CVE-2026-23056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23056">CVE-2026-23056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257729">SUSE bug 1257729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23057</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23057" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23057" ref_url="https://www.suse.com/security/cve/CVE-2026-23057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: Coalesce only linear skb

vsock/virtio common tries to coalesce buffers in rx queue: if a linear skb
(with a spare tail room) is followed by a small skb (length limited by
GOOD_COPY_LEN = 128), an attempt is made to join them.

Since the introduction of MSG_ZEROCOPY support, assumption that a small skb
will always be linear is incorrect. In the zerocopy case, data is lost and
the linear skb is appended with uninitialized kernel memory.

Of all 3 supported virtio-based transports, only loopback-transport is
affected. G2H virtio-transport rx queue operates on explicitly linear skbs;
see virtio_vsock_alloc_linear_skb() in virtio_vsock_rx_fill(). H2G
vhost-transport may allocate non-linear skbs, but only for sizes that are
not considered for coalescence; see PAGE_ALLOC_COSTLY_ORDER in
virtio_vsock_alloc_skb().

Ensure only linear skbs are coalesced. Note that skb_tailroom(last_skb) &gt; 0
guarantees last_skb is linear.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23057/">CVE-2026-23057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23057">CVE-2026-23057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257740">SUSE bug 1257740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23058</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23058" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23058" ref_url="https://www.suse.com/security/cve/CVE-2026-23058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak

Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb:
gs_usb_receive_bulk_callback(): fix URB memory leak").

In ems_usb_open(), the URBs for USB-in transfers are allocated, added to
the dev-&gt;rx_submitted anchor and submitted. In the complete callback
ems_usb_read_bulk_callback(), the URBs are processed and resubmitted. In
ems_usb_close() the URBs are freed by calling
usb_kill_anchored_urbs(&amp;dev-&gt;rx_submitted).

However, this does not take into account that the USB framework unanchors
the URB before the complete function is called. This means that once an
in-URB has been completed, it is no longer anchored and is ultimately not
released in ems_usb_close().

Fix the memory leak by anchoring the URB in the
ems_usb_read_bulk_callback() to the dev-&gt;rx_submitted anchor.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23058/">CVE-2026-23058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23058">CVE-2026-23058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257739">SUSE bug 1257739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23059</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23059" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23059" ref_url="https://www.suse.com/security/cve/CVE-2026-23059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Sanitize payload size to prevent member overflow

In qla27xx_copy_fpin_pkt() and qla27xx_copy_multiple_pkt(), the frame_size
reported by firmware is used to calculate the copy length into
item-&gt;iocb. However, the iocb member is defined as a fixed-size 64-byte
array within struct purex_item.

If the reported frame_size exceeds 64 bytes, subsequent memcpy calls will
overflow the iocb member boundary. While extra memory might be allocated,
this cross-member write is unsafe and triggers warnings under
CONFIG_FORTIFY_SOURCE.

Fix this by capping total_bytes to the size of the iocb member (64 bytes)
before allocation and copying. This ensures all copies remain within the
bounds of the destination structure member.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23059/">CVE-2026-23059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23059">CVE-2026-23059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257737">SUSE bug 1257737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23060</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23060" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23060" ref_url="https://www.suse.com/security/cve/CVE-2026-23060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: authencesn - reject too-short AAD (assoclen&lt;8) to match ESP/ESN spec

authencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than
the minimum expected length, crypto_authenc_esn_decrypt() can advance past
the end of the destination scatterlist and trigger a NULL pointer dereference
in scatterwalk_map_and_copy(), leading to a kernel panic (DoS).

Add a minimum AAD length check to fail fast on invalid inputs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23060/">CVE-2026-23060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23060">CVE-2026-23060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257735">SUSE bug 1257735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23061</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23061" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23061" ref_url="https://www.suse.com/security/cve/CVE-2026-23061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak

Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb:
gs_usb_receive_bulk_callback(): fix URB memory leak").

In kvaser_usb_set_{,data_}bittiming() -&gt; kvaser_usb_setup_rx_urbs(), the
URBs for USB-in transfers are allocated, added to the dev-&gt;rx_submitted
anchor and submitted. In the complete callback
kvaser_usb_read_bulk_callback(), the URBs are processed and resubmitted. In
kvaser_usb_remove_interfaces() the URBs are freed by calling
usb_kill_anchored_urbs(&amp;dev-&gt;rx_submitted).

However, this does not take into account that the USB framework unanchors
the URB before the complete function is called. This means that once an
in-URB has been completed, it is no longer anchored and is ultimately not
released in usb_kill_anchored_urbs().

Fix the memory leak by anchoring the URB in the
kvaser_usb_read_bulk_callback() to the dev-&gt;rx_submitted anchor.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23061/">CVE-2026-23061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23061">CVE-2026-23061 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257776">SUSE bug 1257776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23062</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23062" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23062" ref_url="https://www.suse.com/security/cve/CVE-2026-23062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: hp-bioscfg: Fix kernel panic in GET_INSTANCE_ID macro

The GET_INSTANCE_ID macro that caused a kernel panic when accessing sysfs
attributes:

1. Off-by-one error: The loop condition used '&lt;=' instead of '&lt;',
   causing access beyond array bounds. Since array indices are 0-based
   and go from 0 to instances_count-1, the loop should use '&lt;'.

2. Missing NULL check: The code dereferenced attr_name_kobj-&gt;name
   without checking if attr_name_kobj was NULL, causing a null pointer
   dereference in min_length_show() and other attribute show functions.

The panic occurred when fwupd tried to read BIOS configuration attributes:

  Oops: general protection fault [#1] SMP KASAN NOPTI
  KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
  RIP: 0010:min_length_show+0xcf/0x1d0 [hp_bioscfg]

Add a NULL check for attr_name_kobj before dereferencing and corrects
the loop boundary to match the pattern used elsewhere in the driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23062/">CVE-2026-23062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23062">CVE-2026-23062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257734">SUSE bug 1257734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23063</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23063" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23063" ref_url="https://www.suse.com/security/cve/CVE-2026-23063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uacce: ensure safe queue release with state management

Directly calling `put_queue` carries risks since it cannot
guarantee that resources of `uacce_queue` have been fully released
beforehand. So adding a `stop_queue` operation for the
UACCE_CMD_PUT_Q command and leaving the `put_queue` operation to
the final resource release ensures safety.

Queue states are defined as follows:
- UACCE_Q_ZOMBIE: Initial state
- UACCE_Q_INIT: After opening `uacce`
- UACCE_Q_STARTED: After `start` is issued via `ioctl`

When executing `poweroff -f` in virt while accelerator are still
working, `uacce_fops_release` and `uacce_remove` may execute
concurrently. This can cause `uacce_put_queue` within
`uacce_fops_release` to access a NULL `ops` pointer. Therefore, add
state checks to prevent accessing freed pointers.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23063/">CVE-2026-23063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23063">CVE-2026-23063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257722">SUSE bug 1257722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23064</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23064" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23064" ref_url="https://www.suse.com/security/cve/CVE-2026-23064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_ife: avoid possible NULL deref

tcf_ife_encode() must make sure ife_encode() does not return NULL.

syzbot reported:

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
 RIP: 0010:ife_tlv_meta_encode+0x41/0xa0 net/ife/ife.c:166
CPU: 3 UID: 0 PID: 8990 Comm: syz.0.696 Not tainted syzkaller #0 PREEMPT(full)
Call Trace:
 &lt;TASK&gt;
  ife_encode_meta_u32+0x153/0x180 net/sched/act_ife.c:101
  tcf_ife_encode net/sched/act_ife.c:841 [inline]
  tcf_ife_act+0x1022/0x1de0 net/sched/act_ife.c:877
  tc_act include/net/tc_wrapper.h:130 [inline]
  tcf_action_exec+0x1c0/0xa20 net/sched/act_api.c:1152
  tcf_exts_exec include/net/pkt_cls.h:349 [inline]
  mall_classify+0x1a0/0x2a0 net/sched/cls_matchall.c:42
  tc_classify include/net/tc_wrapper.h:197 [inline]
  __tcf_classify net/sched/cls_api.c:1764 [inline]
  tcf_classify+0x7f2/0x1380 net/sched/cls_api.c:1860
  multiq_classify net/sched/sch_multiq.c:39 [inline]
  multiq_enqueue+0xe0/0x510 net/sched/sch_multiq.c:66
  dev_qdisc_enqueue+0x45/0x250 net/core/dev.c:4147
  __dev_xmit_skb net/core/dev.c:4262 [inline]
  __dev_queue_xmit+0x2998/0x46c0 net/core/dev.c:4798
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23064/">CVE-2026-23064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23064">CVE-2026-23064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257765">SUSE bug 1257765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23065</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23065" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23065" ref_url="https://www.suse.com/security/cve/CVE-2026-23065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86/amd: Fix memory leak in wbrf_record()

The tmp buffer is allocated using kcalloc() but is not freed if
acpi_evaluate_dsm() fails. This causes a memory leak in the error path.

Fix this by explicitly freeing the tmp buffer in the error handling
path of acpi_evaluate_dsm().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23065/">CVE-2026-23065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23065">CVE-2026-23065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257742">SUSE bug 1257742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23066</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23066" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23066" ref_url="https://www.suse.com/security/cve/CVE-2026-23066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix recvmsg() unconditional requeue

If rxrpc_recvmsg() fails because MSG_DONTWAIT was specified but the call at
the front of the recvmsg queue already has its mutex locked, it requeues
the call - whether or not the call is already queued.  The call may be on
the queue because MSG_PEEK was also passed and so the call was not dequeued
or because the I/O thread requeued it.

The unconditional requeue may then corrupt the recvmsg queue, leading to
things like UAFs or refcount underruns.

Fix this by only requeuing the call if it isn't already on the queue - and
moving it to the front if it is already queued.  If we don't queue it, we
have to put the ref we obtained by dequeuing it.

Also, MSG_PEEK doesn't dequeue the call so shouldn't call
rxrpc_notify_socket() for the call if we didn't use up all the data on the
queue, so fix that also.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23066/">CVE-2026-23066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23066">CVE-2026-23066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257726">SUSE bug 1257726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257728">SUSE bug 1257728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23068</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23068" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23068" ref_url="https://www.suse.com/security/cve/CVE-2026-23068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: spi-sprd-adi: Fix double free in probe error path

The driver currently uses spi_alloc_host() to allocate the controller
but registers it using devm_spi_register_controller().

If devm_register_restart_handler() fails, the code jumps to the
put_ctlr label and calls spi_controller_put(). However, since the
controller was registered via a devm function, the device core will
automatically call spi_controller_put() again when the probe fails.
This results in a double-free of the spi_controller structure.

Fix this by switching to devm_spi_alloc_host() and removing the
manual spi_controller_put() call.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23068/">CVE-2026-23068 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23068">CVE-2026-23068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257805">SUSE bug 1257805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23069</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23069" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23069" ref_url="https://www.suse.com/security/cve/CVE-2026-23069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: fix potential underflow in virtio_transport_get_credit()

The credit calculation in virtio_transport_get_credit() uses unsigned
arithmetic:

  ret = vvs-&gt;peer_buf_alloc - (vvs-&gt;tx_cnt - vvs-&gt;peer_fwd_cnt);

If the peer shrinks its advertised buffer (peer_buf_alloc) while bytes
are in flight, the subtraction can underflow and produce a large
positive value, potentially allowing more data to be queued than the
peer can handle.

Reuse virtio_transport_has_space() which already handles this case and
add a comment to make it clear why we are doing that.

[Stefano: use virtio_transport_has_space() instead of duplicating the code]
[Stefano: tweak the commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23069/">CVE-2026-23069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23069">CVE-2026-23069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257755">SUSE bug 1257755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23070</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23070" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23070" ref_url="https://www.suse.com/security/cve/CVE-2026-23070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Octeontx2-af: Add proper checks for fwdata

firmware populates MAC address, link modes (supported, advertised)
and EEPROM data in shared firmware structure which kernel access
via MAC block(CGX/RPM).

Accessing fwdata, on boards booted with out MAC block leading to
kernel panics.

Internal error: Oops: 0000000096000005 [#1]  SMP
[   10.460721] Modules linked in:
[   10.463779] CPU: 0 UID: 0 PID: 174 Comm: kworker/0:3 Not tainted 6.19.0-rc5-00154-g76ec646abdf7-dirty #3 PREEMPT
[   10.474045] Hardware name: Marvell OcteonTX CN98XX board (DT)
[   10.479793] Workqueue: events work_for_cpu_fn
[   10.484159] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   10.491124] pc : rvu_sdp_init+0x18/0x114
[   10.495051] lr : rvu_probe+0xe58/0x1d18
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23070/">CVE-2026-23070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23070">CVE-2026-23070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257709">SUSE bug 1257709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23071</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23071" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23071" ref_url="https://www.suse.com/security/cve/CVE-2026-23071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regmap: Fix race condition in hwspinlock irqsave routine

Previously, the address of the shared member '&amp;map-&gt;spinlock_flags' was
passed directly to 'hwspin_lock_timeout_irqsave'. This creates a race
condition where multiple contexts contending for the lock could overwrite
the shared flags variable, potentially corrupting the state for the
current lock owner.

Fix this by using a local stack variable 'flags' to store the IRQ state
temporarily.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23071/">CVE-2026-23071 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23071">CVE-2026-23071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257706">SUSE bug 1257706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23073</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23073" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23073" ref_url="https://www.suse.com/security/cve/CVE-2026-23073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rsi: Fix memory corruption due to not set vif driver data size

The struct ieee80211_vif contains trailing space for vif driver data,
when struct ieee80211_vif is allocated, the total memory size that is
allocated is sizeof(struct ieee80211_vif) + size of vif driver data.
The size of vif driver data is set by each WiFi driver as needed.

The RSI911x driver does not set vif driver data size, no trailing space
for vif driver data is therefore allocated past struct ieee80211_vif .
The RSI911x driver does however use the vif driver data to store its
vif driver data structure "struct vif_priv". An access to vif-&gt;drv_priv
leads to access out of struct ieee80211_vif bounds and corruption of
some memory.

In case of the failure observed locally, rsi_mac80211_add_interface()
would write struct vif_priv *vif_info = (struct vif_priv *)vif-&gt;drv_priv;
vif_info-&gt;vap_id = vap_idx. This write corrupts struct fq_tin member
struct list_head new_flows . The flow = list_first_entry(head, struct
fq_flow, flowchain); in fq_tin_reset() then reports non-NULL bogus
address, which when accessed causes a crash.

The trigger is very simple, boot the machine with init=/bin/sh , mount
devtmpfs, sysfs, procfs, and then do "ip link set wlan0 up", "sleep 1",
"ip link set wlan0 down" and the crash occurs.

Fix this by setting the correct size of vif driver data, which is the
size of "struct vif_priv", so that memory is allocated and the driver
can store its driver data in it, instead of corrupting memory around
it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23073/">CVE-2026-23073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23073">CVE-2026-23073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257707">SUSE bug 1257707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23074</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23074" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23074" ref_url="https://www.suse.com/security/cve/CVE-2026-23074" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3083" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002524.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1187-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1258-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1263-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1279-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1284-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1285-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1287-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1288-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21004-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21006-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21071-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Enforce that teql can only be used as root qdisc

Design intent of teql is that it is only supposed to be used as root qdisc.
We need to check for that constraint.

Although not important, I will describe the scenario that unearthed this
issue for the curious.

GangMin Kim &lt;km.kim1503@gmail.com&gt; managed to concot a scenario as follows:

ROOT qdisc 1:0 (QFQ)
  ├── class 1:1 (weight=15, lmax=16384) netem with delay 6.4s
   ── class 1:2 (weight=1, lmax=1514) teql

GangMin sends a packet which is enqueued to 1:1 (netem).
Any invocation of dequeue by QFQ from this class will not return a packet
until after 6.4s. In the meantime, a second packet is sent and it lands on
1:2. teql's enqueue will return success and this will activate class 1:2.
Main issue is that teql only updates the parent visible qlen (sch-&gt;q.qlen)
at dequeue. Since QFQ will only call dequeue if peek succeeds (and teql's
peek always returns NULL), dequeue will never be called and thus the qlen
will remain as 0. With that in mind, when GangMin updates 1:2's lmax value,
the qfq_change_class calls qfq_deact_rm_from_agg. Since the child qdisc's
qlen was not incremented, qfq fails to deactivate the class, but still
frees its pointers from the aggregate. So when the first packet is
rescheduled after 6.4 seconds (netem's delay), a dangling pointer is
accessed causing GangMin's causing a UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23074/">CVE-2026-23074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23074">CVE-2026-23074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257749">SUSE bug 1257749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258051">SUSE bug 1258051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056306" comment="kernel-livepatch-6_12_0-160000_26-rt-2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056309" comment="kernel-livepatch-6_12_0-160000_5-rt-7-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056310" comment="kernel-livepatch-6_12_0-160000_6-rt-6-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056311" comment="kernel-livepatch-6_12_0-160000_7-rt-4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056308" comment="kernel-livepatch-6_12_0-160000_8-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056330" comment="kernel-livepatch-6_12_0-160000_9-default-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056307" comment="kernel-livepatch-6_12_0-160000_9-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23076</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23076" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23076" ref_url="https://www.suse.com/security/cve/CVE-2026-23076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: ctxfi: Fix potential OOB access in audio mixer handling

In the audio mixer handling code of ctxfi driver, the conf field is
used as a kind of loop index, and it's referred in the index callbacks
(amixer_index() and sum_index()).

As spotted recently by fuzzers, the current code causes OOB access at
those functions.
| UBSAN: array-index-out-of-bounds in /build/reproducible-path/linux-6.17.8/sound/pci/ctxfi/ctamixer.c:347:48
| index 8 is out of range for type 'unsigned char [8]'

After the analysis, the cause was found to be the lack of the proper
(re-)initialization of conj field.

This patch addresses those OOB accesses by adding the proper
initializations of the loop indices.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.2/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23076/">CVE-2026-23076 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23076">CVE-2026-23076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257788">SUSE bug 1257788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23078</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23078" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23078" ref_url="https://www.suse.com/security/cve/CVE-2026-23078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: scarlett2: Fix buffer overflow in config retrieval

The scarlett2_usb_get_config() function has a logic error in the
endianness conversion code that can cause buffer overflows when
count &gt; 1.

The code checks `if (size == 2)` where `size` is the total buffer size in
bytes, then loops `count` times treating each element as u16 (2 bytes).
This causes the loop to access `count * 2` bytes when the buffer only
has `size` bytes allocated.

Fix by checking the element size (config_item-&gt;size) instead of the
total buffer size. This ensures the endianness conversion matches the
actual element type.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23078/">CVE-2026-23078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23078">CVE-2026-23078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257789">SUSE bug 1257789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23080</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23080" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23080" ref_url="https://www.suse.com/security/cve/CVE-2026-23080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: mcba_usb: mcba_usb_read_bulk_callback(): fix URB memory leak

Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb:
gs_usb_receive_bulk_callback(): fix URB memory leak").

In mcba_usb_probe() -&gt; mcba_usb_start(), the URBs for USB-in transfers are
allocated, added to the priv-&gt;rx_submitted anchor and submitted. In the
complete callback mcba_usb_read_bulk_callback(), the URBs are processed and
resubmitted. In mcba_usb_close() -&gt; mcba_urb_unlink() the URBs are freed by
calling usb_kill_anchored_urbs(&amp;priv-&gt;rx_submitted).

However, this does not take into account that the USB framework unanchors
the URB before the complete function is called. This means that once an
in-URB has been completed, it is no longer anchored and is ultimately not
released in usb_kill_anchored_urbs().

Fix the memory leak by anchoring the URB in the
mcba_usb_read_bulk_callback()to the priv-&gt;rx_submitted anchor.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23080/">CVE-2026-23080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23080">CVE-2026-23080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257714">SUSE bug 1257714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23082</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23082" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23082" ref_url="https://www.suse.com/security/cve/CVE-2026-23082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on usb_submit_urb() error

In commit 7352e1d5932a ("can: gs_usb: gs_usb_receive_bulk_callback(): fix
URB memory leak"), the URB was re-anchored before usb_submit_urb() in
gs_usb_receive_bulk_callback() to prevent a leak of this URB during
cleanup.

However, this patch did not take into account that usb_submit_urb() could
fail. The URB remains anchored and
usb_kill_anchored_urbs(&amp;parent-&gt;rx_submitted) in gs_can_close() loops
infinitely since the anchor list never becomes empty.

To fix the bug, unanchor the URB when an usb_submit_urb() error occurs,
also print an info message.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23082/">CVE-2026-23082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23082">CVE-2026-23082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257715">SUSE bug 1257715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23083</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23083" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23083" ref_url="https://www.suse.com/security/cve/CVE-2026-23083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fou: Don't allow 0 for FOU_ATTR_IPPROTO.

fou_udp_recv() has the same problem mentioned in the previous
patch.

If FOU_ATTR_IPPROTO is set to 0, skb is not freed by
fou_udp_recv() nor "resubmit"-ted in ip_protocol_deliver_rcu().

Let's forbid 0 for FOU_ATTR_IPPROTO.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23083/">CVE-2026-23083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23083">CVE-2026-23083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257745">SUSE bug 1257745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23084</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23084" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23084" ref_url="https://www.suse.com/security/cve/CVE-2026-23084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list

When the parameter pmac_id_valid argument of be_cmd_get_mac_from_list() is
set to false, the driver may request the PMAC_ID from the firmware of the
network card, and this function will store that PMAC_ID at the provided
address pmac_id. This is the contract of this function.

However, there is a location within the driver where both
pmac_id_valid == false and pmac_id == NULL are being passed. This could
result in dereferencing a NULL pointer.

To resolve this issue, it is necessary to pass the address of a stub
variable to the function.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23084/">CVE-2026-23084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23084">CVE-2026-23084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257830">SUSE bug 1257830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23085</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23085" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23085" ref_url="https://www.suse.com/security/cve/CVE-2026-23085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v3-its: Avoid truncating memory addresses

On 32-bit machines with CONFIG_ARM_LPAE, it is possible for lowmem
allocations to be backed by addresses physical memory above the 32-bit
address limit, as found while experimenting with larger VMSPLIT
configurations.

This caused the qemu virt model to crash in the GICv3 driver, which
allocates the 'itt' object using GFP_KERNEL. Since all memory below
the 4GB physical address limit is in ZONE_DMA in this configuration,
kmalloc() defaults to higher addresses for ZONE_NORMAL, and the
ITS driver stores the physical address in a 32-bit 'unsigned long'
variable.

Change the itt_addr variable to the correct phys_addr_t type instead,
along with all other variables in this driver that hold a physical
address.

The gicv5 driver correctly uses u64 variables, while all other irqchip
drivers don't call virt_to_phys or similar interfaces. It's expected that
other device drivers have similar issues, but fixing this one is
sufficient for booting a virtio based guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23085/">CVE-2026-23085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23085">CVE-2026-23085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257758">SUSE bug 1257758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23086</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23086" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23086" ref_url="https://www.suse.com/security/cve/CVE-2026-23086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: cap TX credit to local buffer size

The virtio transports derives its TX credit directly from peer_buf_alloc,
which is set from the remote endpoint's SO_VM_SOCKETS_BUFFER_SIZE value.

On the host side this means that the amount of data we are willing to
queue for a connection is scaled by a guest-chosen buffer size, rather
than the host's own vsock configuration. A malicious guest can advertise
a large buffer and read slowly, causing the host to allocate a
correspondingly large amount of sk_buff memory.
The same thing would happen in the guest with a malicious host, since
virtio transports share the same code base.

Introduce a small helper, virtio_transport_tx_buf_size(), that
returns min(peer_buf_alloc, buf_alloc), and use it wherever we consume
peer_buf_alloc.

This ensures the effective TX window is bounded by both the peer's
advertised buffer and our own buf_alloc (already clamped to
buffer_max_size via SO_VM_SOCKETS_BUFFER_MAX_SIZE), so a remote peer
cannot force the other to queue more data than allowed by its own
vsock settings.

On an unpatched Ubuntu 22.04 host (~64 GiB RAM), running a PoC with
32 guest vsock connections advertising 2 GiB each and reading slowly
drove Slab/SUnreclaim from ~0.5 GiB to ~57 GiB; the system only
recovered after killing the QEMU process. That said, if QEMU memory is
limited with cgroups, the maximum memory used will be limited.

With this patch applied:

  Before:
    MemFree:        ~61.6 GiB
    Slab:           ~142 MiB
    SUnreclaim:     ~117 MiB

  After 32 high-credit connections:
    MemFree:        ~61.5 GiB
    Slab:           ~178 MiB
    SUnreclaim:     ~152 MiB

Only ~35 MiB increase in Slab/SUnreclaim, no host OOM, and the guest
remains responsive.

Compatibility with non-virtio transports:

  - VMCI uses the AF_VSOCK buffer knobs to size its queue pairs per
    socket based on the local vsk-&gt;buffer_* values; the remote side
    cannot enlarge those queues beyond what the local endpoint
    configured.

  - Hyper-V's vsock transport uses fixed-size VMBus ring buffers and
    an MTU bound; there is no peer-controlled credit field comparable
    to peer_buf_alloc, and the remote endpoint cannot drive in-flight
    kernel memory above those ring sizes.

  - The loopback path reuses virtio_transport_common.c, so it
    naturally follows the same semantics as the virtio transport.

This change is limited to virtio_transport_common.c and thus affects
virtio-vsock, vhost-vsock, and loopback, bringing them in line with the
"remote window intersected with local policy" behaviour that VMCI and
Hyper-V already effectively have.

[Stefano: small adjustments after changing the previous patch]
[Stefano: tweak the commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2026-23086/">CVE-2026-23086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23086">CVE-2026-23086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257757">SUSE bug 1257757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23088</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23088" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23088" ref_url="https://www.suse.com/security/cve/CVE-2026-23088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix crash on synthetic stacktrace field usage

When creating a synthetic event based on an existing synthetic event that
had a stacktrace field and the new synthetic event used that field a
kernel crash occurred:

 ~# cd /sys/kernel/tracing
 ~# echo 's:stack unsigned long stack[];' &gt; dynamic_events
 ~# echo 'hist:keys=prev_pid:s0=common_stacktrace if prev_state &amp; 3' &gt;&gt; events/sched/sched_switch/trigger
 ~# echo 'hist:keys=next_pid:s1=$s0:onmatch(sched.sched_switch).trace(stack,$s1)' &gt;&gt; events/sched/sched_switch/trigger

The above creates a synthetic event that takes a stacktrace when a task
schedules out in a non-running state and passes that stacktrace to the
sched_switch event when that task schedules back in. It triggers the
"stack" synthetic event that has a stacktrace as its field (called "stack").

 ~# echo 's:syscall_stack s64 id; unsigned long stack[];' &gt;&gt; dynamic_events
 ~# echo 'hist:keys=common_pid:s2=stack' &gt;&gt; events/synthetic/stack/trigger
 ~# echo 'hist:keys=common_pid:s3=$s2,i0=id:onmatch(synthetic.stack).trace(syscall_stack,$i0,$s3)' &gt;&gt; events/raw_syscalls/sys_exit/trigger

The above makes another synthetic event called "syscall_stack" that
attaches the first synthetic event (stack) to the sys_exit trace event and
records the stacktrace from the stack event with the id of the system call
that is exiting.

When enabling this event (or using it in a historgram):

 ~# echo 1 &gt; events/synthetic/syscall_stack/enable

Produces a kernel crash!

 BUG: unable to handle page fault for address: 0000000000400010
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: Oops: 0000 [#1] SMP PTI
 CPU: 6 UID: 0 PID: 1257 Comm: bash Not tainted 6.16.3+deb14-amd64 #1 PREEMPT(lazy)  Debian 6.16.3-1
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-debian-1.17.0-1 04/01/2014
 RIP: 0010:trace_event_raw_event_synth+0x90/0x380
 Code: c5 00 00 00 00 85 d2 0f 84 e1 00 00 00 31 db eb 34 0f 1f 00 66 66 2e 0f 1f 84 00 00 00 00 00 66 66 2e 0f 1f 84 00 00 00 00 00 &lt;49&gt; 8b 04 24 48 83 c3 01 8d 0c c5 08 00 00 00 01 cd 41 3b 5d 40 0f
 RSP: 0018:ffffd2670388f958 EFLAGS: 00010202
 RAX: ffff8ba1065cc100 RBX: 0000000000000000 RCX: 0000000000000000
 RDX: 0000000000000001 RSI: fffff266ffda7b90 RDI: ffffd2670388f9b0
 RBP: 0000000000000010 R08: ffff8ba104e76000 R09: ffffd2670388fa50
 R10: ffff8ba102dd42e0 R11: ffffffff9a908970 R12: 0000000000400010
 R13: ffff8ba10a246400 R14: ffff8ba10a710220 R15: fffff266ffda7b90
 FS:  00007fa3bc63f740(0000) GS:ffff8ba2e0f48000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000400010 CR3: 0000000107f9e003 CR4: 0000000000172ef0
 Call Trace:
  &lt;TASK&gt;
  ? __tracing_map_insert+0x208/0x3a0
  action_trace+0x67/0x70
  event_hist_trigger+0x633/0x6d0
  event_triggers_call+0x82/0x130
  trace_event_buffer_commit+0x19d/0x250
  trace_event_raw_event_sys_exit+0x62/0xb0
  syscall_exit_work+0x9d/0x140
  do_syscall_64+0x20a/0x2f0
  ? trace_event_raw_event_sched_switch+0x12b/0x170
  ? save_fpregs_to_fpstate+0x3e/0x90
  ? _raw_spin_unlock+0xe/0x30
  ? finish_task_switch.isra.0+0x97/0x2c0
  ? __rseq_handle_notify_resume+0xad/0x4c0
  ? __schedule+0x4b8/0xd00
  ? restore_fpregs_from_fpstate+0x3c/0x90
  ? switch_fpu_return+0x5b/0xe0
  ? do_syscall_64+0x1ef/0x2f0
  ? do_fault+0x2e9/0x540
  ? __handle_mm_fault+0x7d1/0xf70
  ? count_memcg_events+0x167/0x1d0
  ? handle_mm_fault+0x1d7/0x2e0
  ? do_user_addr_fault+0x2c3/0x7f0
  entry_SYSCALL_64_after_hwframe+0x76/0x7e

The reason is that the stacktrace field is not labeled as such, and is
treated as a normal field and not as a dynamic event that it is.

In trace_event_raw_event_synth() the event is field is still treated as a
dynamic array, but the retrieval of the data is considered a normal field,
and the reference is just the meta data:

// Meta data is retrieved instead of a dynamic array
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23088/">CVE-2026-23088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23088">CVE-2026-23088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257814">SUSE bug 1257814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23089</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23089" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23089" ref_url="https://www.suse.com/security/cve/CVE-2026-23089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free()

When snd_usb_create_mixer() fails, snd_usb_mixer_free() frees
mixer-&gt;id_elems but the controls already added to the card still
reference the freed memory. Later when snd_card_register() runs,
the OSS mixer layer calls their callbacks and hits a use-after-free read.

Call trace:
  get_ctl_value+0x63f/0x820 sound/usb/mixer.c:411
  get_min_max_with_quirks.isra.0+0x240/0x1f40 sound/usb/mixer.c:1241
  mixer_ctl_feature_info+0x26b/0x490 sound/usb/mixer.c:1381
  snd_mixer_oss_build_test+0x174/0x3a0 sound/core/oss/mixer_oss.c:887
  ...
  snd_card_register+0x4ed/0x6d0 sound/core/init.c:923
  usb_audio_probe+0x5ef/0x2a90 sound/usb/card.c:1025

Fix by calling snd_ctl_remove() for all mixer controls before freeing
id_elems. We save the next pointer first because snd_ctl_remove()
frees the current element.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.2/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23089/">CVE-2026-23089 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23089">CVE-2026-23089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257790">SUSE bug 1257790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23090</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23090" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23090" ref_url="https://www.suse.com/security/cve/CVE-2026-23090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

slimbus: core: fix device reference leak on report present

Slimbus devices can be allocated dynamically upon reception of
report-present messages.

Make sure to drop the reference taken when looking up already registered
devices.

Note that this requires taking an extra reference in case the device has
not yet been registered and has to be allocated.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23090/">CVE-2026-23090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23090">CVE-2026-23090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257759">SUSE bug 1257759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23091</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23091" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23091" ref_url="https://www.suse.com/security/cve/CVE-2026-23091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

intel_th: fix device leak on output open()

Make sure to drop the reference taken when looking up the th device
during output device open() on errors and on close().

Note that a recent commit fixed the leak in a couple of open() error
paths but not all of them, and the reference is still leaking on
successful open().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23091/">CVE-2026-23091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23091">CVE-2026-23091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257813">SUSE bug 1257813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23094</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23094" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23094" ref_url="https://www.suse.com/security/cve/CVE-2026-23094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uacce: fix isolate sysfs check condition

uacce supports the device isolation feature. If the driver
implements the isolate_err_threshold_read and
isolate_err_threshold_write callback functions, uacce will create
sysfs files now. Users can read and configure the isolation policy
through sysfs. Currently, sysfs files are created as long as either
isolate_err_threshold_read or isolate_err_threshold_write callback
functions are present.

However, accessing a non-existent callback function may cause the
system to crash. Therefore, intercept the creation of sysfs if
neither read nor write exists; create sysfs if either is supported,
but intercept unsupported operations at the call site.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23094/">CVE-2026-23094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23094">CVE-2026-23094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257811">SUSE bug 1257811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23095</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23095" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23095" ref_url="https://www.suse.com/security/cve/CVE-2026-23095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gue: Fix skb memleak with inner IP protocol 0.

syzbot reported skb memleak below. [0]

The repro generated a GUE packet with its inner protocol 0.

gue_udp_recv() returns -guehdr-&gt;proto_ctype for "resubmit"
in ip_protocol_deliver_rcu(), but this only works with
non-zero protocol number.

Let's drop such packets.

Note that 0 is a valid number (IPv6 Hop-by-Hop Option).

I think it is not practical to encap HOPOPT in GUE, so once
someone starts to complain, we could pass down a resubmit
flag pointer to distinguish two zeros from the upper layer:

  * no error
  * resubmit HOPOPT

[0]
BUG: memory leak
unreferenced object 0xffff888109695a00 (size 240):
  comm "syz.0.17", pid 6088, jiffies 4294943096
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 40 c2 10 81 88 ff ff 00 00 00 00 00 00 00 00  .@..............
  backtrace (crc a84b336f):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    kmem_cache_alloc_noprof+0x3b4/0x590 mm/slub.c:5270
    __build_skb+0x23/0x60 net/core/skbuff.c:474
    build_skb+0x20/0x190 net/core/skbuff.c:490
    __tun_build_skb drivers/net/tun.c:1541 [inline]
    tun_build_skb+0x4a1/0xa40 drivers/net/tun.c:1636
    tun_get_user+0xc12/0x2030 drivers/net/tun.c:1770
    tun_chr_write_iter+0x71/0x120 drivers/net/tun.c:1999
    new_sync_write fs/read_write.c:593 [inline]
    vfs_write+0x45d/0x710 fs/read_write.c:686
    ksys_write+0xa7/0x170 fs/read_write.c:738
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23095/">CVE-2026-23095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23095">CVE-2026-23095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257808">SUSE bug 1257808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23096</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23096" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23096" ref_url="https://www.suse.com/security/cve/CVE-2026-23096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uacce: fix cdev handling in the cleanup path

When cdev_device_add fails, it internally releases the cdev memory,
and if cdev_device_del is then executed, it will cause a hang error.
To fix it, we check the return value of cdev_device_add() and clear
uacce-&gt;cdev to avoid calling cdev_device_del in the uacce_remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23096/">CVE-2026-23096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23096">CVE-2026-23096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257809">SUSE bug 1257809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23097</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23097" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23097" ref_url="https://www.suse.com/security/cve/CVE-2026-23097" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3464" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002536.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3488" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

migrate: correct lock ordering for hugetlb file folios

Syzbot has found a deadlock (analyzed by Lance Yang):

1) Task (5749): Holds folio_lock, then tries to acquire i_mmap_rwsem(read lock).
2) Task (5754): Holds i_mmap_rwsem(write lock), then tries to acquire
folio_lock.

migrate_pages()
  -&gt; migrate_hugetlbs()
    -&gt; unmap_and_move_huge_page()     &lt;- Takes folio_lock!
      -&gt; remove_migration_ptes()
        -&gt; __rmap_walk_file()
          -&gt; i_mmap_lock_read()       &lt;- Waits for i_mmap_rwsem(read lock)!

hugetlbfs_fallocate()
  -&gt; hugetlbfs_punch_hole()           &lt;- Takes i_mmap_rwsem(write lock)!
    -&gt; hugetlbfs_zero_partial_page()
     -&gt; filemap_lock_hugetlb_folio()
      -&gt; filemap_lock_folio()
        -&gt; __filemap_get_folio        &lt;- Waits for folio_lock!

The migration path is the one taking locks in the wrong order according to
the documentation at the top of mm/rmap.c.  So expand the scope of the
existing i_mmap_lock to cover the calls to remove_migration_ptes() too.

This is (mostly) how it used to be after commit c0d0381ade79.  That was
removed by 336bf30eb765 for both file &amp; anon hugetlb pages when it should
only have been removed for anon hugetlb pages.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23097/">CVE-2026-23097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23097">CVE-2026-23097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257815">SUSE bug 1257815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23099</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23099" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23099" ref_url="https://www.suse.com/security/cve/CVE-2026-23099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: limit BOND_MODE_8023AD to Ethernet devices

BOND_MODE_8023AD makes sense for ARPHRD_ETHER only.

syzbot reported:

 BUG: KASAN: global-out-of-bounds in __hw_addr_create net/core/dev_addr_lists.c:63 [inline]
 BUG: KASAN: global-out-of-bounds in __hw_addr_add_ex+0x25d/0x760 net/core/dev_addr_lists.c:118
Read of size 16 at addr ffffffff8bf94040 by task syz.1.3580/19497

CPU: 1 UID: 0 PID: 19497 Comm: syz.1.3580 Tainted: G             L      syzkaller #0 PREEMPT(full)
Tainted: [L]=SOFTLOCKUP
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
Call Trace:
 &lt;TASK&gt;
  dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120
  print_address_description mm/kasan/report.c:378 [inline]
  print_report+0xca/0x240 mm/kasan/report.c:482
  kasan_report+0x118/0x150 mm/kasan/report.c:595
 check_region_inline mm/kasan/generic.c:-1 [inline]
  kasan_check_range+0x2b0/0x2c0 mm/kasan/generic.c:200
  __asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105
  __hw_addr_create net/core/dev_addr_lists.c:63 [inline]
  __hw_addr_add_ex+0x25d/0x760 net/core/dev_addr_lists.c:118
  __dev_mc_add net/core/dev_addr_lists.c:868 [inline]
  dev_mc_add+0xa1/0x120 net/core/dev_addr_lists.c:886
  bond_enslave+0x2b8b/0x3ac0 drivers/net/bonding/bond_main.c:2180
  do_set_master+0x533/0x6d0 net/core/rtnetlink.c:2963
  do_setlink+0xcf0/0x41c0 net/core/rtnetlink.c:3165
  rtnl_changelink net/core/rtnetlink.c:3776 [inline]
  __rtnl_newlink net/core/rtnetlink.c:3935 [inline]
  rtnl_newlink+0x161c/0x1c90 net/core/rtnetlink.c:4072
  rtnetlink_rcv_msg+0x7cf/0xb70 net/core/rtnetlink.c:6958
  netlink_rcv_skb+0x208/0x470 net/netlink/af_netlink.c:2550
  netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline]
  netlink_unicast+0x82f/0x9e0 net/netlink/af_netlink.c:1344
  netlink_sendmsg+0x805/0xb30 net/netlink/af_netlink.c:1894
  sock_sendmsg_nosec net/socket.c:727 [inline]
  __sock_sendmsg+0x21c/0x270 net/socket.c:742
  ____sys_sendmsg+0x505/0x820 net/socket.c:2592
  ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2646
  __sys_sendmsg+0x164/0x220 net/socket.c:2678
  do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]
  __do_fast_syscall_32+0x1dc/0x560 arch/x86/entry/syscall_32.c:307
  do_fast_syscall_32+0x34/0x80 arch/x86/entry/syscall_32.c:332
 entry_SYSENTER_compat_after_hwframe+0x84/0x8e
 &lt;/TASK&gt;

The buggy address belongs to the variable:
 lacpdu_mcast_addr+0x0/0x40
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23099/">CVE-2026-23099 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23099">CVE-2026-23099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257816">SUSE bug 1257816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23100</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23100" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23100" ref_url="https://www.suse.com/security/cve/CVE-2026-23100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: fix hugetlb_pmd_shared()

Patch series "mm/hugetlb: fixes for PMD table sharing (incl.  using
mmu_gather)", v3.

One functional fix, one performance regression fix, and two related
comment fixes.

I cleaned up my prototype I recently shared [1] for the performance fix,
deferring most of the cleanups I had in the prototype to a later point. 
While doing that I identified the other things.

The goal of this patch set is to be backported to stable trees "fairly"
easily. At least patch #1 and #4.

Patch #1 fixes hugetlb_pmd_shared() not detecting any sharing
Patch #2 + #3 are simple comment fixes that patch #4 interacts with.
Patch #4 is a fix for the reported performance regression due to excessive
IPI broadcasts during fork()+exit().

The last patch is all about TLB flushes, IPIs and mmu_gather.
Read: complicated

There are plenty of cleanups in the future to be had + one reasonable
optimization on x86. But that's all out of scope for this series.

Runtime tested, with a focus on fixing the performance regression using
the original reproducer [2] on x86.


This patch (of 4):

We switched from (wrongly) using the page count to an independent shared
count.  Now, shared page tables have a refcount of 1 (excluding
speculative references) and instead use ptdesc-&gt;pt_share_count to identify
sharing.

We didn't convert hugetlb_pmd_shared(), so right now, we would never
detect a shared PMD table as such, because sharing/unsharing no longer
touches the refcount of a PMD table.

Page migration, like mbind() or migrate_pages() would allow for migrating
folios mapped into such shared PMD tables, even though the folios are not
exclusive.  In smaps we would account them as "private" although they are
"shared", and we would be wrongly setting the PM_MMAP_EXCLUSIVE in the
pagemap interface.

Fix it by properly using ptdesc_pmd_is_shared() in hugetlb_pmd_shared().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23100/">CVE-2026-23100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23100">CVE-2026-23100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257817">SUSE bug 1257817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23101</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23101" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23101" ref_url="https://www.suse.com/security/cve/CVE-2026-23101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

leds: led-class: Only Add LED to leds_list when it is fully ready

Before this change the LED was added to leds_list before led_init_core()
gets called adding it the list before led_classdev.set_brightness_work gets
initialized.

This leaves a window where led_trigger_register() of a LED's default
trigger will call led_trigger_set() which calls led_set_brightness()
which in turn will end up queueing the *uninitialized*
led_classdev.set_brightness_work.

This race gets hit by the lenovo-thinkpad-t14s EC driver which registers
2 LEDs with a default trigger provided by snd_ctl_led.ko in quick
succession. The first led_classdev_register() causes an async modprobe of
snd_ctl_led to run and that async modprobe manages to exactly hit
the window where the second LED is on the leds_list without led_init_core()
being called for it, resulting in:

 ------------[ cut here ]------------
 WARNING: CPU: 11 PID: 5608 at kernel/workqueue.c:4234 __flush_work+0x344/0x390
 Hardware name: LENOVO 21N2S01F0B/21N2S01F0B, BIOS N42ET93W (2.23 ) 09/01/2025
 ...
 Call trace:
  __flush_work+0x344/0x390 (P)
  flush_work+0x2c/0x50
  led_trigger_set+0x1c8/0x340
  led_trigger_register+0x17c/0x1c0
  led_trigger_register_simple+0x84/0xe8
  snd_ctl_led_init+0x40/0xf88 [snd_ctl_led]
  do_one_initcall+0x5c/0x318
  do_init_module+0x9c/0x2b8
  load_module+0x7e0/0x998

Close the race window by moving the adding of the LED to leds_list to
after the led_init_core() call.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23101/">CVE-2026-23101 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23101">CVE-2026-23101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257768">SUSE bug 1257768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23102</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23102" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23102" ref_url="https://www.suse.com/security/cve/CVE-2026-23102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64/fpsimd: signal: Fix restoration of SVE context

When SME is supported, Restoring SVE signal context can go wrong in a
few ways, including placing the task into an invalid state where the
kernel may read from out-of-bounds memory (and may potentially take a
fatal fault) and/or may kill the task with a SIGKILL.

(1) Restoring a context with SVE_SIG_FLAG_SM set can place the task into
    an invalid state where SVCR.SM is set (and sve_state is non-NULL)
    but TIF_SME is clear, consequently resuting in out-of-bounds memory
    reads and/or killing the task with SIGKILL.

    This can only occur in unusual (but legitimate) cases where the SVE
    signal context has either been modified by userspace or was saved in
    the context of another task (e.g. as with CRIU), as otherwise the
    presence of an SVE signal context with SVE_SIG_FLAG_SM implies that
    TIF_SME is already set.

    While in this state, task_fpsimd_load() will NOT configure SMCR_ELx
    (leaving some arbitrary value configured in hardware) before
    restoring SVCR and attempting to restore the streaming mode SVE
    registers from memory via sve_load_state(). As the value of
    SMCR_ELx.LEN may be larger than the task's streaming SVE vector
    length, this may read memory outside of the task's allocated
    sve_state, reading unrelated data and/or triggering a fault.

    While this can result in secrets being loaded into streaming SVE
    registers, these values are never exposed. As TIF_SME is clear,
    fpsimd_bind_task_to_cpu() will configure CPACR_ELx.SMEN to trap EL0
    accesses to streaming mode SVE registers, so these cannot be
    accessed directly at EL0. As fpsimd_save_user_state() verifies the
    live vector length before saving (S)SVE state to memory, no secret
    values can be saved back to memory (and hence cannot be observed via
    ptrace, signals, etc).

    When the live vector length doesn't match the expected vector length
    for the task, fpsimd_save_user_state() will send a fatal SIGKILL
    signal to the task. Hence the task may be killed after executing
    userspace for some period of time.

(2) Restoring a context with SVE_SIG_FLAG_SM clear does not clear the
    task's SVCR.SM. If SVCR.SM was set prior to restoring the context,
    then the task will be left in streaming mode unexpectedly, and some
    register state will be combined inconsistently, though the task will
    be left in legitimate state from the kernel's PoV.

    This can only occur in unusual (but legitimate) cases where ptrace
    has been used to set SVCR.SM after entry to the sigreturn syscall,
    as syscall entry clears SVCR.SM.

    In these cases, the the provided SVE register data will be loaded
    into the task's sve_state using the non-streaming SVE vector length
    and the FPSIMD registers will be merged into this using the
    streaming SVE vector length.

Fix (1) by setting TIF_SME when setting SVCR.SM. This also requires
ensuring that the task's sme_state has been allocated, but as this could
contain live ZA state, it should not be zeroed. Fix (2) by clearing
SVCR.SM when restoring a SVE signal context with SVE_SIG_FLAG_SM clear.

For consistency, I've pulled the manipulation of SVCR, TIF_SVE, TIF_SME,
and fp_type earlier, immediately after the allocation of
sve_state/sme_state, before the restore of the actual register state.
This makes it easier to ensure that these are always modified
consistently, even if a fault is taken while reading the register data
from the signal context. I do not expect any software to depend on the
exact state restored when a fault is taken while reading the context.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23102/">CVE-2026-23102 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23102">CVE-2026-23102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257772">SUSE bug 1257772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23104</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23104" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23104" ref_url="https://www.suse.com/security/cve/CVE-2026-23104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix devlink reload call trace

Commit 4da71a77fc3b ("ice: read internal temperature sensor") introduced
internal temperature sensor reading via HWMON. ice_hwmon_init() was added
to ice_init_feature() and ice_hwmon_exit() was added to ice_remove(). As a
result if devlink reload is used to reinit the device and then the driver
is removed, a call trace can occur.

BUG: unable to handle page fault for address: ffffffffc0fd4b5d
Call Trace:
 string+0x48/0xe0
 vsnprintf+0x1f9/0x650
 sprintf+0x62/0x80
 name_show+0x1f/0x30
 dev_attr_show+0x19/0x60

The call trace repeats approximately every 10 minutes when system
monitoring tools (e.g., sadc) attempt to read the orphaned hwmon sysfs
attributes that reference freed module memory.

The sequence is:
1. Driver load, ice_hwmon_init() gets called from ice_init_feature()
2. Devlink reload down, flow does not call ice_remove()
3. Devlink reload up, ice_hwmon_init() gets called from
   ice_init_feature() resulting in a second instance
4. Driver unload, ice_hwmon_exit() called from ice_remove() leaving the
   first hwmon instance orphaned with dangling pointer

Fix this by moving ice_hwmon_exit() from ice_remove() to
ice_deinit_features() to ensure proper cleanup symmetry with
ice_hwmon_init().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23104/">CVE-2026-23104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23104">CVE-2026-23104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257763">SUSE bug 1257763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23105</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23105" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23105" ref_url="https://www.suse.com/security/cve/CVE-2026-23105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag

This is more of a preventive patch to make the code more consistent and
to prevent possible exploits that employ child qlen manipulations on qfq.
use cl_is_active instead of relying on the child qdisc's qlen to determine
class activation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23105/">CVE-2026-23105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23105">CVE-2026-23105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257775">SUSE bug 1257775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23107</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23107" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23107" ref_url="https://www.suse.com/security/cve/CVE-2026-23107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA

The code to restore a ZA context doesn't attempt to allocate the task's
sve_state before setting TIF_SME. Consequently, restoring a ZA context
can place a task into an invalid state where TIF_SME is set but the
task's sve_state is NULL.

In legitimate but uncommon cases where the ZA signal context was NOT
created by the kernel in the context of the same task (e.g. if the task
is saved/restored with something like CRIU), we have no guarantee that
sve_state had been allocated previously. In these cases, userspace can
enter streaming mode without trapping while sve_state is NULL, causing a
later NULL pointer dereference when the kernel attempts to store the
register state:

| # ./sigreturn-za
| Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
| Mem abort info:
|   ESR = 0x0000000096000046
|   EC = 0x25: DABT (current EL), IL = 32 bits
|   SET = 0, FnV = 0
|   EA = 0, S1PTW = 0
|   FSC = 0x06: level 2 translation fault
| Data abort info:
|   ISV = 0, ISS = 0x00000046, ISS2 = 0x00000000
|   CM = 0, WnR = 1, TnD = 0, TagAccess = 0
|   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
| user pgtable: 4k pages, 52-bit VAs, pgdp=0000000101f47c00
| [0000000000000000] pgd=08000001021d8403, p4d=0800000102274403, pud=0800000102275403, pmd=0000000000000000
| Internal error: Oops: 0000000096000046 [#1]  SMP
| Modules linked in:
| CPU: 0 UID: 0 PID: 153 Comm: sigreturn-za Not tainted 6.19.0-rc1 #1 PREEMPT
| Hardware name: linux,dummy-virt (DT)
| pstate: 214000c9 (nzCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
| pc : sve_save_state+0x4/0xf0
| lr : fpsimd_save_user_state+0xb0/0x1c0
| sp : ffff80008070bcc0
| x29: ffff80008070bcc0 x28: fff00000c1ca4c40 x27: 63cfa172fb5cf658
| x26: fff00000c1ca5228 x25: 0000000000000000 x24: 0000000000000000
| x23: 0000000000000000 x22: fff00000c1ca4c40 x21: fff00000c1ca4c40
| x20: 0000000000000020 x19: fff00000ff6900f0 x18: 0000000000000000
| x17: fff05e8e0311f000 x16: 0000000000000000 x15: 028fca8f3bdaf21c
| x14: 0000000000000212 x13: fff00000c0209f10 x12: 0000000000000020
| x11: 0000000000200b20 x10: 0000000000000000 x9 : fff00000ff69dcc0
| x8 : 00000000000003f2 x7 : 0000000000000001 x6 : fff00000c1ca5b48
| x5 : fff05e8e0311f000 x4 : 0000000008000000 x3 : 0000000000000000
| x2 : 0000000000000001 x1 : fff00000c1ca5970 x0 : 0000000000000440
| Call trace:
|  sve_save_state+0x4/0xf0 (P)
|  fpsimd_thread_switch+0x48/0x198
|  __switch_to+0x20/0x1c0
|  __schedule+0x36c/0xce0
|  schedule+0x34/0x11c
|  exit_to_user_mode_loop+0x124/0x188
|  el0_interrupt+0xc8/0xd8
|  __el0_irq_handler_common+0x18/0x24
|  el0t_64_irq_handler+0x10/0x1c
|  el0t_64_irq+0x198/0x19c
| Code: 54000040 d51b4408 d65f03c0 d503245f (e5bb5800)
| ---[ end trace 0000000000000000 ]---

Fix this by having restore_za_context() ensure that the task's sve_state
is allocated, matching what we do when taking an SME trap. Any live
SVE/SSVE state (which is restored earlier from a separate signal
context) must be preserved, and hence this is not zeroed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23107/">CVE-2026-23107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23107">CVE-2026-23107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257762">SUSE bug 1257762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23108</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23108" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23108" ref_url="https://www.suse.com/security/cve/CVE-2026-23108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak

Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb:
gs_usb_receive_bulk_callback(): fix URB memory leak").

In usb_8dev_open() -&gt; usb_8dev_start(), the URBs for USB-in transfers are
allocated, added to the priv-&gt;rx_submitted anchor and submitted. In the
complete callback usb_8dev_read_bulk_callback(), the URBs are processed and
resubmitted. In usb_8dev_close() -&gt; unlink_all_urbs() the URBs are freed by
calling usb_kill_anchored_urbs(&amp;priv-&gt;rx_submitted).

However, this does not take into account that the USB framework unanchors
the URB before the complete function is called. This means that once an
in-URB has been completed, it is no longer anchored and is ultimately not
released in usb_kill_anchored_urbs().

Fix the memory leak by anchoring the URB in the
usb_8dev_read_bulk_callback() to the priv-&gt;rx_submitted anchor.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23108/">CVE-2026-23108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23108">CVE-2026-23108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257770">SUSE bug 1257770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23110</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23110" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23110" ref_url="https://www.suse.com/security/cve/CVE-2026-23110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Wake up the error handler when final completions race against each other

The fragile ordering between marking commands completed or failed so
that the error handler only wakes when the last running command
completes or times out has race conditions. These race conditions can
cause the SCSI layer to fail to wake the error handler, leaving I/O
through the SCSI host stuck as the error state cannot advance.

First, there is an memory ordering issue within scsi_dec_host_busy().
The write which clears SCMD_STATE_INFLIGHT may be reordered with reads
counting in scsi_host_busy(). While the local CPU will see its own
write, reordering can allow other CPUs in scsi_dec_host_busy() or
scsi_eh_inc_host_failed() to see a raised busy count, causing no CPU to
see a host busy equal to the host_failed count.

This race condition can be prevented with a memory barrier on the error
path to force the write to be visible before counting host busy
commands.

Second, there is a general ordering issue with scsi_eh_inc_host_failed(). By
counting busy commands before incrementing host_failed, it can race with a
final command in scsi_dec_host_busy(), such that scsi_dec_host_busy() does
not see host_failed incremented but scsi_eh_inc_host_failed() counts busy
commands before SCMD_STATE_INFLIGHT is cleared by scsi_dec_host_busy(),
resulting in neither waking the error handler task.

This needs the call to scsi_host_busy() to be moved after host_failed is
incremented to close the race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23110/">CVE-2026-23110 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23110">CVE-2026-23110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257761">SUSE bug 1257761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23111</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23111" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23111" ref_url="https://www.suse.com/security/cve/CVE-2026-23111" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6570" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1187-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1279-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1284-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21004-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21006-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21071-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()

nft_map_catchall_activate() has an inverted element activity check
compared to its non-catchall counterpart nft_mapelem_activate() and
compared to what is logically required.

nft_map_catchall_activate() is called from the abort path to re-activate
catchall map elements that were deactivated during a failed transaction.
It should skip elements that are already active (they don't need
re-activation) and process elements that are inactive (they need to be
restored). Instead, the current code does the opposite: it skips inactive
elements and processes active ones.

Compare the non-catchall activate callback, which is correct:

  nft_mapelem_activate():
    if (nft_set_elem_active(ext, iter-&gt;genmask))
        return 0;   /* skip active, process inactive */

With the buggy catchall version:

  nft_map_catchall_activate():
    if (!nft_set_elem_active(ext, genmask))
        continue;   /* skip inactive, process active */

The consequence is that when a DELSET operation is aborted,
nft_setelem_data_activate() is never called for the catchall element.
For NFT_GOTO verdict elements, this means nft_data_hold() is never
called to restore the chain-&gt;use reference count. Each abort cycle
permanently decrements chain-&gt;use. Once chain-&gt;use reaches zero,
DELCHAIN succeeds and frees the chain while catchall verdict elements
still reference it, resulting in a use-after-free.

This is exploitable for local privilege escalation from an unprivileged
user via user namespaces + nftables on distributions that enable
CONFIG_USER_NS and CONFIG_NF_TABLES.

Fix by removing the negation so the check matches nft_mapelem_activate():
skip active elements, process inactive ones.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23111/">CVE-2026-23111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23111">CVE-2026-23111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258181">SUSE bug 1258181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258183">SUSE bug 1258183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056306" comment="kernel-livepatch-6_12_0-160000_26-rt-2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056309" comment="kernel-livepatch-6_12_0-160000_5-rt-7-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056310" comment="kernel-livepatch-6_12_0-160000_6-rt-6-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056311" comment="kernel-livepatch-6_12_0-160000_7-rt-4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056308" comment="kernel-livepatch-6_12_0-160000_8-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056330" comment="kernel-livepatch-6_12_0-160000_9-default-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056307" comment="kernel-livepatch-6_12_0-160000_9-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23112</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23112" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23112" ref_url="https://www.suse.com/security/cve/CVE-2026-23112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec

nvmet_tcp_build_pdu_iovec() could walk past cmd-&gt;req.sg when a PDU
length or offset exceeds sg_cnt and then use bogus sg-&gt;length/offset
values, leading to _copy_to_iter() GPF/KASAN. Guard sg_idx, remaining
entries, and sg-&gt;length/offset before building the bvec.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23112/">CVE-2026-23112 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23112">CVE-2026-23112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258184">SUSE bug 1258184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23116</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23116" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23116" ref_url="https://www.suse.com/security/cve/CVE-2026-23116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu

For i.MX8MQ platform, the ADB in the VPUMIX domain has no separate reset
and clock enable bits, but is ungated and reset together with the VPUs.
So we can't reset G1 or G2 separately, it may led to the system hang.
Remove rst_mask and clk_mask of imx8mq_vpu_blk_ctl_domain_data.
Let imx8mq_vpu_power_notifier() do really vpu reset.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23116/">CVE-2026-23116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23116">CVE-2026-23116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258277">SUSE bug 1258277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23119</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23119" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23119" ref_url="https://www.suse.com/security/cve/CVE-2026-23119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: provide a net pointer to __skb_flow_dissect()

After 3cbf4ffba5ee ("net: plumb network namespace into __skb_flow_dissect")
we have to provide a net pointer to __skb_flow_dissect(),
either via skb-&gt;dev, skb-&gt;sk, or a user provided pointer.

In the following case, syzbot was able to cook a bare skb.

WARNING: net/core/flow_dissector.c:1131 at __skb_flow_dissect+0xb57/0x68b0 net/core/flow_dissector.c:1131, CPU#1: syz.2.1418/11053
Call Trace:
 &lt;TASK&gt;
  bond_flow_dissect drivers/net/bonding/bond_main.c:4093 [inline]
  __bond_xmit_hash+0x2d7/0xba0 drivers/net/bonding/bond_main.c:4157
  bond_xmit_hash_xdp drivers/net/bonding/bond_main.c:4208 [inline]
  bond_xdp_xmit_3ad_xor_slave_get drivers/net/bonding/bond_main.c:5139 [inline]
  bond_xdp_get_xmit_slave+0x1fd/0x710 drivers/net/bonding/bond_main.c:5515
  xdp_master_redirect+0x13f/0x2c0 net/core/filter.c:4388
  bpf_prog_run_xdp include/net/xdp.h:700 [inline]
  bpf_test_run+0x6b2/0x7d0 net/bpf/test_run.c:421
  bpf_prog_test_run_xdp+0x795/0x10e0 net/bpf/test_run.c:1390
  bpf_prog_test_run+0x2c7/0x340 kernel/bpf/syscall.c:4703
  __sys_bpf+0x562/0x860 kernel/bpf/syscall.c:6182
  __do_sys_bpf kernel/bpf/syscall.c:6274 [inline]
  __se_sys_bpf kernel/bpf/syscall.c:6272 [inline]
  __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:6272
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xec/0xf80 arch/x86/entry/syscall_64.c:94
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23119/">CVE-2026-23119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23119">CVE-2026-23119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258273">SUSE bug 1258273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23121</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23121" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23121" ref_url="https://www.suse.com/security/cve/CVE-2026-23121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mISDN: annotate data-race around dev-&gt;work

dev-&gt;work can re read locklessly in mISDN_read()
and mISDN_poll(). Add READ_ONCE()/WRITE_ONCE() annotations.

BUG: KCSAN: data-race in mISDN_ioctl / mISDN_read

write to 0xffff88812d848280 of 4 bytes by task 10864 on cpu 1:
  misdn_add_timer drivers/isdn/mISDN/timerdev.c:175 [inline]
  mISDN_ioctl+0x2fb/0x550 drivers/isdn/mISDN/timerdev.c:233
  vfs_ioctl fs/ioctl.c:51 [inline]
  __do_sys_ioctl fs/ioctl.c:597 [inline]
  __se_sys_ioctl+0xce/0x140 fs/ioctl.c:583
  __x64_sys_ioctl+0x43/0x50 fs/ioctl.c:583
  x64_sys_call+0x14b0/0x3000 arch/x86/include/generated/asm/syscalls_64.h:17
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xd8/0x2c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

read to 0xffff88812d848280 of 4 bytes by task 10857 on cpu 0:
  mISDN_read+0x1f2/0x470 drivers/isdn/mISDN/timerdev.c:112
  do_loop_readv_writev fs/read_write.c:847 [inline]
  vfs_readv+0x3fb/0x690 fs/read_write.c:1020
  do_readv+0xe7/0x210 fs/read_write.c:1080
  __do_sys_readv fs/read_write.c:1165 [inline]
  __se_sys_readv fs/read_write.c:1162 [inline]
  __x64_sys_readv+0x45/0x50 fs/read_write.c:1162
  x64_sys_call+0x2831/0x3000 arch/x86/include/generated/asm/syscalls_64.h:20
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xd8/0x2c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

value changed: 0x00000000 -&gt; 0x00000001
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23121/">CVE-2026-23121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23121">CVE-2026-23121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258309">SUSE bug 1258309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259135">SUSE bug 1259135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23123</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23123" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23123" ref_url="https://www.suse.com/security/cve/CVE-2026-23123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

interconnect: debugfs: initialize src_node and dst_node to empty strings

The debugfs_create_str() API assumes that the string pointer is either NULL
or points to valid kmalloc() memory. Leaving the pointer uninitialized can
cause problems.

Initialize src_node and dst_node to empty strings before creating the
debugfs entries to guarantee that reads and writes are safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23123/">CVE-2026-23123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23123">CVE-2026-23123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258276">SUSE bug 1258276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23128</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23128" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23128" ref_url="https://www.suse.com/security/cve/CVE-2026-23128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: Set __nocfi on swsusp_arch_resume()

A DABT is reported[1] on an android based system when resume from hiberate.
This happens because swsusp_arch_suspend_exit() is marked with SYM_CODE_*()
and does not have a CFI hash, but swsusp_arch_resume() will attempt to
verify the CFI hash when calling a copy of swsusp_arch_suspend_exit().

Given that there's an existing requirement that the entrypoint to
swsusp_arch_suspend_exit() is the first byte of the .hibernate_exit.text
section, we cannot fix this by marking swsusp_arch_suspend_exit() with
SYM_FUNC_*(). The simplest fix for now is to disable the CFI check in
swsusp_arch_resume().

Mark swsusp_arch_resume() as __nocfi to disable the CFI check.

[1]
[   22.991934][    T1] Unable to handle kernel paging request at virtual address 0000000109170ffc
[   22.991934][    T1] Mem abort info:
[   22.991934][    T1]   ESR = 0x0000000096000007
[   22.991934][    T1]   EC = 0x25: DABT (current EL), IL = 32 bits
[   22.991934][    T1]   SET = 0, FnV = 0
[   22.991934][    T1]   EA = 0, S1PTW = 0
[   22.991934][    T1]   FSC = 0x07: level 3 translation fault
[   22.991934][    T1] Data abort info:
[   22.991934][    T1]   ISV = 0, ISS = 0x00000007, ISS2 = 0x00000000
[   22.991934][    T1]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[   22.991934][    T1]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[   22.991934][    T1] [0000000109170ffc] user address but active_mm is swapper
[   22.991934][    T1] Internal error: Oops: 0000000096000007 [#1] PREEMPT SMP
[   22.991934][    T1] Dumping ftrace buffer:
[   22.991934][    T1]    (ftrace buffer empty)
[   22.991934][    T1] Modules linked in:
[   22.991934][    T1] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.6.98-android15-8-g0b1d2aee7fc3-dirty-4k #1 688c7060a825a3ac418fe53881730b355915a419
[   22.991934][    T1] Hardware name: Unisoc UMS9360-base Board (DT)
[   22.991934][    T1] pstate: 804000c5 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   22.991934][    T1] pc : swsusp_arch_resume+0x2ac/0x344
[   22.991934][    T1] lr : swsusp_arch_resume+0x294/0x344
[   22.991934][    T1] sp : ffffffc08006b960
[   22.991934][    T1] x29: ffffffc08006b9c0 x28: 0000000000000000 x27: 0000000000000000
[   22.991934][    T1] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000820
[   22.991934][    T1] x23: ffffffd0817e3000 x22: ffffffd0817e3000 x21: 0000000000000000
[   22.991934][    T1] x20: ffffff8089171000 x19: ffffffd08252c8c8 x18: ffffffc080061058
[   22.991934][    T1] x17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 0000000000000004
[   22.991934][    T1] x14: ffffff8178c88000 x13: 0000000000000006 x12: 0000000000000000
[   22.991934][    T1] x11: 0000000000000015 x10: 0000000000000001 x9 : ffffffd082533000
[   22.991934][    T1] x8 : 0000000109171000 x7 : 205b5d3433393139 x6 : 392e32322020205b
[   22.991934][    T1] x5 : 000000010916f000 x4 : 000000008164b000 x3 : ffffff808a4e0530
[   22.991934][    T1] x2 : ffffffd08058e784 x1 : 0000000082326000 x0 : 000000010a283000
[   22.991934][    T1] Call trace:
[   22.991934][    T1]  swsusp_arch_resume+0x2ac/0x344
[   22.991934][    T1]  hibernation_restore+0x158/0x18c
[   22.991934][    T1]  load_image_and_restore+0xb0/0xec
[   22.991934][    T1]  software_resume+0xf4/0x19c
[   22.991934][    T1]  software_resume_initcall+0x34/0x78
[   22.991934][    T1]  do_one_initcall+0xe8/0x370
[   22.991934][    T1]  do_initcall_level+0xc8/0x19c
[   22.991934][    T1]  do_initcalls+0x70/0xc0
[   22.991934][    T1]  do_basic_setup+0x1c/0x28
[   22.991934][    T1]  kernel_init_freeable+0xe0/0x148
[   22.991934][    T1]  kernel_init+0x20/0x1a8
[   22.991934][    T1]  ret_from_fork+0x10/0x20
[   22.991934][    T1] Code: a9400a61 f94013e0 f9438923 f9400a64 (b85fc110)

[catalin.marinas@arm.com: commit log updated by Mark Rutland]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23128/">CVE-2026-23128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23128">CVE-2026-23128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258298">SUSE bug 1258298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23129</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23129" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23129" ref_url="https://www.suse.com/security/cve/CVE-2026-23129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dpll: Prevent duplicate registrations

Modify the internal registration helpers dpll_xa_ref_{dpll,pin}_add()
to reject duplicate registration attempts.

Previously, if a caller attempted to register the same pin multiple
times (with the same ops, priv, and cookie) on the same device, the core
silently increments the reference count and return success. This behavior
is incorrect because if the caller makes these duplicate registrations
then for the first one dpll_pin_registration is allocated and for others
the associated dpll_pin_ref.refcount is incremented. During the first
unregistration the associated dpll_pin_registration is freed and for
others WARN is fired.

Fix this by updating the logic to return `-EEXIST` if a matching
registration is found to enforce a strict "register once" policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23129/">CVE-2026-23129 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23129">CVE-2026-23129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258299">SUSE bug 1258299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23131</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23131" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23131" ref_url="https://www.suse.com/security/cve/CVE-2026-23131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: hp-bioscfg: Fix kobject warnings for empty attribute names

The hp-bioscfg driver attempts to register kobjects with empty names when
the HP BIOS returns attributes with empty name strings. This causes
multiple kernel warnings:

  kobject: (00000000135fb5e6): attempted to be registered with empty name!
  WARNING: CPU: 14 PID: 3336 at lib/kobject.c:219 kobject_add_internal+0x2eb/0x310

Add validation in hp_init_bios_buffer_attribute() to check if the
attribute name is empty after parsing it from the WMI buffer. If empty,
log a debug message and skip registration of that attribute, allowing the
module to continue processing other valid attributes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23131/">CVE-2026-23131 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23131">CVE-2026-23131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258297">SUSE bug 1258297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23133</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23133" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23133" ref_url="https://www.suse.com/security/cve/CVE-2026-23133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath10k: fix dma_free_coherent() pointer

dma_alloc_coherent() allocates a DMA mapped buffer and stores the
addresses in XXX_unaligned fields.  Those should be reused when freeing
the buffer rather than the aligned addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23133/">CVE-2026-23133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23133">CVE-2026-23133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258249">SUSE bug 1258249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23135</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23135" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23135" ref_url="https://www.suse.com/security/cve/CVE-2026-23135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix dma_free_coherent() pointer

dma_alloc_coherent() allocates a DMA mapped buffer and stores the
addresses in XXX_unaligned fields.  Those should be reused when freeing
the buffer rather than the aligned addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23135/">CVE-2026-23135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23135">CVE-2026-23135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258245">SUSE bug 1258245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23136</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23136" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23136" ref_url="https://www.suse.com/security/cve/CVE-2026-23136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: reset sparse-read state in osd_fault()

When a fault occurs, the connection is abandoned, reestablished, and any
pending operations are retried. The OSD client tracks the progress of a
sparse-read reply using a separate state machine, largely independent of
the messenger's state.

If a connection is lost mid-payload or the sparse-read state machine
returns an error, the sparse-read state is not reset. The OSD client
will then interpret the beginning of a new reply as the continuation of
the old one. If this makes the sparse-read machinery enter a failure
state, it may never recover, producing loops like:

  libceph:  [0] got 0 extents
  libceph: data len 142248331 != extent len 0
  libceph: osd0 (1)...:6801 socket error on read
  libceph: data len 142248331 != extent len 0
  libceph: osd0 (1)...:6801 socket error on read

Therefore, reset the sparse-read state in osd_fault(), ensuring retries
start from a clean state.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23136/">CVE-2026-23136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23136">CVE-2026-23136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258303">SUSE bug 1258303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23137</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23137" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23137" ref_url="https://www.suse.com/security/cve/CVE-2026-23137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of: unittest: Fix memory leak in unittest_data_add()

In unittest_data_add(), if of_resolve_phandles() fails, the allocated
unittest_data is not freed, leading to a memory leak.

Fix this by using scope-based cleanup helper __free(kfree) for automatic
resource cleanup. This ensures unittest_data is automatically freed when
it goes out of scope in error paths.

For the success path, use retain_and_null_ptr() to transfer ownership
of the memory to the device tree and prevent double freeing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23137/">CVE-2026-23137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23137">CVE-2026-23137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258232">SUSE bug 1258232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23139</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23139" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23139" ref_url="https://www.suse.com/security/cve/CVE-2026-23139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conncount: update last_gc only when GC has been performed

Currently last_gc is being updated everytime a new connection is
tracked, that means that it is updated even if a GC wasn't performed.
With a sufficiently high packet rate, it is possible to always bypass
the GC, causing the list to grow infinitely.

Update the last_gc value only when a GC has been actually performed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23139/">CVE-2026-23139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23139">CVE-2026-23139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258304">SUSE bug 1258304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23141</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23141" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23141" ref_url="https://www.suse.com/security/cve/CVE-2026-23141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: send: check for inline extents in range_is_hole_in_parent()

Before accessing the disk_bytenr field of a file extent item we need
to check if we are dealing with an inline extent.
This is because for inline extents their data starts at the offset of
the disk_bytenr field. So accessing the disk_bytenr
means we are accessing inline data or in case the inline data is less
than 8 bytes we can actually cause an invalid
memory access if this inline extent item is the first item in the leaf
or access metadata from other items.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23141/">CVE-2026-23141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23141">CVE-2026-23141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258377">SUSE bug 1258377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23142</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23142" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23142" ref_url="https://www.suse.com/security/cve/CVE-2026-23142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/sysfs-scheme: cleanup access_pattern subdirs on scheme dir setup failure

When a DAMOS-scheme DAMON sysfs directory setup fails after setup of
access_pattern/ directory, subdirectories of access_pattern/ directory are
not cleaned up.  As a result, DAMON sysfs interface is nearly broken until
the system reboots, and the memory for the unremoved directory is leaked.

Cleanup the directories under such failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23142/">CVE-2026-23142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23142">CVE-2026-23142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258289">SUSE bug 1258289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23144</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23144" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23144" ref_url="https://www.suse.com/security/cve/CVE-2026-23144" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/sysfs: cleanup attrs subdirs on context dir setup failure

When a context DAMON sysfs directory setup is failed after setup of attrs/
directory, subdirectories of attrs/ directory are not cleaned up.  As a
result, DAMON sysfs interface is nearly broken until the system reboots,
and the memory for the unremoved directory is leaked.

Cleanup the directories under such failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23144/">CVE-2026-23144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23144">CVE-2026-23144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258290">SUSE bug 1258290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23145</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23145" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23145" ref_url="https://www.suse.com/security/cve/CVE-2026-23145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref

The error branch for ext4_xattr_inode_update_ref forget to release the
refcount for iloc.bh. Find this when review code.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23145/">CVE-2026-23145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23145">CVE-2026-23145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258326">SUSE bug 1258326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23146</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23146" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23146" ref_url="https://www.suse.com/security/cve/CVE-2026-23146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work

hci_uart_set_proto() sets HCI_UART_PROTO_INIT before calling
hci_uart_register_dev(), which calls proto-&gt;open() to initialize
hu-&gt;priv. However, if a TTY write wakeup occurs during this window,
hci_uart_tx_wakeup() may schedule write_work before hu-&gt;priv is
initialized, leading to a NULL pointer dereference in
hci_uart_write_work() when proto-&gt;dequeue() accesses hu-&gt;priv.

The race condition is:

  CPU0                              CPU1
  ----                              ----
  hci_uart_set_proto()
    set_bit(HCI_UART_PROTO_INIT)
    hci_uart_register_dev()
                                    tty write wakeup
                                      hci_uart_tty_wakeup()
                                        hci_uart_tx_wakeup()
                                          schedule_work(&amp;hu-&gt;write_work)
      proto-&gt;open(hu)
        // initializes hu-&gt;priv
                                    hci_uart_write_work()
                                      hci_uart_dequeue()
                                        proto-&gt;dequeue(hu)
                                          // accesses hu-&gt;priv (NULL!)

Fix this by moving set_bit(HCI_UART_PROTO_INIT) after proto-&gt;open()
succeeds, ensuring hu-&gt;priv is initialized before any work can be
scheduled.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23146/">CVE-2026-23146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23146">CVE-2026-23146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258234">SUSE bug 1258234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23148</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23148" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23148" ref_url="https://www.suse.com/security/cve/CVE-2026-23148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: fix race in nvmet_bio_done() leading to NULL pointer dereference

There is a race condition in nvmet_bio_done() that can cause a NULL
pointer dereference in blk_cgroup_bio_start():

1. nvmet_bio_done() is called when a bio completes
2. nvmet_req_complete() is called, which invokes req-&gt;ops-&gt;queue_response(req)
3. The queue_response callback can re-queue and re-submit the same request
4. The re-submission reuses the same inline_bio from nvmet_req
5. Meanwhile, nvmet_req_bio_put() (called after nvmet_req_complete)
   invokes bio_uninit() for inline_bio, which sets bio-&gt;bi_blkg to NULL
6. The re-submitted bio enters submit_bio_noacct_nocheck()
7. blk_cgroup_bio_start() dereferences bio-&gt;bi_blkg, causing a crash:

  BUG: kernel NULL pointer dereference, address: 0000000000000028
  #PF: supervisor read access in kernel mode
  RIP: 0010:blk_cgroup_bio_start+0x10/0xd0
  Call Trace:
   submit_bio_noacct_nocheck+0x44/0x250
   nvmet_bdev_execute_rw+0x254/0x370 [nvmet]
   process_one_work+0x193/0x3c0
   worker_thread+0x281/0x3a0

Fix this by reordering nvmet_bio_done() to call nvmet_req_bio_put()
BEFORE nvmet_req_complete(). This ensures the bio is cleaned up before
the request can be re-submitted, preventing the race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23148/">CVE-2026-23148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23148">CVE-2026-23148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258258">SUSE bug 1258258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23150</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23150" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23150" ref_url="https://www.suse.com/security/cve/CVE-2026-23150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: llcp: Fix memleak in nfc_llcp_send_ui_frame().

syzbot reported various memory leaks related to NFC, struct
nfc_llcp_sock, sk_buff, nfc_dev, etc. [0]

The leading log hinted that nfc_llcp_send_ui_frame() failed
to allocate skb due to sock_error(sk) being -ENXIO.

ENXIO is set by nfc_llcp_socket_release() when struct
nfc_llcp_local is destroyed by local_cleanup().

The problem is that there is no synchronisation between
nfc_llcp_send_ui_frame() and local_cleanup(), and skb
could be put into local-&gt;tx_queue after it was purged in
local_cleanup():

  CPU1                          CPU2
  ----                          ----
  nfc_llcp_send_ui_frame()      local_cleanup()
  |- do {                       '
     |- pdu = nfc_alloc_send_skb(..., &amp;err)
     |                          .
     |                          |- nfc_llcp_socket_release(local, false, ENXIO);
     |                          |- skb_queue_purge(&amp;local-&gt;tx_queue);      |
     |                          '                                          |
     |- skb_queue_tail(&amp;local-&gt;tx_queue, pdu);                             |
    ...                                                                    |
     |- pdu = nfc_alloc_send_skb(..., &amp;err)                                |
                                       ^._________________________________.'

local_cleanup() is called for struct nfc_llcp_local only
after nfc_llcp_remove_local() unlinks it from llcp_devices.

If we hold local-&gt;tx_queue.lock then, we can synchronise
the thread and nfc_llcp_send_ui_frame().

Let's do that and check list_empty(&amp;local-&gt;list) before
queuing skb to local-&gt;tx_queue in nfc_llcp_send_ui_frame().

[0]:
[   56.074943][ T6096] llcp: nfc_llcp_send_ui_frame: Could not allocate PDU (error=-6)
[   64.318868][ T5813] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff8881272f6800 (size 1024):
  comm "syz.0.17", pid 6096, jiffies 4294942766
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    27 00 03 40 00 00 00 00 00 00 00 00 00 00 00 00  '..@............
  backtrace (crc da58d84d):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4979 [inline]
    slab_alloc_node mm/slub.c:5284 [inline]
    __do_kmalloc_node mm/slub.c:5645 [inline]
    __kmalloc_noprof+0x3e3/0x6b0 mm/slub.c:5658
    kmalloc_noprof include/linux/slab.h:961 [inline]
    sk_prot_alloc+0x11a/0x1b0 net/core/sock.c:2239
    sk_alloc+0x36/0x360 net/core/sock.c:2295
    nfc_llcp_sock_alloc+0x37/0x130 net/nfc/llcp_sock.c:979
    llcp_sock_create+0x71/0xd0 net/nfc/llcp_sock.c:1044
    nfc_sock_create+0xc9/0xf0 net/nfc/af_nfc.c:31
    __sock_create+0x1a9/0x340 net/socket.c:1605
    sock_create net/socket.c:1663 [inline]
    __sys_socket_create net/socket.c:1700 [inline]
    __sys_socket+0xb9/0x1a0 net/socket.c:1747
    __do_sys_socket net/socket.c:1761 [inline]
    __se_sys_socket net/socket.c:1759 [inline]
    __x64_sys_socket+0x1b/0x30 net/socket.c:1759
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xfa0 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

BUG: memory leak
unreferenced object 0xffff88810fbd9800 (size 240):
  comm "syz.0.17", pid 6096, jiffies 4294942850
  hex dump (first 32 bytes):
    68 f0 ff 08 81 88 ff ff 68 f0 ff 08 81 88 ff ff  h.......h.......
    00 00 00 00 00 00 00 00 00 68 2f 27 81 88 ff ff  .........h/'....
  backtrace (crc 6cc652b1):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4979 [inline]
    slab_alloc_node mm/slub.c:5284 [inline]
    kmem_cache_alloc_node_noprof+0x36f/0x5e0 mm/slub.c:5336
    __alloc_skb+0x203/0x240 net/core/skbuff.c:660
    alloc_skb include/linux/skbuff.h:1383 [inline]
    alloc_skb_with_frags+0x69/0x3f0 net/core/sk
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23150/">CVE-2026-23150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23150">CVE-2026-23150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258354">SUSE bug 1258354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23151</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23151" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23151" ref_url="https://www.suse.com/security/cve/CVE-2026-23151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Fix memory leak in set_ssp_complete

Fix memory leak in set_ssp_complete() where mgmt_pending_cmd structures
are not freed after being removed from the pending list.

Commit 302a1f674c00 ("Bluetooth: MGMT: Fix possible UAFs") replaced
mgmt_pending_foreach() calls with individual command handling but missed
adding mgmt_pending_free() calls in both error and success paths of
set_ssp_complete(). Other completion functions like set_le_complete()
were fixed correctly in the same commit.

This causes a memory leak of the mgmt_pending_cmd structure and its
associated parameter data for each SSP command that completes.

Add the missing mgmt_pending_free(cmd) calls in both code paths to fix
the memory leak. Also fix the same issue in set_advertising_complete().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23151/">CVE-2026-23151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23151">CVE-2026-23151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258237">SUSE bug 1258237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23152</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23152" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23152" ref_url="https://www.suse.com/security/cve/CVE-2026-23152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: correctly decode TTLM with default link map

TID-To-Link Mapping (TTLM) elements do not contain any link mapping
presence indicator if a default mapping is used and parsing needs to be
skipped.

Note that access points should not explicitly report an advertised TTLM
with a default mapping as that is the implied mapping if the element is
not included, this is even the case when switching back to the default
mapping. However, mac80211 would incorrectly parse the frame and would
also read one byte beyond the end of the element.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23152/">CVE-2026-23152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23152">CVE-2026-23152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258252">SUSE bug 1258252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23154</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23154" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23154" ref_url="https://www.suse.com/security/cve/CVE-2026-23154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix segmentation of forwarding fraglist GRO

This patch enhances GSO segment handling by properly checking
the SKB_GSO_DODGY flag for frag_list GSO packets, addressing
low throughput issues observed when a station accesses IPv4
servers via hotspots with an IPv6-only upstream interface.

Specifically, it fixes a bug in GSO segmentation when forwarding
GRO packets containing a frag_list. The function skb_segment_list
cannot correctly process GRO skbs that have been converted by XLAT,
since XLAT only translates the header of the head skb. Consequently,
skbs in the frag_list may remain untranslated, resulting in protocol
inconsistencies and reduced throughput.

To address this, the patch explicitly sets the SKB_GSO_DODGY flag
for GSO packets in XLAT's IPv4/IPv6 protocol translation helpers
(bpf_skb_proto_4_to_6 and bpf_skb_proto_6_to_4). This marks GSO
packets as potentially modified after protocol translation. As a
result, GSO segmentation will avoid using skb_segment_list and
instead falls back to skb_segment for packets with the SKB_GSO_DODGY
flag. This ensures that only safe and fully translated frag_list
packets are processed by skb_segment_list, resolving protocol
inconsistencies and improving throughput when forwarding GRO packets
converted by XLAT.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23154/">CVE-2026-23154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23154">CVE-2026-23154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258286">SUSE bug 1258286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23155</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23155" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23155" ref_url="https://www.suse.com/security/cve/CVE-2026-23155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: gs_usb: gs_usb_receive_bulk_callback(): fix error message

Sinc commit 79a6d1bfe114 ("can: gs_usb: gs_usb_receive_bulk_callback():
unanchor URL on usb_submit_urb() error") a failing resubmit URB will print
an info message.

In the case of a short read where netdev has not yet been assigned,
initialize as NULL to avoid dereferencing an undefined value. Also report
the error value of the failed resubmit.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23155/">CVE-2026-23155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23155">CVE-2026-23155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258313">SUSE bug 1258313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258315">SUSE bug 1258315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23156</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23156" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23156" ref_url="https://www.suse.com/security/cve/CVE-2026-23156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efivarfs: fix error propagation in efivar_entry_get()

efivar_entry_get() always returns success even if the underlying
__efivar_entry_get() fails, masking errors.

This may result in uninitialized heap memory being copied to userspace
in the efivarfs_file_read() path.

Fix it by returning the error from __efivar_entry_get().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23156/">CVE-2026-23156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23156">CVE-2026-23156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258317">SUSE bug 1258317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23157</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23157" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23157" ref_url="https://www.suse.com/security/cve/CVE-2026-23157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not strictly require dirty metadata threshold for metadata writepages

[BUG]
There is an internal report that over 1000 processes are
waiting at the io_schedule_timeout() of balance_dirty_pages(), causing
a system hang and trigger a kernel coredump.

The kernel is v6.4 kernel based, but the root problem still applies to
any upstream kernel before v6.18.

[CAUSE]
From Jan Kara for his wisdom on the dirty page balance behavior first.

  This cgroup dirty limit was what was actually playing the role here
  because the cgroup had only a small amount of memory and so the dirty
  limit for it was something like 16MB.

  Dirty throttling is responsible for enforcing that nobody can dirty
  (significantly) more dirty memory than there's dirty limit. Thus when
  a task is dirtying pages it periodically enters into balance_dirty_pages()
  and we let it sleep there to slow down the dirtying.

  When the system is over dirty limit already (either globally or within
  a cgroup of the running task), we will not let the task exit from
  balance_dirty_pages() until the number of dirty pages drops below the
  limit.

  So in this particular case, as I already mentioned, there was a cgroup
  with relatively small amount of memory and as a result with dirty limit
  set at 16MB. A task from that cgroup has dirtied about 28MB worth of
  pages in btrfs btree inode and these were practically the only dirty
  pages in that cgroup.

So that means the only way to reduce the dirty pages of that cgroup is
to writeback the dirty pages of btrfs btree inode, and only after that
those processes can exit balance_dirty_pages().

Now back to the btrfs part, btree_writepages() is responsible for
writing back dirty btree inode pages.

The problem here is, there is a btrfs internal threshold that if the
btree inode's dirty bytes are below the 32M threshold, it will not
do any writeback.

This behavior is to batch as much metadata as possible so we won't write
back those tree blocks and then later re-COW them again for another
modification.

This internal 32MiB is higher than the existing dirty page size (28MiB),
meaning no writeback will happen, causing a deadlock between btrfs and
cgroup:

- Btrfs doesn't want to write back btree inode until more dirty pages

- Cgroup/MM doesn't want more dirty pages for btrfs btree inode
  Thus any process touching that btree inode is put into sleep until
  the number of dirty pages is reduced.

Thanks Jan Kara a lot for the analysis of the root cause.

[ENHANCEMENT]
Since kernel commit b55102826d7d ("btrfs: set AS_KERNEL_FILE on the
btree_inode"), btrfs btree inode pages will only be charged to the root
cgroup which should have a much larger limit than btrfs' 32MiB
threshold.
So it should not affect newer kernels.

But for all current LTS kernels, they are all affected by this problem,
and backporting the whole AS_KERNEL_FILE may not be a good idea.

Even for newer kernels I still think it's a good idea to get
rid of the internal threshold at btree_writepages(), since for most cases
cgroup/MM has a better view of full system memory usage than btrfs' fixed
threshold.

For internal callers using btrfs_btree_balance_dirty() since that
function is already doing internal threshold check, we don't need to
bother them.

But for external callers of btree_writepages(), just respect their
requests and write back whatever they want, ignoring the internal
btrfs threshold to avoid such deadlock on btree inode dirty page
balancing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23157/">CVE-2026-23157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23157">CVE-2026-23157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258376">SUSE bug 1258376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23158</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23158" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23158" ref_url="https://www.suse.com/security/cve/CVE-2026-23158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: virtuser: fix UAF in configfs release path

The gpio-virtuser configfs release path uses guard(mutex) to protect
the device structure. However, the device is freed before the guard
cleanup runs, causing mutex_unlock() to operate on freed memory.

Specifically, gpio_virtuser_device_config_group_release() destroys
the mutex and frees the device while still inside the guard(mutex)
scope. When the function returns, the guard cleanup invokes
mutex_unlock(&amp;dev-&gt;lock), resulting in a slab use-after-free.

Limit the mutex lifetime by using a scoped_guard() only around the
activation check, so that the lock is released before mutex_destroy()
and kfree() are called.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23158/">CVE-2026-23158 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23158">CVE-2026-23158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258323">SUSE bug 1258323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23161</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23161" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23161" ref_url="https://www.suse.com/security/cve/CVE-2026-23161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/shmem, swap: fix race of truncate and swap entry split

The helper for shmem swap freeing is not handling the order of swap
entries correctly.  It uses xa_cmpxchg_irq to erase the swap entry, but it
gets the entry order before that using xa_get_order without lock
protection, and it may get an outdated order value if the entry is split
or changed in other ways after the xa_get_order and before the
xa_cmpxchg_irq.

And besides, the order could grow and be larger than expected, and cause
truncation to erase data beyond the end border.  For example, if the
target entry and following entries are swapped in or freed, then a large
folio was added in place and swapped out, using the same entry, the
xa_cmpxchg_irq will still succeed, it's very unlikely to happen though.

To fix that, open code the Xarray cmpxchg and put the order retrieval and
value checking in the same critical section.  Also, ensure the order won't
exceed the end border, skip it if the entry goes across the border.

Skipping large swap entries crosses the end border is safe here.  Shmem
truncate iterates the range twice, in the first iteration,
find_lock_entries already filtered such entries, and shmem will swapin the
entries that cross the end border and partially truncate the folio (split
the folio or at least zero part of it).  So in the second loop here, if we
see a swap entry that crosses the end order, it must at least have its
content erased already.

I observed random swapoff hangs and kernel panics when stress testing
ZSWAP with shmem.  After applying this patch, all problems are gone.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23161/">CVE-2026-23161 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23161">CVE-2026-23161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258355">SUSE bug 1258355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259134">SUSE bug 1259134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23163</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23163" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23163" ref_url="https://www.suse.com/security/cve/CVE-2026-23163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix NULL pointer dereference in amdgpu_gmc_filter_faults_remove

On APUs such as Raven and Renoir (GC 9.1.0, 9.2.2, 9.3.0), the ih1 and
ih2 interrupt ring buffers are not initialized. This is by design, as
these secondary IH rings are only available on discrete GPUs. See
vega10_ih_sw_init() which explicitly skips ih1/ih2 initialization when
AMD_IS_APU is set.

However, amdgpu_gmc_filter_faults_remove() unconditionally uses ih1 to
get the timestamp of the last interrupt entry. When retry faults are
enabled on APUs (noretry=0), this function is called from the SVM page
fault recovery path, resulting in a NULL pointer dereference when
amdgpu_ih_decode_iv_ts_helper() attempts to access ih-&gt;ring[].

The crash manifests as:

  BUG: kernel NULL pointer dereference, address: 0000000000000004
  RIP: 0010:amdgpu_ih_decode_iv_ts_helper+0x22/0x40 [amdgpu]
  Call Trace:
   amdgpu_gmc_filter_faults_remove+0x60/0x130 [amdgpu]
   svm_range_restore_pages+0xae5/0x11c0 [amdgpu]
   amdgpu_vm_handle_fault+0xc8/0x340 [amdgpu]
   gmc_v9_0_process_interrupt+0x191/0x220 [amdgpu]
   amdgpu_irq_dispatch+0xed/0x2c0 [amdgpu]
   amdgpu_ih_process+0x84/0x100 [amdgpu]

This issue was exposed by commit 1446226d32a4 ("drm/amdgpu: Remove GC HW
IP 9.3.0 from noretry=1") which changed the default for Renoir APU from
noretry=1 to noretry=0, enabling retry fault handling and thus
exercising the buggy code path.

Fix this by adding a check for ih1.ring_size before attempting to use
it. Also restore the soft_ih support from commit dd299441654f ("drm/amdgpu:
Rework retry fault removal").  This is needed if the hardware doesn't
support secondary HW IH rings.

v2: additional updates (Alex)

(cherry picked from commit 6ce8d536c80aa1f059e82184f0d1994436b1d526)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23163/">CVE-2026-23163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23163">CVE-2026-23163 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258544">SUSE bug 1258544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23166</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23166" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23166" ref_url="https://www.suse.com/security/cve/CVE-2026-23166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues

Add NULL pointer checks in ice_vsi_set_napi_queues() to prevent crashes
during resume from suspend when rings[q_idx]-&gt;q_vector is NULL.

Tested adaptor:
60:00.0 Ethernet controller [0200]: Intel Corporation Ethernet Controller E810-XXV for SFP [8086:159b] (rev 02)
        Subsystem: Intel Corporation Ethernet Network Adapter E810-XXV-2 [8086:4003]

SR-IOV state: both disabled and enabled can reproduce this issue.

kernel version: v6.18

Reproduce steps:
Boot up and execute suspend like systemctl suspend or rtcwake.

Log:
&lt;1&gt;[  231.443607] BUG: kernel NULL pointer dereference, address: 0000000000000040
&lt;1&gt;[  231.444052] #PF: supervisor read access in kernel mode
&lt;1&gt;[  231.444484] #PF: error_code(0x0000) - not-present page
&lt;6&gt;[  231.444913] PGD 0 P4D 0
&lt;4&gt;[  231.445342] Oops: Oops: 0000 [#1] SMP NOPTI
&lt;4&gt;[  231.446635] RIP: 0010:netif_queue_set_napi+0xa/0x170
&lt;4&gt;[  231.447067] Code: 31 f6 31 ff c3 cc cc cc cc 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 48 85 c9 74 0b &lt;48&gt; 83 79 30 00 0f 84 39 01 00 00 55 41 89 d1 49 89 f8 89 f2 48 89
&lt;4&gt;[  231.447513] RSP: 0018:ffffcc780fc078c0 EFLAGS: 00010202
&lt;4&gt;[  231.447961] RAX: ffff8b848ca30400 RBX: ffff8b848caf2028 RCX: 0000000000000010
&lt;4&gt;[  231.448443] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8b848dbd4000
&lt;4&gt;[  231.448896] RBP: ffffcc780fc078e8 R08: 0000000000000000 R09: 0000000000000000
&lt;4&gt;[  231.449345] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001
&lt;4&gt;[  231.449817] R13: ffff8b848dbd4000 R14: ffff8b84833390c8 R15: 0000000000000000
&lt;4&gt;[  231.450265] FS:  00007c7b29e9d740(0000) GS:ffff8b8c068e2000(0000) knlGS:0000000000000000
&lt;4&gt;[  231.450715] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
&lt;4&gt;[  231.451179] CR2: 0000000000000040 CR3: 000000030626f004 CR4: 0000000000f72ef0
&lt;4&gt;[  231.451629] PKRU: 55555554
&lt;4&gt;[  231.452076] Call Trace:
&lt;4&gt;[  231.452549]  &lt;TASK&gt;
&lt;4&gt;[  231.452996]  ? ice_vsi_set_napi_queues+0x4d/0x110 [ice]
&lt;4&gt;[  231.453482]  ice_resume+0xfd/0x220 [ice]
&lt;4&gt;[  231.453977]  ? __pfx_pci_pm_resume+0x10/0x10
&lt;4&gt;[  231.454425]  pci_pm_resume+0x8c/0x140
&lt;4&gt;[  231.454872]  ? __pfx_pci_pm_resume+0x10/0x10
&lt;4&gt;[  231.455347]  dpm_run_callback+0x5f/0x160
&lt;4&gt;[  231.455796]  ? dpm_wait_for_superior+0x107/0x170
&lt;4&gt;[  231.456244]  device_resume+0x177/0x270
&lt;4&gt;[  231.456708]  dpm_resume+0x209/0x2f0
&lt;4&gt;[  231.457151]  dpm_resume_end+0x15/0x30
&lt;4&gt;[  231.457596]  suspend_devices_and_enter+0x1da/0x2b0
&lt;4&gt;[  231.458054]  enter_state+0x10e/0x570

Add defensive checks for both the ring pointer and its q_vector
before dereferencing, allowing the system to resume successfully even when
q_vectors are unmapped.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23166/">CVE-2026-23166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23166">CVE-2026-23166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258272">SUSE bug 1258272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23167</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23167" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23167" ref_url="https://www.suse.com/security/cve/CVE-2026-23167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: Fix race between rfkill and nci_unregister_device().

syzbot reported the splat below [0] without a repro.

It indicates that struct nci_dev.cmd_wq had been destroyed before
nci_close_device() was called via rfkill.

nci_dev.cmd_wq is only destroyed in nci_unregister_device(), which
(I think) was called from virtual_ncidev_close() when syzbot close()d
an fd of virtual_ncidev.

The problem is that nci_unregister_device() destroys nci_dev.cmd_wq
first and then calls nfc_unregister_device(), which removes the
device from rfkill by rfkill_unregister().

So, the device is still visible via rfkill even after nci_dev.cmd_wq
is destroyed.

Let's unregister the device from rfkill first in nci_unregister_device().

Note that we cannot call nfc_unregister_device() before
nci_close_device() because

  1) nfc_unregister_device() calls device_del() which frees
     all memory allocated by devm_kzalloc() and linked to
     ndev-&gt;conn_info_list

  2) nci_rx_work() could try to queue nci_conn_info to
     ndev-&gt;conn_info_list which could be leaked

Thus, nfc_unregister_device() is split into two functions so we
can remove rfkill interfaces only before nci_close_device().

[0]:
DEBUG_LOCKS_WARN_ON(1)
WARNING: kernel/locking/lockdep.c:238 at hlock_class kernel/locking/lockdep.c:238 [inline], CPU#0: syz.0.8675/6349
WARNING: kernel/locking/lockdep.c:238 at check_wait_context kernel/locking/lockdep.c:4854 [inline], CPU#0: syz.0.8675/6349
WARNING: kernel/locking/lockdep.c:238 at __lock_acquire+0x39d/0x2cf0 kernel/locking/lockdep.c:5187, CPU#0: syz.0.8675/6349
Modules linked in:
CPU: 0 UID: 0 PID: 6349 Comm: syz.0.8675 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026
RIP: 0010:hlock_class kernel/locking/lockdep.c:238 [inline]
RIP: 0010:check_wait_context kernel/locking/lockdep.c:4854 [inline]
RIP: 0010:__lock_acquire+0x3a4/0x2cf0 kernel/locking/lockdep.c:5187
Code: 18 00 4c 8b 74 24 08 75 27 90 e8 17 f2 fc 02 85 c0 74 1c 83 3d 50 e0 4e 0e 00 75 13 48 8d 3d 43 f7 51 0e 48 c7 c6 8b 3a de 8d &lt;67&gt; 48 0f b9 3a 90 31 c0 0f b6 98 c4 00 00 00 41 8b 45 20 25 ff 1f
RSP: 0018:ffffc9000c767680 EFLAGS: 00010046
RAX: 0000000000000001 RBX: 0000000000040000 RCX: 0000000000080000
RDX: ffffc90013080000 RSI: ffffffff8dde3a8b RDI: ffffffff8ff24ca0
RBP: 0000000000000003 R08: ffffffff8fef35a3 R09: 1ffffffff1fde6b4
R10: dffffc0000000000 R11: fffffbfff1fde6b5 R12: 00000000000012a2
R13: ffff888030338ba8 R14: ffff888030338000 R15: ffff888030338b30
FS:  00007fa5995f66c0(0000) GS:ffff8881256f8000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7e72f842d0 CR3: 00000000485a0000 CR4: 00000000003526f0
Call Trace:
 &lt;TASK&gt;
 lock_acquire+0x106/0x330 kernel/locking/lockdep.c:5868
 touch_wq_lockdep_map+0xcb/0x180 kernel/workqueue.c:3940
 __flush_workqueue+0x14b/0x14f0 kernel/workqueue.c:3982
 nci_close_device+0x302/0x630 net/nfc/nci/core.c:567
 nci_dev_down+0x3b/0x50 net/nfc/nci/core.c:639
 nfc_dev_down+0x152/0x290 net/nfc/core.c:161
 nfc_rfkill_set_block+0x2d/0x100 net/nfc/core.c:179
 rfkill_set_block+0x1d2/0x440 net/rfkill/core.c:346
 rfkill_fop_write+0x461/0x5a0 net/rfkill/core.c:1301
 vfs_write+0x29a/0xb90 fs/read_write.c:684
 ksys_write+0x150/0x270 fs/read_write.c:738
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fa59b39acb9
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fa5995f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007fa59b615fa0 RCX: 00007fa59b39acb9
RDX: 0000000000000008 RSI: 0000200000000080 RDI: 0000000000000007
RBP: 00007fa59b408bf7 R08: 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23167/">CVE-2026-23167 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23167">CVE-2026-23167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258374">SUSE bug 1258374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23169</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23169" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23169" ref_url="https://www.suse.com/security/cve/CVE-2026-23169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix race in mptcp_pm_nl_flush_addrs_doit()

syzbot and Eulgyu Kim reported crashes in mptcp_pm_nl_get_local_id()
and/or mptcp_pm_nl_is_backup()

Root cause is list_splice_init() in mptcp_pm_nl_flush_addrs_doit()
which is not RCU ready.

list_splice_init_rcu() can not be called here while holding pernet-&gt;lock
spinlock.

Many thanks to Eulgyu Kim for providing a repro and testing our patches.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23169/">CVE-2026-23169 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23169">CVE-2026-23169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258389">SUSE bug 1258389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23170</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23170" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23170" ref_url="https://www.suse.com/security/cve/CVE-2026-23170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/imx/tve: fix probe device leak

Make sure to drop the reference taken to the DDC device during probe on
probe failure (e.g. probe deferral) and on driver unbind.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23170/">CVE-2026-23170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23170">CVE-2026-23170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258379">SUSE bug 1258379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23171</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23171" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23171" ref_url="https://www.suse.com/security/cve/CVE-2026-23171" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: fix use-after-free due to enslave fail after slave array update

Fix a use-after-free which happens due to enslave failure after the new
slave has been added to the array. Since the new slave can be used for Tx
immediately, we can use it after it has been freed by the enslave error
cleanup path which frees the allocated slave memory. Slave update array is
supposed to be called last when further enslave failures are not expected.
Move it after xdp setup to avoid any problems.

It is very easy to reproduce the problem with a simple xdp_pass prog:
 ip l add bond1 type bond mode balance-xor
 ip l set bond1 up
 ip l set dev bond1 xdp object xdp_pass.o sec xdp_pass
 ip l add dumdum type dummy

Then run in parallel:
 while :; do ip l set dumdum master bond1 1&gt;/dev/null 2&gt;&amp;1; done;
 mausezahn bond1 -a own -b rand -A rand -B 1.1.1.1 -c 0 -t tcp "dp=1-1023, flags=syn"

The crash happens almost immediately:
 [  605.602850] Oops: general protection fault, probably for non-canonical address 0xe0e6fc2460000137: 0000 [#1] SMP KASAN NOPTI
 [  605.602916] KASAN: maybe wild-memory-access in range [0x07380123000009b8-0x07380123000009bf]
 [  605.602946] CPU: 0 UID: 0 PID: 2445 Comm: mausezahn Kdump: loaded Tainted: G    B               6.19.0-rc6+ #21 PREEMPT(voluntary)
 [  605.602979] Tainted: [B]=BAD_PAGE
 [  605.602998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
 [  605.603032] RIP: 0010:netdev_core_pick_tx+0xcd/0x210
 [  605.603063] Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 3e 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 6b 08 49 8d 7d 30 48 89 fa 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 25 01 00 00 49 8b 45 30 4c 89 e2 48 89 ee 48 89
 [  605.603111] RSP: 0018:ffff88817b9af348 EFLAGS: 00010213
 [  605.603145] RAX: dffffc0000000000 RBX: ffff88817d28b420 RCX: 0000000000000000
 [  605.603172] RDX: 00e7002460000137 RSI: 0000000000000008 RDI: 07380123000009be
 [  605.603199] RBP: ffff88817b541a00 R08: 0000000000000001 R09: fffffbfff3ed8c0c
 [  605.603226] R10: ffffffff9f6c6067 R11: 0000000000000001 R12: 0000000000000000
 [  605.603253] R13: 073801230000098e R14: ffff88817d28b448 R15: ffff88817b541a84
 [  605.603286] FS:  00007f6570ef67c0(0000) GS:ffff888221dfa000(0000) knlGS:0000000000000000
 [  605.603319] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 [  605.603343] CR2: 00007f65712fae40 CR3: 000000011371b000 CR4: 0000000000350ef0
 [  605.603373] Call Trace:
 [  605.603392]  &lt;TASK&gt;
 [  605.603410]  __dev_queue_xmit+0x448/0x32a0
 [  605.603434]  ? __pfx_vprintk_emit+0x10/0x10
 [  605.603461]  ? __pfx_vprintk_emit+0x10/0x10
 [  605.603484]  ? __pfx___dev_queue_xmit+0x10/0x10
 [  605.603507]  ? bond_start_xmit+0xbfb/0xc20 [bonding]
 [  605.603546]  ? _printk+0xcb/0x100
 [  605.603566]  ? __pfx__printk+0x10/0x10
 [  605.603589]  ? bond_start_xmit+0xbfb/0xc20 [bonding]
 [  605.603627]  ? add_taint+0x5e/0x70
 [  605.603648]  ? add_taint+0x2a/0x70
 [  605.603670]  ? end_report.cold+0x51/0x75
 [  605.603693]  ? bond_start_xmit+0xbfb/0xc20 [bonding]
 [  605.603731]  bond_start_xmit+0x623/0xc20 [bonding]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23171/">CVE-2026-23171 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23171">CVE-2026-23171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258349">SUSE bug 1258349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23172</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23172" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23172" ref_url="https://www.suse.com/security/cve/CVE-2026-23172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: wwan: t7xx: fix potential skb-&gt;frags overflow in RX path

When receiving data in the DPMAIF RX path,
the t7xx_dpmaif_set_frag_to_skb() function adds
page fragments to an skb without checking if the number of
fragments has exceeded MAX_SKB_FRAGS. This could lead to a buffer overflow
in skb_shinfo(skb)-&gt;frags[] array, corrupting adjacent memory and
potentially causing kernel crashes or other undefined behavior.

This issue was identified through static code analysis by comparing with a
similar vulnerability fixed in the mt76 driver commit b102f0c522cf ("mt76:
fix array overflow on receiving too many fragments for a packet").

The vulnerability could be triggered if the modem firmware sends packets
with excessive fragments. While under normal protocol conditions (MTU 3080
bytes, BAT buffer 3584 bytes),
a single packet should not require additional
fragments, the kernel should not blindly trust firmware behavior.
Malicious, buggy, or compromised firmware could potentially craft packets
with more fragments than the kernel expects.

Fix this by adding a bounds check before calling skb_add_rx_frag() to
ensure nr_frags does not exceed MAX_SKB_FRAGS.

The check must be performed before unmapping to avoid a page leak
and double DMA unmap during device teardown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23172/">CVE-2026-23172 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23172">CVE-2026-23172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258519">SUSE bug 1258519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23173</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23173" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23173" ref_url="https://www.suse.com/security/cve/CVE-2026-23173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: TC, delete flows only for existing peers

When deleting TC steering flows, iterate only over actual devcom
peers instead of assuming all possible ports exist. This avoids
touching non-existent peers and ensures cleanup is limited to
devices the driver is currently connected to.

 BUG: kernel NULL pointer dereference, address: 0000000000000008
 #PF: supervisor write access in kernel mode
 #PF: error_code(0x0002) - not-present page
 PGD 133c8a067 P4D 0
 Oops: Oops: 0002 [#1] SMP
 CPU: 19 UID: 0 PID: 2169 Comm: tc Not tainted 6.18.0+ #156 NONE
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
 RIP: 0010:mlx5e_tc_del_fdb_peers_flow+0xbe/0x200 [mlx5_core]
 Code: 00 00 a8 08 74 a8 49 8b 46 18 f6 c4 02 74 9f 4c 8d bf a0 12 00 00 4c 89 ff e8 0e e7 96 e1 49 8b 44 24 08 49 8b 0c 24 4c 89 ff &lt;48&gt; 89 41 08 48 89 08 49 89 2c 24 49 89 5c 24 08 e8 7d ce 96 e1 49
 RSP: 0018:ff11000143867528 EFLAGS: 00010246
 RAX: 0000000000000000 RBX: dead000000000122 RCX: 0000000000000000
 RDX: ff11000143691580 RSI: ff110001026e5000 RDI: ff11000106f3d2a0
 RBP: dead000000000100 R08: 00000000000003fd R09: 0000000000000002
 R10: ff11000101c75690 R11: ff1100085faea178 R12: ff11000115f0ae78
 R13: 0000000000000000 R14: ff11000115f0a800 R15: ff11000106f3d2a0
 FS:  00007f35236bf740(0000) GS:ff110008dc809000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000008 CR3: 0000000157a01001 CR4: 0000000000373eb0
 Call Trace:
  &lt;TASK&gt;
  mlx5e_tc_del_flow+0x46/0x270 [mlx5_core]
  mlx5e_flow_put+0x25/0x50 [mlx5_core]
  mlx5e_delete_flower+0x2a6/0x3e0 [mlx5_core]
  tc_setup_cb_reoffload+0x20/0x80
  fl_reoffload+0x26f/0x2f0 [cls_flower]
  ? mlx5e_tc_reoffload_flows_work+0xc0/0xc0 [mlx5_core]
  ? mlx5e_tc_reoffload_flows_work+0xc0/0xc0 [mlx5_core]
  tcf_block_playback_offloads+0x9e/0x1c0
  tcf_block_unbind+0x7b/0xd0
  tcf_block_setup+0x186/0x1d0
  tcf_block_offload_cmd.isra.0+0xef/0x130
  tcf_block_offload_unbind+0x43/0x70
  __tcf_block_put+0x85/0x160
  ingress_destroy+0x32/0x110 [sch_ingress]
  __qdisc_destroy+0x44/0x100
  qdisc_graft+0x22b/0x610
  tc_get_qdisc+0x183/0x4d0
  rtnetlink_rcv_msg+0x2d7/0x3d0
  ? rtnl_calcit.isra.0+0x100/0x100
  netlink_rcv_skb+0x53/0x100
  netlink_unicast+0x249/0x320
  ? __alloc_skb+0x102/0x1f0
  netlink_sendmsg+0x1e3/0x420
  __sock_sendmsg+0x38/0x60
  ____sys_sendmsg+0x1ef/0x230
  ? copy_msghdr_from_user+0x6c/0xa0
  ___sys_sendmsg+0x7f/0xc0
  ? ___sys_recvmsg+0x8a/0xc0
  ? __sys_sendto+0x119/0x180
  __sys_sendmsg+0x61/0xb0
  do_syscall_64+0x55/0x640
  entry_SYSCALL_64_after_hwframe+0x4b/0x53
 RIP: 0033:0x7f35238bb764
 Code: 15 b9 86 0c 00 f7 d8 64 89 02 b8 ff ff ff ff eb bf 0f 1f 44 00 00 f3 0f 1e fa 80 3d e5 08 0d 00 00 74 13 b8 2e 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 4c c3 0f 1f 00 55 48 89 e5 48 83 ec 20 89 55
 RSP: 002b:00007ffed4c35638 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
 RAX: ffffffffffffffda RBX: 000055a2efcc75e0 RCX: 00007f35238bb764
 RDX: 0000000000000000 RSI: 00007ffed4c356a0 RDI: 0000000000000003
 RBP: 00007ffed4c35710 R08: 0000000000000010 R09: 00007f3523984b20
 R10: 0000000000000004 R11: 0000000000000202 R12: 00007ffed4c35790
 R13: 000000006947df8f R14: 000055a2efcc75e0 R15: 00007ffed4c35780
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23173/">CVE-2026-23173 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23173">CVE-2026-23173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258520">SUSE bug 1258520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23176</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23176" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23176" ref_url="https://www.suse.com/security/cve/CVE-2026-23176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: toshiba_haps: Fix memory leaks in add/remove routines

toshiba_haps_add() leaks the haps object allocated by it if it returns
an error after allocating that object successfully.

toshiba_haps_remove() does not free the object pointed to by
toshiba_haps before clearing that pointer, so it becomes unreachable
allocated memory.

Address these memory leaks by using devm_kzalloc() for allocating
the memory in question.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23176/">CVE-2026-23176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23176">CVE-2026-23176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258256">SUSE bug 1258256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23177</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23177" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23177" ref_url="https://www.suse.com/security/cve/CVE-2026-23177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm, shmem: prevent infinite loop on truncate race

When truncating a large swap entry, shmem_free_swap() returns 0 when the
entry's index doesn't match the given index due to lookup alignment.  The
failure fallback path checks if the entry crosses the end border and
aborts when it happens, so truncate won't erase an unexpected entry or
range.  But one scenario was ignored.

When `index` points to the middle of a large swap entry, and the large
swap entry doesn't go across the end border, find_get_entries() will
return that large swap entry as the first item in the batch with
`indices[0]` equal to `index`.  The entry's base index will be smaller
than `indices[0]`, so shmem_free_swap() will fail and return 0 due to the
"base &lt; index" check.  The code will then call shmem_confirm_swap(), get
the order, check if it crosses the END boundary (which it doesn't), and
retry with the same index.

The next iteration will find the same entry again at the same index with
same indices, leading to an infinite loop.

Fix this by retrying with a round-down index, and abort if the index is
smaller than the truncate range.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23177/">CVE-2026-23177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23177">CVE-2026-23177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258324">SUSE bug 1258324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23178</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23178" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23178" ref_url="https://www.suse.com/security/cve/CVE-2026-23178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report()

`i2c_hid_xfer` is used to read `recv_len + sizeof(__le16)` bytes of data
into `ihid-&gt;rawbuf`.

The former can come from the userspace in the hidraw driver and is only
bounded by HID_MAX_BUFFER_SIZE(16384) by default (unless we also set
`max_buffer_size` field of `struct hid_ll_driver` which we do not).

The latter has size determined at runtime by the maximum size of
different report types you could receive on any particular device and
can be a much smaller value.

Fix this by truncating `recv_len` to `ihid-&gt;bufsize - sizeof(__le16)`.

The impact is low since access to hidraw devices requires root.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23178/">CVE-2026-23178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23178">CVE-2026-23178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258358">SUSE bug 1258358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23179</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23179" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23179" ref_url="https://www.suse.com/security/cve/CVE-2026-23179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready()

When the socket is closed while in TCP_LISTEN a callback is run to
flush all outstanding packets, which in turns calls
nvmet_tcp_listen_data_ready() with the sk_callback_lock held.
So we need to check if we are in TCP_LISTEN before attempting
to get the sk_callback_lock() to avoid a deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23179/">CVE-2026-23179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23179">CVE-2026-23179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258394">SUSE bug 1258394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23182</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23182" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23182" ref_url="https://www.suse.com/security/cve/CVE-2026-23182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: tegra: Fix a memory leak in tegra_slink_probe()

In tegra_slink_probe(), when platform_get_irq() fails, it directly
returns from the function with an error code, which causes a memory leak.

Replace it with a goto label to ensure proper cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23182/">CVE-2026-23182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23182">CVE-2026-23182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258259">SUSE bug 1258259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23188</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23188" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23188" ref_url="https://www.suse.com/security/cve/CVE-2026-23188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: r8152: fix resume reset deadlock

rtl8152 can trigger device reset during reset which
potentially can result in a deadlock:

 **** DPM device timeout after 10 seconds; 15 seconds until panic ****
 Call Trace:
 &lt;TASK&gt;
 schedule+0x483/0x1370
 schedule_preempt_disabled+0x15/0x30
 __mutex_lock_common+0x1fd/0x470
 __rtl8152_set_mac_address+0x80/0x1f0
 dev_set_mac_address+0x7f/0x150
 rtl8152_post_reset+0x72/0x150
 usb_reset_device+0x1d0/0x220
 rtl8152_resume+0x99/0xc0
 usb_resume_interface+0x3e/0xc0
 usb_resume_both+0x104/0x150
 usb_resume+0x22/0x110

The problem is that rtl8152 resume calls reset under
tp-&gt;control mutex while reset basically re-enters rtl8152
and attempts to acquire the same tp-&gt;control lock once
again.

Reset INACCESSIBLE device outside of tp-&gt;control mutex
scope to avoid recursive mutex_lock() deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23188/">CVE-2026-23188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23188">CVE-2026-23188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258331">SUSE bug 1258331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23189</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23189" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23189" ref_url="https://www.suse.com/security/cve/CVE-2026-23189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix NULL pointer dereference in ceph_mds_auth_match()

The CephFS kernel client has regression starting from 6.18-rc1.
We have issue in ceph_mds_auth_match() if fs_name == NULL:

    const char fs_name = mdsc-&gt;fsc-&gt;mount_options-&gt;mds_namespace;
    ...
    if (auth-&gt;match.fs_name &amp;&amp; strcmp(auth-&gt;match.fs_name, fs_name)) {
            / fsname mismatch, try next one */
            return 0;
    }

Patrick Donnelly suggested that: In summary, we should definitely start
decoding `fs_name` from the MDSMap and do strict authorizations checks
against it. Note that the `-o mds_namespace=foo` should only be used for
selecting the file system to mount and nothing else. It's possible
no mds_namespace is specified but the kernel will mount the only
file system that exists which may have name "foo".

This patch reworks ceph_mdsmap_decode() and namespace_equals() with
the goal of supporting the suggested concept. Now struct ceph_mdsmap
contains m_fs_name field that receives copy of extracted FS name
by ceph_extract_encoded_string(). For the case of "old" CephFS file
systems, it is used "cephfs" name.

[ idryomov: replace redundant %*pE with %s in ceph_mdsmap_decode(),
  get rid of a series of strlen() calls in ceph_namespace_match(),
  drop changes to namespace_equals() body to avoid treating empty
  mds_namespace as equal, drop changes to ceph_mdsc_handle_fsmap()
  as namespace_equals() isn't an equivalent substitution there ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23189/">CVE-2026-23189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23189">CVE-2026-23189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258308">SUSE bug 1258308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23190</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23190" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23190" ref_url="https://www.suse.com/security/cve/CVE-2026-23190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: amd: fix memory leak in acp3x pdm dma ops
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23190/">CVE-2026-23190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23190">CVE-2026-23190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258397">SUSE bug 1258397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23191</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23191" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23191" ref_url="https://www.suse.com/security/cve/CVE-2026-23191" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: aloop: Fix racy access at PCM trigger

The PCM trigger callback of aloop driver tries to check the PCM state
and stop the stream of the tied substream in the corresponding cable.
Since both check and stop operations are performed outside the cable
lock, this may result in UAF when a program attempts to trigger
frequently while opening/closing the tied stream, as spotted by
fuzzers.

For addressing the UAF, this patch changes two things:
- It covers the most of code in loopback_check_format() with
  cable-&gt;lock spinlock, and add the proper NULL checks.  This avoids
  already some racy accesses.
- In addition, now we try to check the state of the capture PCM stream
  that may be stopped in this function, which was the major pain point
  leading to UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23191/">CVE-2026-23191 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23191">CVE-2026-23191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258395">SUSE bug 1258395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258396">SUSE bug 1258396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23198</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23198" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23198" ref_url="https://www.suse.com/security/cve/CVE-2026-23198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: Don't clobber irqfd routing type when deassigning irqfd

When deassigning a KVM_IRQFD, don't clobber the irqfd's copy of the IRQ's
routing entry as doing so breaks kvm_arch_irq_bypass_del_producer() on x86
and arm64, which explicitly look for KVM_IRQ_ROUTING_MSI.  Instead, to
handle a concurrent routing update, verify that the irqfd is still active
before consuming the routing information.  As evidenced by the x86 and
arm64 bugs, and another bug in kvm_arch_update_irqfd_routing() (see below),
clobbering the entry type without notifying arch code is surprising and
error prone.

As a bonus, checking that the irqfd is active provides a convenient
location for documenting _why_ KVM must not consume the routing entry for
an irqfd that is in the process of being deassigned: once the irqfd is
deleted from the list (which happens *before* the eventfd is detached), it
will no longer receive updates via kvm_irq_routing_update(), and so KVM
could deliver an event using stale routing information (relative to
KVM_SET_GSI_ROUTING returning to userspace).

As an even better bonus, explicitly checking for the irqfd being active
fixes a similar bug to the one the clobbering is trying to prevent: if an
irqfd is deactivated, and then its routing is changed,
kvm_irq_routing_update() won't invoke kvm_arch_update_irqfd_routing()
(because the irqfd isn't in the list).  And so if the irqfd is in bypass
mode, IRQs will continue to be posted using the old routing information.

As for kvm_arch_irq_bypass_del_producer(), clobbering the routing type
results in KVM incorrectly keeping the IRQ in bypass mode, which is
especially problematic on AMD as KVM tracks IRQs that are being posted to
a vCPU in a list whose lifetime is tied to the irqfd.

Without the help of KASAN to detect use-after-free, the most common
sympton on AMD is a NULL pointer deref in amd_iommu_update_ga() due to
the memory for irqfd structure being re-allocated and zeroed, resulting
in irqfd-&gt;irq_bypass_data being NULL when read by
avic_update_iommu_vcpu_affinity():

  BUG: kernel NULL pointer dereference, address: 0000000000000018
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 40cf2b9067 P4D 40cf2b9067 PUD 408362a067 PMD 0
  Oops: Oops: 0000 [#1] SMP
  CPU: 6 UID: 0 PID: 40383 Comm: vfio_irq_test
  Tainted: G     U  W  O        6.19.0-smp--5dddc257e6b2-irqfd #31 NONE
  Tainted: [U]=USER, [W]=WARN, [O]=OOT_MODULE
  Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.78.2-0 09/05/2025
  RIP: 0010:amd_iommu_update_ga+0x19/0xe0
  Call Trace:
   &lt;TASK&gt;
   avic_update_iommu_vcpu_affinity+0x3d/0x90 [kvm_amd]
   __avic_vcpu_load+0xf4/0x130 [kvm_amd]
   kvm_arch_vcpu_load+0x89/0x210 [kvm]
   vcpu_load+0x30/0x40 [kvm]
   kvm_arch_vcpu_ioctl_run+0x45/0x620 [kvm]
   kvm_vcpu_ioctl+0x571/0x6a0 [kvm]
   __se_sys_ioctl+0x6d/0xb0
   do_syscall_64+0x6f/0x9d0
   entry_SYSCALL_64_after_hwframe+0x4b/0x53
  RIP: 0033:0x46893b
    &lt;/TASK&gt;
  ---[ end trace 0000000000000000 ]---

If AVIC is inhibited when the irfd is deassigned, the bug will manifest as
list corruption, e.g. on the next irqfd assignment.

  list_add corruption. next-&gt;prev should be prev (ffff8d474d5cd588),
                       but was 0000000000000000. (next=ffff8d8658f86530).
  ------------[ cut here ]------------
  kernel BUG at lib/list_debug.c:31!
  Oops: invalid opcode: 0000 [#1] SMP
  CPU: 128 UID: 0 PID: 80818 Comm: vfio_irq_test
  Tainted: G     U  W  O        6.19.0-smp--f19dc4d680ba-irqfd #28 NONE
  Tainted: [U]=USER, [W]=WARN, [O]=OOT_MODULE
  Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.78.2-0 09/05/2025
  RIP: 0010:__list_add_valid_or_report+0x97/0xc0
  Call Trace:
   &lt;TASK&gt;
   avic_pi_update_irte+0x28e/0x2b0 [kvm_amd]
   kvm_pi_update_irte+0xbf/0x190 [kvm]
   kvm_arch_irq_bypass_add_producer+0x72/0x90 [kvm]
   irq_bypass_register_consumer+0xcd/0x170 [irqbypa
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23198/">CVE-2026-23198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23198">CVE-2026-23198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258321">SUSE bug 1258321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23202</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23202" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23202" ref_url="https://www.suse.com/security/cve/CVE-2026-23202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer

The curr_xfer field is read by the IRQ handler without holding the lock
to check if a transfer is in progress. When clearing curr_xfer in the
combined sequence transfer loop, protect it with the spinlock to prevent
a race with the interrupt handler.

Protect the curr_xfer clearing at the exit path of
tegra_qspi_combined_seq_xfer() with the spinlock to prevent a race
with the interrupt handler that reads this field.

Without this protection, the IRQ handler could read a partially updated
curr_xfer value, leading to NULL pointer dereference or use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23202/">CVE-2026-23202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23202">CVE-2026-23202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258338">SUSE bug 1258338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1261033">SUSE bug 1261033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23207</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23207" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23207" ref_url="https://www.suse.com/security/cve/CVE-2026-23207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: tegra210-quad: Protect curr_xfer check in IRQ handler

Now that all other accesses to curr_xfer are done under the lock,
protect the curr_xfer NULL check in tegra_qspi_isr_thread() with the
spinlock. Without this protection, the following race can occur:

  CPU0 (ISR thread)              CPU1 (timeout path)
  ----------------               -------------------
  if (!tqspi-&gt;curr_xfer)
    // sees non-NULL
                                 spin_lock()
                                 tqspi-&gt;curr_xfer = NULL
                                 spin_unlock()
  handle_*_xfer()
    spin_lock()
    t = tqspi-&gt;curr_xfer  // NULL!
    ... t-&gt;len ...        // NULL dereference!

With this patch, all curr_xfer accesses are now properly synchronized.

Although all accesses to curr_xfer are done under the lock, in
tegra_qspi_isr_thread() it checks for NULL, releases the lock and
reacquires it later in handle_cpu_based_xfer()/handle_dma_based_xfer().
There is a potential for an update in between, which could cause a NULL
pointer dereference.

To handle this, add a NULL check inside the handlers after acquiring
the lock. This ensures that if the timeout path has already cleared
curr_xfer, the handler will safely return without dereferencing the
NULL pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23207/">CVE-2026-23207 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23207">CVE-2026-23207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258524">SUSE bug 1258524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23208</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23208" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23208" ref_url="https://www.suse.com/security/cve/CVE-2026-23208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Prevent excessive number of frames

In this case, the user constructed the parameters with maxpacksize 40
for rate 22050 / pps 1000, and packsize[0] 22 packsize[1] 23. The buffer
size for each data URB is maxpacksize * packets, which in this example
is 40 * 6 = 240; When the user performs a write operation to send audio
data into the ALSA PCM playback stream, the calculated number of frames
is packsize[0] * packets = 264, which exceeds the allocated URB buffer
size, triggering the out-of-bounds (OOB) issue reported by syzbot [1].

Added a check for the number of single data URB frames when calculating
the number of frames to prevent [1].

[1]
BUG: KASAN: slab-out-of-bounds in copy_to_urb+0x261/0x460 sound/usb/pcm.c:1487
Write of size 264 at addr ffff88804337e800 by task syz.0.17/5506
Call Trace:
 copy_to_urb+0x261/0x460 sound/usb/pcm.c:1487
 prepare_playback_urb+0x953/0x13d0 sound/usb/pcm.c:1611
 prepare_outbound_urb+0x377/0xc50 sound/usb/endpoint.c:333
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23208/">CVE-2026-23208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23208">CVE-2026-23208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258468">SUSE bug 1258468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23209</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23209" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23209" ref_url="https://www.suse.com/security/cve/CVE-2026-23209" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002632.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1187-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1258-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1263-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1279-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1284-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1285-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1287-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1288-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21004-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21006-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21071-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

macvlan: fix error recovery in macvlan_common_newlink()

valis provided a nice repro to crash the kernel:

ip link add p1 type veth peer p2
ip link set address 00:00:00:00:00:20 dev p1
ip link set up dev p1
ip link set up dev p2

ip link add mv0 link p2 type macvlan mode source
ip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20

ping -c1 -I p1 1.2.3.4

He also gave a very detailed analysis:

&lt;quote valis&gt;

The issue is triggered when a new macvlan link is created  with
MACVLAN_MODE_SOURCE mode and MACVLAN_MACADDR_ADD (or
MACVLAN_MACADDR_SET) parameter, lower device already has a macvlan
port and register_netdevice() called from macvlan_common_newlink()
fails (e.g. because of the invalid link name).

In this case macvlan_hash_add_source is called from
macvlan_change_sources() / macvlan_common_newlink():

This adds a reference to vlan to the port's vlan_source_hash using
macvlan_source_entry.

vlan is a pointer to the priv data of the link that is being created.

When register_netdevice() fails, the error is returned from
macvlan_newlink() to rtnl_newlink_create():

        if (ops-&gt;newlink)
                err = ops-&gt;newlink(dev, &amp;params, extack);
        else
                err = register_netdevice(dev);
        if (err &lt; 0) {
                free_netdev(dev);
                goto out;
        }

and free_netdev() is called, causing a kvfree() on the struct
net_device that is still referenced in the source entry attached to
the lower device's macvlan port.

Now all packets sent on the macvlan port with a matching source mac
address will trigger a use-after-free in macvlan_forward_source().

&lt;/quote valis&gt;

With all that, my fix is to make sure we call macvlan_flush_sources()
regardless of @create value whenever "goto destroy_macvlan_port;"
path is taken.

Many thanks to valis for following up on this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23209/">CVE-2026-23209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23209">CVE-2026-23209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258518">SUSE bug 1258518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258784">SUSE bug 1258784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056306" comment="kernel-livepatch-6_12_0-160000_26-rt-2-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056309" comment="kernel-livepatch-6_12_0-160000_5-rt-7-160000.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056310" comment="kernel-livepatch-6_12_0-160000_6-rt-6-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056311" comment="kernel-livepatch-6_12_0-160000_7-rt-4-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056308" comment="kernel-livepatch-6_12_0-160000_8-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056330" comment="kernel-livepatch-6_12_0-160000_9-default-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056307" comment="kernel-livepatch-6_12_0-160000_9-rt-3-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23210</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23210" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23210" ref_url="https://www.suse.com/security/cve/CVE-2026-23210" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6570" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix PTP NULL pointer dereference during VSI rebuild

Fix race condition where PTP periodic work runs while VSI is being
rebuilt, accessing NULL vsi-&gt;rx_rings.

The sequence was:
1. ice_ptp_prepare_for_reset() cancels PTP work
2. ice_ptp_rebuild() immediately queues PTP work
3. VSI rebuild happens AFTER ice_ptp_rebuild()
4. PTP work runs and accesses NULL vsi-&gt;rx_rings

Fix: Keep PTP work cancelled during rebuild, only queue it after
VSI rebuild completes in ice_rebuild().

Added ice_ptp_queue_work() helper function to encapsulate the logic
for queuing PTP work, ensuring it's only queued when PTP is supported
and the state is ICE_PTP_READY.

Error log:
[  121.392544] ice 0000:60:00.1: PTP reset successful
[  121.392692] BUG: kernel NULL pointer dereference, address: 0000000000000000
[  121.392712] #PF: supervisor read access in kernel mode
[  121.392720] #PF: error_code(0x0000) - not-present page
[  121.392727] PGD 0
[  121.392734] Oops: Oops: 0000 [#1] SMP NOPTI
[  121.392746] CPU: 8 UID: 0 PID: 1005 Comm: ice-ptp-0000:60 Tainted: G S                  6.19.0-rc6+ #4 PREEMPT(voluntary)
[  121.392761] Tainted: [S]=CPU_OUT_OF_SPEC
[  121.392773] RIP: 0010:ice_ptp_update_cached_phctime+0xbf/0x150 [ice]
[  121.393042] Call Trace:
[  121.393047]  &lt;TASK&gt;
[  121.393055]  ice_ptp_periodic_work+0x69/0x180 [ice]
[  121.393202]  kthread_worker_fn+0xa2/0x260
[  121.393216]  ? __pfx_ice_ptp_periodic_work+0x10/0x10 [ice]
[  121.393359]  ? __pfx_kthread_worker_fn+0x10/0x10
[  121.393371]  kthread+0x10d/0x230
[  121.393382]  ? __pfx_kthread+0x10/0x10
[  121.393393]  ret_from_fork+0x273/0x2b0
[  121.393407]  ? __pfx_kthread+0x10/0x10
[  121.393417]  ret_from_fork_asm+0x1a/0x30
[  121.393432]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23210/">CVE-2026-23210 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23210">CVE-2026-23210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258517">SUSE bug 1258517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23213</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23213" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23213" ref_url="https://www.suse.com/security/cve/CVE-2026-23213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: Disable MMIO access during SMU Mode 1 reset

During Mode 1 reset, the ASIC undergoes a reset cycle and becomes
temporarily inaccessible via PCIe. Any attempt to access MMIO registers
during this window (e.g., from interrupt handlers or other driver threads)
can result in uncompleted PCIe transactions, leading to NMI panics or
system hangs.

To prevent this, set the `no_hw_access` flag to true immediately after
triggering the reset. This signals other driver components to skip
register accesses while the device is offline.

A memory barrier `smp_mb()` is added to ensure the flag update is
globally visible to all cores before the driver enters the sleep/wait
state.

(cherry picked from commit 7edb503fe4b6d67f47d8bb0dfafb8e699bb0f8a4)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23213/">CVE-2026-23213 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23213">CVE-2026-23213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258465">SUSE bug 1258465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23214</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23214" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23214" ref_url="https://www.suse.com/security/cve/CVE-2026-23214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: reject new transactions if the fs is fully read-only

[BUG]
There is a bug report where a heavily fuzzed fs is mounted with all
rescue mount options, which leads to the following warnings during
unmount:

  BTRFS: Transaction aborted (error -22)
  Modules linked in:
  CPU: 0 UID: 0 PID: 9758 Comm: repro.out Not tainted
  6.19.0-rc5-00002-gb71e635feefc #7 PREEMPT(full)
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
  RIP: 0010:find_free_extent_update_loop fs/btrfs/extent-tree.c:4208 [inline]
  RIP: 0010:find_free_extent+0x52f0/0x5d20 fs/btrfs/extent-tree.c:4611
  Call Trace:
   &lt;TASK&gt;
   btrfs_reserve_extent+0x2cd/0x790 fs/btrfs/extent-tree.c:4705
   btrfs_alloc_tree_block+0x1e1/0x10e0 fs/btrfs/extent-tree.c:5157
   btrfs_force_cow_block+0x578/0x2410 fs/btrfs/ctree.c:517
   btrfs_cow_block+0x3c4/0xa80 fs/btrfs/ctree.c:708
   btrfs_search_slot+0xcad/0x2b50 fs/btrfs/ctree.c:2130
   btrfs_truncate_inode_items+0x45d/0x2350 fs/btrfs/inode-item.c:499
   btrfs_evict_inode+0x923/0xe70 fs/btrfs/inode.c:5628
   evict+0x5f4/0xae0 fs/inode.c:837
   __dentry_kill+0x209/0x660 fs/dcache.c:670
   finish_dput+0xc9/0x480 fs/dcache.c:879
   shrink_dcache_for_umount+0xa0/0x170 fs/dcache.c:1661
   generic_shutdown_super+0x67/0x2c0 fs/super.c:621
   kill_anon_super+0x3b/0x70 fs/super.c:1289
   btrfs_kill_super+0x41/0x50 fs/btrfs/super.c:2127
   deactivate_locked_super+0xbc/0x130 fs/super.c:474
   cleanup_mnt+0x425/0x4c0 fs/namespace.c:1318
   task_work_run+0x1d4/0x260 kernel/task_work.c:233
   exit_task_work include/linux/task_work.h:40 [inline]
   do_exit+0x694/0x22f0 kernel/exit.c:971
   do_group_exit+0x21c/0x2d0 kernel/exit.c:1112
   __do_sys_exit_group kernel/exit.c:1123 [inline]
   __se_sys_exit_group kernel/exit.c:1121 [inline]
   __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1121
   x64_sys_call+0x2210/0x2210 arch/x86/include/generated/asm/syscalls_64.h:232
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xe8/0xf80 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
  RIP: 0033:0x44f639
  Code: Unable to access opcode bytes at 0x44f60f.
  RSP: 002b:00007ffc15c4e088 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
  RAX: ffffffffffffffda RBX: 00000000004c32f0 RCX: 000000000044f639
  RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001
  RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004c32f0
  R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
   &lt;/TASK&gt;

Since rescue mount options will mark the full fs read-only, there should
be no new transaction triggered.

But during unmount we will evict all inodes, which can trigger a new
transaction, and triggers warnings on a heavily corrupted fs.

[CAUSE]
Btrfs allows new transaction even on a read-only fs, this is to allow
log replay happen even on read-only mounts, just like what ext4/xfs do.

However with rescue mount options, the fs is fully read-only and cannot
be remounted read-write, thus in that case we should also reject any new
transactions.

[FIX]
If we find the fs has rescue mount options, we should treat the fs as
error, so that no new transaction can be started.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23214/">CVE-2026-23214 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23214">CVE-2026-23214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258464">SUSE bug 1258464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23221</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23221" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23221" ref_url="https://www.suse.com/security/cve/CVE-2026-23221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: fsl-mc: fix use-after-free in driver_override_show()

The driver_override_show() function reads the driver_override string
without holding the device_lock. However, driver_override_store() uses
driver_set_override(), which modifies and frees the string while holding
the device_lock.

This can result in a concurrent use-after-free if the string is freed
by the store function while being read by the show function.

Fix this by holding the device_lock around the read operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23221/">CVE-2026-23221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23221">CVE-2026-23221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258660">SUSE bug 1258660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23222</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23222" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23222" ref_url="https://www.suse.com/security/cve/CVE-2026-23222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly

The existing allocation of scatterlists in omap_crypto_copy_sg_lists()
was allocating an array of scatterlist pointers, not scatterlist objects,
resulting in a 4x too small allocation.

Use sizeof(*new_sg) to get the correct object size.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23222/">CVE-2026-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23222">CVE-2026-23222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258484">SUSE bug 1258484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23223</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23223" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23223" ref_url="https://www.suse.com/security/cve/CVE-2026-23223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: fix UAF in xchk_btree_check_block_owner

We cannot dereference bs-&gt;cur when trying to determine if bs-&gt;cur
aliases bs-&gt;sc-&gt;sa.{bno,rmap}_cur after the latter has been freed.
Fix this by sampling before type before any freeing could happen.
The correct temporal ordering was broken when we removed xfs_btnum_t.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23223/">CVE-2026-23223 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23223">CVE-2026-23223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258483">SUSE bug 1258483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23224</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23224" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23224" ref_url="https://www.suse.com/security/cve/CVE-2026-23224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: fix UAF issue for file-backed mounts w/ directio option

[    9.269940][ T3222] Call trace:
[    9.269948][ T3222]  ext4_file_read_iter+0xac/0x108
[    9.269979][ T3222]  vfs_iocb_iter_read+0xac/0x198
[    9.269993][ T3222]  erofs_fileio_rq_submit+0x12c/0x180
[    9.270008][ T3222]  erofs_fileio_submit_bio+0x14/0x24
[    9.270030][ T3222]  z_erofs_runqueue+0x834/0x8ac
[    9.270054][ T3222]  z_erofs_read_folio+0x120/0x220
[    9.270083][ T3222]  filemap_read_folio+0x60/0x120
[    9.270102][ T3222]  filemap_fault+0xcac/0x1060
[    9.270119][ T3222]  do_pte_missing+0x2d8/0x1554
[    9.270131][ T3222]  handle_mm_fault+0x5ec/0x70c
[    9.270142][ T3222]  do_page_fault+0x178/0x88c
[    9.270167][ T3222]  do_translation_fault+0x38/0x54
[    9.270183][ T3222]  do_mem_abort+0x54/0xac
[    9.270208][ T3222]  el0_da+0x44/0x7c
[    9.270227][ T3222]  el0t_64_sync_handler+0x5c/0xf4
[    9.270253][ T3222]  el0t_64_sync+0x1bc/0x1c0

EROFS may encounter above panic when enabling file-backed mount w/
directio mount option, the root cause is it may suffer UAF in below
race condition:

- z_erofs_read_folio                          wq s_dio_done_wq
 - z_erofs_runqueue
  - erofs_fileio_submit_bio
   - erofs_fileio_rq_submit
    - vfs_iocb_iter_read
     - ext4_file_read_iter
      - ext4_dio_read_iter
       - iomap_dio_rw
       : bio was submitted and return -EIOCBQUEUED
                                              - dio_aio_complete_work
                                               - dio_complete
                                                - dio-&gt;iocb-&gt;ki_complete (erofs_fileio_ki_complete())
                                                 - kfree(rq)
                                                 : it frees iocb, iocb.ki_filp can be UAF in file_accessed().
       - file_accessed
       : access NULL file point

Introduce a reference count in struct erofs_fileio_rq, and initialize it
as two, both erofs_fileio_ki_complete() and erofs_fileio_rq_submit() will
decrease reference count, the last one decreasing the reference count
to zero will free rq.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23224/">CVE-2026-23224 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23224">CVE-2026-23224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258461">SUSE bug 1258461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258463">SUSE bug 1258463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23229</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23229" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23229" ref_url="https://www.suse.com/security/cve/CVE-2026-23229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: virtio - Add spinlock protection with virtqueue notification

When VM boots with one virtio-crypto PCI device and builtin backend,
run openssl benchmark command with multiple processes, such as
  openssl speed -evp aes-128-cbc -engine afalg  -seconds 10 -multi 32

openssl processes will hangup and there is error reported like this:
 virtio_crypto virtio0: dataq.0:id 3 is not a head!

It seems that the data virtqueue need protection when it is handled
for virtio done notification. If the spinlock protection is added
in virtcrypto_done_task(), openssl benchmark with multiple processes
works well.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23229/">CVE-2026-23229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23229">CVE-2026-23229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258429">SUSE bug 1258429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23230</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23230" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23230" ref_url="https://www.suse.com/security/cve/CVE-2026-23230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: split cached_fid bitfields to avoid shared-byte RMW races

is_open, has_lease and on_list are stored in the same bitfield byte in
struct cached_fid but are updated in different code paths that may run
concurrently. Bitfield assignments generate byte read-modify-write
operations (e.g. `orb $mask, addr` on x86_64), so updating one flag can
restore stale values of the others.

A possible interleaving is:
    CPU1: load old byte (has_lease=1, on_list=1)
    CPU2: clear both flags (store 0)
    CPU1: RMW store (old | IS_OPEN) -&gt; reintroduces cleared bits

To avoid this class of races, convert these flags to separate bool
fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23230/">CVE-2026-23230 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23230">CVE-2026-23230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258430">SUSE bug 1258430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051991" comment="kernel-default-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051992" comment="kernel-rt-livepatch-6.12.0-160000.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23236</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23236" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23236" ref_url="https://www.suse.com/security/cve/CVE-2026-23236" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: smscufx: properly copy ioctl memory to kernelspace

The UFX_IOCTL_REPORT_DAMAGE ioctl does not properly copy data from
userspace to kernelspace, and instead directly references the memory,
which can cause problems if invalid data is passed from userspace.  Fix
this all up by correctly copying the memory before accessing it within
the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23236/">CVE-2026-23236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23236">CVE-2026-23236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259199">SUSE bug 1259199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259200">SUSE bug 1259200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23253</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23253" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23253" ref_url="https://www.suse.com/security/cve/CVE-2026-23253" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-core: fix wrong reinitialization of ringbuffer on reopen

dvb_dvr_open() calls dvb_ringbuffer_init() when a new reader opens the
DVR device.  dvb_ringbuffer_init() calls init_waitqueue_head(), which
reinitializes the waitqueue list head to empty.

Since dmxdev-&gt;dvr_buffer.queue is a shared waitqueue (all opens of the
same DVR device share it), this orphans any existing waitqueue entries
from io_uring poll or epoll, leaving them with stale prev/next pointers
while the list head is reset to {self, self}.

The waitqueue and spinlock in dvr_buffer are already properly
initialized once in dvb_dmxdev_init().  The open path only needs to
reset the buffer data pointer, size, and read/write positions.

Replace the dvb_ringbuffer_init() call in dvb_dvr_open() with direct
assignment of data/size and a call to dvb_ringbuffer_reset(), which
properly resets pread, pwrite, and error with correct memory ordering
without touching the waitqueue or spinlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23253/">CVE-2026-23253 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23253">CVE-2026-23253 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259878">SUSE bug 1259878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23259</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23259" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23259" ref_url="https://www.suse.com/security/cve/CVE-2026-23259" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/rw: free potentially allocated iovec on cache put failure

If a read/write request goes through io_req_rw_cleanup() and has an
allocated iovec attached and fails to put to the rw_cache, then it may
end up with an unaccounted iovec pointer. Have io_rw_recycle() return
whether it recycled the request or not, and use that to gauge whether to
free a potential iovec or not.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23259/">CVE-2026-23259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23259">CVE-2026-23259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259866">SUSE bug 1259866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23267</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23267" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23267" ref_url="https://www.suse.com/security/cve/CVE-2026-23267" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix IS_CHECKPOINTED flag inconsistency issue caused by concurrent atomic commit and checkpoint writes

During SPO tests, when mounting F2FS, an -EINVAL error was returned from
f2fs_recover_inode_page. The issue occurred under the following scenario

Thread A                                     Thread B
f2fs_ioc_commit_atomic_write
 - f2fs_do_sync_file // atomic = true
  - f2fs_fsync_node_pages
    : last_folio = inode folio
    : schedule before folio_lock(last_folio) f2fs_write_checkpoint
                                              - block_operations// writeback last_folio
                                              - schedule before f2fs_flush_nat_entries
    : set_fsync_mark(last_folio, 1)
    : set_dentry_mark(last_folio, 1)
    : folio_mark_dirty(last_folio)
    - __write_node_folio(last_folio)
      : f2fs_down_read(&amp;sbi-&gt;node_write)//block
                                              - f2fs_flush_nat_entries
                                                : {struct nat_entry}-&gt;flag |= BIT(IS_CHECKPOINTED)
                                              - unblock_operations
                                                : f2fs_up_write(&amp;sbi-&gt;node_write)
                                             f2fs_write_checkpoint//return
      : f2fs_do_write_node_page()
f2fs_ioc_commit_atomic_write//return
                                             SPO

Thread A calls f2fs_need_dentry_mark(sbi, ino), and the last_folio has
already been written once. However, the {struct nat_entry}-&gt;flag did not
have the IS_CHECKPOINTED set, causing set_dentry_mark(last_folio, 1) and
write last_folio again after Thread B finishes f2fs_write_checkpoint.

After SPO and reboot, it was detected that {struct node_info}-&gt;blk_addr
was not NULL_ADDR because Thread B successfully write the checkpoint.

This issue only occurs in atomic write scenarios. For regular file
fsync operations, the folio must be dirty. If
block_operations-&gt;f2fs_sync_node_pages successfully submit the folio
write, this path will not be executed. Otherwise, the
f2fs_write_checkpoint will need to wait for the folio write submission
to complete, as sbi-&gt;nr_pages[F2FS_DIRTY_NODES] &gt; 0. Therefore, the
situation where f2fs_need_dentry_mark checks that the {struct
nat_entry}-&gt;flag /wo the IS_CHECKPOINTED flag, but the folio write has
already been submitted, will not occur.

Therefore, for atomic file fsync, sbi-&gt;node_write should be acquired
through __write_node_folio to ensure that the IS_CHECKPOINTED flag
correctly indicates that the checkpoint write has been completed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-14"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23267/">CVE-2026-23267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23267">CVE-2026-23267 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259885">SUSE bug 1259885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23275</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23275" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23275" ref_url="https://www.suse.com/security/cve/CVE-2026-23275" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: ensure ctx-&gt;rings is stable for task work flags manipulation

If DEFER_TASKRUN | SETUP_TASKRUN is used and task work is added while
the ring is being resized, it's possible for the OR'ing of
IORING_SQ_TASKRUN to happen in the small window of swapping into the
new rings and the old rings being freed.

Prevent this by adding a 2nd -&gt;rings pointer, -&gt;rings_rcu, which is
protected by RCU. The task work flags manipulation is inside RCU
already, and if the resize ring freeing is done post an RCU synchronize,
then there's no need to add locking to the fast path of task work
additions.

Note: this is only done for DEFER_TASKRUN, as that's the only setup mode
that supports ring resizing. If this ever changes, then they too need to
use the io_ctx_mark_taskrun() helper.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-23275/">CVE-2026-23275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23275">CVE-2026-23275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260008">SUSE bug 1260008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23279</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23279" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23279" ref_url="https://www.suse.com/security/cve/CVE-2026-23279" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix NULL pointer dereference in mesh_rx_csa_frame()

In mesh_rx_csa_frame(), elems-&gt;mesh_chansw_params_ie is dereferenced
at lines 1638 and 1642 without a prior NULL check:

    ifmsh-&gt;chsw_ttl = elems-&gt;mesh_chansw_params_ie-&gt;mesh_ttl;
    ...
    pre_value = le16_to_cpu(elems-&gt;mesh_chansw_params_ie-&gt;mesh_pre_value);

The mesh_matches_local() check above only validates the Mesh ID,
Mesh Configuration, and Supported Rates IEs.  It does not verify the
presence of the Mesh Channel Switch Parameters IE (element ID 118).
When a received CSA action frame omits that IE, ieee802_11_parse_elems()
leaves elems-&gt;mesh_chansw_params_ie as NULL, and the unconditional
dereference causes a kernel NULL pointer dereference.

A remote mesh peer with an established peer link (PLINK_ESTAB) can
trigger this by sending a crafted SPECTRUM_MGMT/CHL_SWITCH action frame
that includes a matching Mesh ID and Mesh Configuration IE but omits the
Mesh Channel Switch Parameters IE.  No authentication beyond the default
open mesh peering is required.

Crash confirmed on kernel 6.17.0-5-generic via mac80211_hwsim:

  BUG: kernel NULL pointer dereference, address: 0000000000000000
  Oops: Oops: 0000 [#1] SMP NOPTI
  RIP: 0010:ieee80211_mesh_rx_queued_mgmt+0x143/0x2a0 [mac80211]
  CR2: 0000000000000000

Fix by adding a NULL check for mesh_chansw_params_ie after
mesh_matches_local() returns, consistent with how other optional IEs
are guarded throughout the mesh code.

The bug has been present since v3.13 (released 2014-01-19).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23279/">CVE-2026-23279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23279">CVE-2026-23279 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260468">SUSE bug 1260468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23291</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23291" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23291" ref_url="https://www.suse.com/security/cve/CVE-2026-23291" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: pn533: properly drop the usb interface reference on disconnect

When the device is disconnected from the driver, there is a "dangling"
reference count on the usb interface that was grabbed in the probe
callback.  Fix this up by properly dropping the reference after we are
done with it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23291/">CVE-2026-23291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23291">CVE-2026-23291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260483">SUSE bug 1260483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23299</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23299" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23299" ref_url="https://www.suse.com/security/cve/CVE-2026-23299" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: purge error queues in socket destructors

When TX timestamping is enabled via SO_TIMESTAMPING, SKBs may be queued
into sk_error_queue and will stay there until consumed. If userspace never
gets to read the timestamps, or if the controller is removed unexpectedly,
these SKBs will leak.

Fix by adding skb_queue_purge() calls for sk_error_queue in affected
bluetooth destructors. RFCOMM does not currently use sk_error_queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23299/">CVE-2026-23299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23299">CVE-2026-23299 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260519">SUSE bug 1260519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23301</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23301" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23301" ref_url="https://www.suse.com/security/cve/CVE-2026-23301" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SDCA: Add allocation failure check for Entity name

Currently find_sdca_entity_iot() can allocate a string for the
Entity name but it doesn't check if that allocation succeeded.
Add the missing NULL check after the allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23301/">CVE-2026-23301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23301">CVE-2026-23301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260574">SUSE bug 1260574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23307</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23307" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23307" ref_url="https://www.suse.com/security/cve/CVE-2026-23307" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message

When looking at the data in a USB urb, the actual_length is the size of
the buffer passed to the driver, not the transfer_buffer_length which is
set by the driver as the max size of the buffer.

When parsing the messages in ems_usb_read_bulk_callback() properly check
the size both at the beginning of parsing the message to make sure it is
big enough for the expected structure, and at the end of the message to
make sure we don't overflow past the end of the buffer for the next
message.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23307/">CVE-2026-23307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23307">CVE-2026-23307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260541">SUSE bug 1260541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23311</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23311" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23311" ref_url="https://www.suse.com/security/cve/CVE-2026-23311" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/core: Fix invalid wait context in ctx_sched_in()

Lockdep found a bug in the event scheduling when a pinned event was
failed and wakes up the threads in the ring buffer like below.

It seems it should not grab a wait-queue lock under perf-context lock.
Let's do it with irq_work.

  [   39.913691] =============================
  [   39.914157] [ BUG: Invalid wait context ]
  [   39.914623] 6.15.0-next-20250530-next-2025053 #1 Not tainted
  [   39.915271] -----------------------------
  [   39.915731] repro/837 is trying to lock:
  [   39.916191] ffff88801acfabd8 (&amp;event-&gt;waitq){....}-{3:3}, at: __wake_up+0x26/0x60
  [   39.917182] other info that might help us debug this:
  [   39.917761] context-{5:5}
  [   39.918079] 4 locks held by repro/837:
  [   39.918530]  #0: ffffffff8725cd00 (rcu_read_lock){....}-{1:3}, at: __perf_event_task_sched_in+0xd1/0xbc0
  [   39.919612]  #1: ffff88806ca3c6f8 (&amp;cpuctx_lock){....}-{2:2}, at: __perf_event_task_sched_in+0x1a7/0xbc0
  [   39.920748]  #2: ffff88800d91fc18 (&amp;ctx-&gt;lock){....}-{2:2}, at: __perf_event_task_sched_in+0x1f9/0xbc0
  [   39.921819]  #3: ffffffff8725cd00 (rcu_read_lock){....}-{1:3}, at: perf_event_wakeup+0x6c/0x470
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23311/">CVE-2026-23311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23311">CVE-2026-23311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260554">SUSE bug 1260554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23312</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23312" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23312" ref_url="https://www.suse.com/security/cve/CVE-2026-23312" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: kaweth: validate USB endpoints

The kaweth driver should validate that the device it is probing has the
proper number and types of USB endpoints it is expecting before it binds
to it.  If a malicious device were to not have the same urbs the driver
will crash later on when it blindly accesses these endpoints.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23312/">CVE-2026-23312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23312">CVE-2026-23312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260561">SUSE bug 1260561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23317</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23317" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23317" ref_url="https://www.suse.com/security/cve/CVE-2026-23317" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Return the correct value in vmw_translate_ptr functions

Before the referenced fixes these functions used a lookup function that
returned a pointer. This was changed to another lookup function that
returned an error code with the pointer becoming an out parameter.

The error path when the lookup failed was not changed to reflect this
change and the code continued to return the PTR_ERR of the now
uninitialized pointer. This could cause the vmw_translate_ptr functions
to return success when they actually failed causing further uninitialized
and OOB accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23317/">CVE-2026-23317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23317">CVE-2026-23317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260562">SUSE bug 1260562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1260563">SUSE bug 1260563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23318</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23318" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23318" ref_url="https://www.suse.com/security/cve/CVE-2026-23318" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Use correct version for UAC3 header validation

The entry of the validators table for UAC3 AC header descriptor is
defined with the wrong protocol version UAC_VERSION_2, while it should
have been UAC_VERSION_3.  This results in the validator never matching
for actual UAC3 devices (protocol == UAC_VERSION_3), causing their
header descriptors to bypass validation entirely.  A malicious USB
device presenting a truncated UAC3 header could exploit this to cause
out-of-bounds reads when the driver later accesses unvalidated
descriptor fields.

The bug was introduced in the same commit as the recently fixed UAC3
feature unit sub-type typo, and appears to be from the same copy-paste
error when the UAC3 section was created from the UAC2 section.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23318/">CVE-2026-23318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23318">CVE-2026-23318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260536">SUSE bug 1260536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23328</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23328" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23328" ref_url="https://www.suse.com/security/cve/CVE-2026-23328" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

accel/amdxdna: Fix NULL pointer dereference of mgmt_chann

mgmt_chann may be set to NULL if the firmware returns an unexpected
error in aie2_send_mgmt_msg_wait(). This can later lead to a NULL
pointer dereference in aie2_hw_stop().

Fix this by introducing a dedicated helper to destroy mgmt_chann
and by adding proper NULL checks before accessing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23328/">CVE-2026-23328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23328">CVE-2026-23328 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260510">SUSE bug 1260510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23329</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23329" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23329" ref_url="https://www.suse.com/security/cve/CVE-2026-23329" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libie: don't unroll if fwlog isn't supported

The libie_fwlog_deinit() function can be called during driver unload
even when firmware logging was never properly initialized. This led to call
trace:

[  148.576156] Oops: Oops: 0000 [#1] SMP NOPTI
[  148.576167] CPU: 80 UID: 0 PID: 12843 Comm: rmmod Kdump: loaded Not tainted 6.17.0-rc7next-queue-3oct-01915-g06d79d51cf51 #1 PREEMPT(full)
[  148.576177] Hardware name: HPE ProLiant DL385 Gen10 Plus/ProLiant DL385 Gen10 Plus, BIOS A42 07/18/2020
[  148.576182] RIP: 0010:__dev_printk+0x16/0x70
[  148.576196] Code: 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 41 55 41 54 49 89 d4 55 48 89 fd 53 48 85 f6 74 3c &lt;4c&gt; 8b 6e 50 48 89 f3 4d 85 ed 75 03 4c 8b 2e 48 89 df e8 f3 27 98
[  148.576204] RSP: 0018:ffffd2fd7ea17a48 EFLAGS: 00010202
[  148.576211] RAX: ffffd2fd7ea17aa0 RBX: ffff8eb288ae2000 RCX: 0000000000000000
[  148.576217] RDX: ffffd2fd7ea17a70 RSI: 00000000000000c8 RDI: ffffffffb68d3d88
[  148.576222] RBP: ffffffffb68d3d88 R08: 0000000000000000 R09: 0000000000000000
[  148.576227] R10: 00000000000000c8 R11: ffff8eb2b1a49400 R12: ffffd2fd7ea17a70
[  148.576231] R13: ffff8eb3141fb000 R14: ffffffffc1215b48 R15: ffffffffc1215bd8
[  148.576236] FS:  00007f5666ba6740(0000) GS:ffff8eb2472b9000(0000) knlGS:0000000000000000
[  148.576242] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  148.576247] CR2: 0000000000000118 CR3: 000000011ad17000 CR4: 0000000000350ef0
[  148.576252] Call Trace:
[  148.576258]  &lt;TASK&gt;
[  148.576269]  _dev_warn+0x7c/0x96
[  148.576290]  libie_fwlog_deinit+0x112/0x117 [libie_fwlog]
[  148.576303]  ixgbe_remove+0x63/0x290 [ixgbe]
[  148.576342]  pci_device_remove+0x42/0xb0
[  148.576354]  device_release_driver_internal+0x19c/0x200
[  148.576365]  driver_detach+0x48/0x90
[  148.576372]  bus_remove_driver+0x6d/0xf0
[  148.576383]  pci_unregister_driver+0x2e/0xb0
[  148.576393]  ixgbe_exit_module+0x1c/0xd50 [ixgbe]
[  148.576430]  __do_sys_delete_module.isra.0+0x1bc/0x2e0
[  148.576446]  do_syscall_64+0x7f/0x980

It can be reproduced by trying to unload ixgbe driver in recovery mode.

Fix that by checking if fwlog is supported before doing unroll.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23329/">CVE-2026-23329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23329">CVE-2026-23329 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260733">SUSE bug 1260733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23336</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23336" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23336" ref_url="https://www.suse.com/security/cve/CVE-2026-23336" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: cancel rfkill_block work in wiphy_unregister()

There is a use-after-free error in cfg80211_shutdown_all_interfaces found
by syzkaller:

BUG: KASAN: use-after-free in cfg80211_shutdown_all_interfaces+0x213/0x220
Read of size 8 at addr ffff888112a78d98 by task kworker/0:5/5326
CPU: 0 UID: 0 PID: 5326 Comm: kworker/0:5 Not tainted 6.19.0-rc2 #2 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Workqueue: events cfg80211_rfkill_block_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x116/0x1f0
 print_report+0xcd/0x630
 kasan_report+0xe0/0x110
 cfg80211_shutdown_all_interfaces+0x213/0x220
 cfg80211_rfkill_block_work+0x1e/0x30
 process_one_work+0x9cf/0x1b70
 worker_thread+0x6c8/0xf10
 kthread+0x3c5/0x780
 ret_from_fork+0x56d/0x700
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

The problem arises due to the rfkill_block work is not cancelled when wiphy
is being unregistered. In order to fix the issue cancel the corresponding
work in wiphy_unregister().

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23336/">CVE-2026-23336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23336">CVE-2026-23336 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260552">SUSE bug 1260552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23338</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23338" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23338" ref_url="https://www.suse.com/security/cve/CVE-2026-23338" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/userq: Do not allow userspace to trivially triger kernel warnings

Userspace can either deliberately pass in the too small num_fences, or the
required number can legitimately grow between the two calls to the userq
wait ioctl. In both cases we do not want the emit the kernel warning
backtrace since nothing is wrong with the kernel and userspace will simply
get an errno reported back. So lets simply drop the WARN_ONs.

(cherry picked from commit 2c333ea579de6cc20ea7bc50e9595ef72863e65c)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23338/">CVE-2026-23338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23338">CVE-2026-23338 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260509">SUSE bug 1260509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23339</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23339" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23339" ref_url="https://www.suse.com/security/cve/CVE-2026-23339" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: free skb on nci_transceive early error paths

nci_transceive() takes ownership of the skb passed by the caller,
but the -EPROTO, -EINVAL, and -EBUSY error paths return without
freeing it.

Due to issues clearing NCI_DATA_EXCHANGE fixed by subsequent changes
the nci/nci_dev selftest hits the error path occasionally in NIPA,
and kmemleak detects leaks:

unreferenced object 0xff11000015ce6a40 (size 640):
  comm "nci_dev", pid 3954, jiffies 4295441246
  hex dump (first 32 bytes):
    6b 6b 6b 6b 00 a4 00 0c 02 e1 03 6b 6b 6b 6b 6b  kkkk.......kkkkk
    6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
  backtrace (crc 7c40cc2a):
    kmem_cache_alloc_node_noprof+0x492/0x630
    __alloc_skb+0x11e/0x5f0
    alloc_skb_with_frags+0xc6/0x8f0
    sock_alloc_send_pskb+0x326/0x3f0
    nfc_alloc_send_skb+0x94/0x1d0
    rawsock_sendmsg+0x162/0x4c0
    do_syscall_64+0x117/0xfc0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23339/">CVE-2026-23339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23339">CVE-2026-23339 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260581">SUSE bug 1260581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23352</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23352" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23352" ref_url="https://www.suse.com/security/cve/CVE-2026-23352" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/efi: defer freeing of boot services memory

efi_free_boot_services() frees memory occupied by EFI_BOOT_SERVICES_CODE
and EFI_BOOT_SERVICES_DATA using memblock_free_late().

There are two issue with that: memblock_free_late() should be used for
memory allocated with memblock_alloc() while the memory reserved with
memblock_reserve() should be freed with free_reserved_area().

More acutely, with CONFIG_DEFERRED_STRUCT_PAGE_INIT=y
efi_free_boot_services() is called before deferred initialization of the
memory map is complete.

Benjamin Herrenschmidt reports that this causes a leak of ~140MB of
RAM on EC2 t3a.nano instances which only have 512MB or RAM.

If the freed memory resides in the areas that memory map for them is
still uninitialized, they won't be actually freed because
memblock_free_late() calls memblock_free_pages() and the latter skips
uninitialized pages.

Using free_reserved_area() at this point is also problematic because
__free_page() accesses the buddy of the freed page and that again might
end up in uninitialized part of the memory map.

Delaying the entire efi_free_boot_services() could be problematic
because in addition to freeing boot services memory it updates
efi.memmap without any synchronization and that's undesirable late in
boot when there is concurrency.

More robust approach is to only defer freeing of the EFI boot services
memory.

Split efi_free_boot_services() in two. First efi_unmap_boot_services()
collects ranges that should be freed into an array then
efi_free_boot_services() later frees them after deferred init is complete.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23352/">CVE-2026-23352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23352">CVE-2026-23352 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260474">SUSE bug 1260474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23353</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23353" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23353" ref_url="https://www.suse.com/security/cve/CVE-2026-23353" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix crash in ethtool offline loopback test

Since the conversion of ice to page pool, the ethtool loopback test
crashes:

 BUG: kernel NULL pointer dereference, address: 000000000000000c
 #PF: supervisor write access in kernel mode
 #PF: error_code(0x0002) - not-present page
 PGD 1100f1067 P4D 0
 Oops: Oops: 0002 [#1] SMP NOPTI
 CPU: 23 UID: 0 PID: 5904 Comm: ethtool Kdump: loaded Not tainted 6.19.0-0.rc7.260128g1f97d9dcf5364.49.eln154.x86_64 #1 PREEMPT(lazy)
 Hardware name: [...]
 RIP: 0010:ice_alloc_rx_bufs+0x1cd/0x310 [ice]
 Code: 83 6c 24 30 01 66 41 89 47 08 0f 84 c0 00 00 00 41 0f b7 dc 48 8b 44 24 18 48 c1 e3 04 41 bb 00 10 00 00 48 8d 2c 18 8b 04 24 &lt;89&gt; 45 0c 41 8b 4d 00 49 d3 e3 44 3b 5c 24 24 0f 83 ac fe ff ff 44
 RSP: 0018:ff7894738aa1f768 EFLAGS: 00010246
 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
 RDX: 0000000000000000 RSI: 0000000000000700 RDI: 0000000000000000
 RBP: 0000000000000000 R08: ff16dcae79880200 R09: 0000000000000019
 R10: 0000000000000001 R11: 0000000000001000 R12: 0000000000000000
 R13: 0000000000000000 R14: 0000000000000000 R15: ff16dcae6c670000
 FS:  00007fcf428850c0(0000) GS:ff16dcb149710000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000000000000000c CR3: 0000000121227005 CR4: 0000000000773ef0
 PKRU: 55555554
 Call Trace:
  &lt;TASK&gt;
  ice_vsi_cfg_rxq+0xca/0x460 [ice]
  ice_vsi_cfg_rxqs+0x54/0x70 [ice]
  ice_loopback_test+0xa9/0x520 [ice]
  ice_self_test+0x1b9/0x280 [ice]
  ethtool_self_test+0xe5/0x200
  __dev_ethtool+0x1106/0x1a90
  dev_ethtool+0xbe/0x1a0
  dev_ioctl+0x258/0x4c0
  sock_do_ioctl+0xe3/0x130
  __x64_sys_ioctl+0xb9/0x100
  do_syscall_64+0x7c/0x700
  entry_SYSCALL_64_after_hwframe+0x76/0x7e
  [...]

It crashes because we have not initialized libeth for the rx ring.

Fix it by treating ICE_VSI_LB VSIs slightly more like normal PF VSIs and
letting them have a q_vector. It's just a dummy, because the loopback
test does not use interrupts, but it contains a napi struct that can be
passed to libeth_rx_fq_create() called from ice_vsi_cfg_rxq() -&gt;
ice_rxq_pp_create().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23353/">CVE-2026-23353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23353">CVE-2026-23353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260512">SUSE bug 1260512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23358</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23358" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23358" ref_url="https://www.suse.com/security/cve/CVE-2026-23358" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix error handling in slot reset

If the device has not recovered after slot reset is called, it goes to
out label for error handling. There it could make decision based on
uninitialized hive pointer and could result in accessing an uninitialized
list.

Initialize the list and hive properly so that it handles the error
situation and also releases the reset domain lock which is acquired
during error_detected callback.

(cherry picked from commit bb71362182e59caa227e4192da5a612b09349696)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23358/">CVE-2026-23358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23358">CVE-2026-23358 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260511">SUSE bug 1260511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23362</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23362" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23362" ref_url="https://www.suse.com/security/cve/CVE-2026-23362" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: bcm: fix locking for bcm_op runtime updates

Commit c2aba69d0c36 ("can: bcm: add locking for bcm_op runtime updates")
added a locking for some variables that can be modified at runtime when
updating the sending bcm_op with a new TX_SETUP command in bcm_tx_setup().

Usually the RX_SETUP only handles and filters incoming traffic with one
exception: When the RX_RTR_FRAME flag is set a predefined CAN frame is
sent when a specific RTR frame is received. Therefore the rx bcm_op uses
bcm_can_tx() which uses the bcm_tx_lock that was only initialized in
bcm_tx_setup(). Add the missing spin_lock_init() when allocating the
bcm_op in bcm_rx_setup() to handle the RTR case properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23362/">CVE-2026-23362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23362">CVE-2026-23362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260489">SUSE bug 1260489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23366</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23366" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23366" ref_url="https://www.suse.com/security/cve/CVE-2026-23366" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/client: Do not destroy NULL modes

'modes' in drm_client_modeset_probe may fail to kcalloc.  If this
occurs, we jump to 'out', calling modes_destroy on it, which
dereferences it.  This may result in a NULL pointer dereference in the
error case.  Prevent that.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23366/">CVE-2026-23366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23366">CVE-2026-23366 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260508">SUSE bug 1260508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23367</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23367" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23367" ref_url="https://www.suse.com/security/cve/CVE-2026-23367" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: radiotap: reject radiotap with unknown bits

The radiotap parser is currently only used with the radiotap
namespace (not with vendor namespaces), but if the undefined
field 18 is used, the alignment/size is unknown as well. In
this case, iterator-&gt;_next_ns_data isn't initialized (it's
only set for skipping vendor namespaces), and syzbot points
out that we later compare against this uninitialized value.

Fix this by moving the rejection of unknown radiotap fields
down to after the in-namespace lookup, so it will really use
iterator-&gt;_next_ns_data only for vendor namespaces, even in
case undefined fields are present.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23367/">CVE-2026-23367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23367">CVE-2026-23367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260731">SUSE bug 1260731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23372</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23372" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23372" ref_url="https://www.suse.com/security/cve/CVE-2026-23372" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: rawsock: cancel tx_work before socket teardown

In rawsock_release(), cancel any pending tx_work and purge the write
queue before orphaning the socket.  rawsock_tx_work runs on the system
workqueue and calls nfc_data_exchange which dereferences the NCI
device.  Without synchronization, tx_work can race with socket and
device teardown when a process is killed (e.g. by SIGKILL), leading
to use-after-free or leaked references.

Set SEND_SHUTDOWN first so that if tx_work is already running it will
see the flag and skip transmitting, then use cancel_work_sync to wait
for any in-progress execution to finish, and finally purge any
remaining queued skbs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23372/">CVE-2026-23372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23372">CVE-2026-23372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260484">SUSE bug 1260484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23400</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23400" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23400" ref_url="https://www.suse.com/security/cve/CVE-2026-23400" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rust_binder: call set_notification_done() without proc lock

Consider the following sequence of events on a death listener:
1. The remote process dies and sends a BR_DEAD_BINDER message.
2. The local process invokes the BC_CLEAR_DEATH_NOTIFICATION command.
3. The local process then invokes the BC_DEAD_BINDER_DONE.
Then, the kernel will reply to the BC_DEAD_BINDER_DONE command with a
BR_CLEAR_DEATH_NOTIFICATION_DONE reply using push_work_if_looper().

However, this can result in a deadlock if the current thread is not a
looper. This is because dead_binder_done() still holds the proc lock
during set_notification_done(), which called push_work_if_looper().
Normally, push_work_if_looper() takes the thread lock, which is fine to
take under the proc lock. But if the current thread is not a looper,
then it falls back to delivering the reply to the process work queue,
which involves taking the proc lock. Since the proc lock is already
held, this is a deadlock.

Fix this by releasing the proc lock during set_notification_done(). It
was not intentional that it was held during that function to begin with.

I don't think this ever happens in Android because BC_DEAD_BINDER_DONE
is only invoked in response to BR_DEAD_BINDER messages, and the kernel
always delivers BR_DEAD_BINDER to a looper. So there's no scenario where
Android userspace will call BC_DEAD_BINDER_DONE on a non-looper thread.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-31"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23400/">CVE-2026-23400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23400">CVE-2026-23400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261022">SUSE bug 1261022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23402</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23402" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23402" ref_url="https://www.suse.com/security/cve/CVE-2026-23402" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/mmu: Only WARN in direct MMUs when overwriting shadow-present SPTE

Adjust KVM's sanity check against overwriting a shadow-present SPTE with a
another SPTE with a different target PFN to only apply to direct MMUs,
i.e. only to MMUs without shadowed gPTEs.  While it's impossible for KVM
to overwrite a shadow-present SPTE in response to a guest write, writes
from outside the scope of KVM, e.g. from host userspace, aren't detected
by KVM's write tracking and so can break KVM's shadow paging rules.

  ------------[ cut here ]------------
  pfn != spte_to_pfn(*sptep)
  WARNING: arch/x86/kvm/mmu/mmu.c:3069 at mmu_set_spte+0x1e4/0x440 [kvm], CPU#0: vmx_ept_stale_r/872
  Modules linked in: kvm_intel kvm irqbypass
  CPU: 0 UID: 1000 PID: 872 Comm: vmx_ept_stale_r Not tainted 7.0.0-rc2-eafebd2d2ab0-sink-vm #319 PREEMPT
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  RIP: 0010:mmu_set_spte+0x1e4/0x440 [kvm]
  Call Trace:
   &lt;TASK&gt;
   ept_page_fault+0x535/0x7f0 [kvm]
   kvm_mmu_do_page_fault+0xee/0x1f0 [kvm]
   kvm_mmu_page_fault+0x8d/0x620 [kvm]
   vmx_handle_exit+0x18c/0x5a0 [kvm_intel]
   kvm_arch_vcpu_ioctl_run+0xc55/0x1c20 [kvm]
   kvm_vcpu_ioctl+0x2d5/0x980 [kvm]
   __x64_sys_ioctl+0x8a/0xd0
   do_syscall_64+0xb5/0x730
   entry_SYSCALL_64_after_hwframe+0x4b/0x53
   &lt;/TASK&gt;
  ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23402/">CVE-2026-23402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23402">CVE-2026-23402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261336">SUSE bug 1261336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23415</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23415" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23415" ref_url="https://www.suse.com/security/cve/CVE-2026-23415" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

futex: Fix UaF between futex_key_to_node_opt() and vma_replace_policy()

During futex_key_to_node_opt() execution, vma-&gt;vm_policy is read under
speculative mmap lock and RCU. Concurrently, mbind() may call
vma_replace_policy() which frees the old mempolicy immediately via
kmem_cache_free().

This creates a race where __futex_key_to_node() dereferences a freed
mempolicy pointer, causing a use-after-free read of mpol-&gt;mode.

[  151.412631] BUG: KASAN: slab-use-after-free in __futex_key_to_node (kernel/futex/core.c:349)
[  151.414046] Read of size 2 at addr ffff888001c49634 by task e/87

[  151.415969] Call Trace:

[  151.416732]  __asan_load2 (mm/kasan/generic.c:271)
[  151.416777]  __futex_key_to_node (kernel/futex/core.c:349)
[  151.416822]  get_futex_key (kernel/futex/core.c:374 kernel/futex/core.c:386 kernel/futex/core.c:593)

Fix by adding rcu to __mpol_put().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23415/">CVE-2026-23415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23415">CVE-2026-23415 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261497">SUSE bug 1261497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23416</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23416" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23416" ref_url="https://www.suse.com/security/cve/CVE-2026-23416" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/mseal: update VMA end correctly on merge

Previously we stored the end of the current VMA in curr_end, and then upon
iterating to the next VMA updated curr_start to curr_end to advance to the
next VMA.

However, this doesn't take into account the fact that a VMA might be
updated due to a merge by vma_modify_flags(), which can result in curr_end
being stale and thus, upon setting curr_start to curr_end, ending up with
an incorrect curr_start on the next iteration.

Resolve the issue by setting curr_end to vma-&gt;vm_end unconditionally to
ensure this value remains updated should this occur.

While we're here, eliminate this entire class of bug by simply setting
const curr_[start/end] to be clamped to the input range and VMAs, which
also happens to simplify the logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23416/">CVE-2026-23416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23416">CVE-2026-23416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261411">SUSE bug 1261411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23418</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23418" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23418" ref_url="https://www.suse.com/security/cve/CVE-2026-23418" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/reg_sr: Fix leak on xa_store failure

Free the newly allocated entry when xa_store() fails to avoid a memory
leak on the error path.

v2: use goto fail_free. (Bala)

(cherry picked from commit 6bc6fec71ac45f52db609af4e62bdb96b9f5fadb)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23418/">CVE-2026-23418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23418">CVE-2026-23418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261505">SUSE bug 1261505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23420</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23420" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23420" ref_url="https://www.suse.com/security/cve/CVE-2026-23420" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wlcore: Fix a locking bug

Make sure that wl-&gt;mutex is locked before it is unlocked. This has been
detected by the Clang thread-safety analyzer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23420/">CVE-2026-23420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23420">CVE-2026-23420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261503">SUSE bug 1261503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23421</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23421" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23421" ref_url="https://www.suse.com/security/cve/CVE-2026-23421" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/configfs: Free ctx_restore_mid_bb in release

ctx_restore_mid_bb memory is allocated in wa_bb_store(), but
xe_config_device_release() only frees ctx_restore_post_bb.

Free ctx_restore_mid_bb[0].cs as well to avoid leaking the allocation
when the configfs device is removed.

(cherry picked from commit a235e7d0098337c3f2d1e8f3610c719a589e115f)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23421/">CVE-2026-23421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23421">CVE-2026-23421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261509">SUSE bug 1261509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23422</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23422" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23422" ref_url="https://www.suse.com/security/cve/CVE-2026-23422" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dpaa2-switch: Fix interrupt storm after receiving bad if_id in IRQ handler

Commit 31a7a0bbeb00 ("dpaa2-switch: add bounds check for if_id in IRQ
handler") introduces a range check for if_id to avoid an out-of-bounds
access. If an out-of-bounds if_id is detected, the interrupt status is
not cleared. This may result in an interrupt storm.

Clear the interrupt status after detecting an out-of-bounds if_id to avoid
the problem.

Found by an experimental AI code review agent at Google.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23422/">CVE-2026-23422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23422">CVE-2026-23422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261508">SUSE bug 1261508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23423</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23423" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23423" ref_url="https://www.suse.com/security/cve/CVE-2026-23423" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: free pages on error in btrfs_uring_read_extent()

In this function the 'pages' object is never freed in the hopes that it is
picked up by btrfs_uring_read_finished() whenever that executes in the
future. But that's just the happy path. Along the way previous
allocations might have gone wrong, or we might not get -EIOCBQUEUED from
btrfs_encoded_read_regular_fill_pages(). In all these cases, we go to a
cleanup section that frees all memory allocated by this function without
assuming any deferred execution, and this also needs to happen for the
'pages' allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23423/">CVE-2026-23423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23423">CVE-2026-23423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261510">SUSE bug 1261510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23424</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23424" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23424" ref_url="https://www.suse.com/security/cve/CVE-2026-23424" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

accel/amdxdna: Validate command buffer payload count

The count field in the command header is used to determine the valid
payload size. Verify that the valid payload does not exceed the remaining
buffer space.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23424/">CVE-2026-23424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23424">CVE-2026-23424 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261502">SUSE bug 1261502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23426</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23426" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23426" ref_url="https://www.suse.com/security/cve/CVE-2026-23426" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/logicvc: Fix device node reference leak in logicvc_drm_config_parse()

The logicvc_drm_config_parse() function calls of_get_child_by_name() to
find the "layers" node but fails to release the reference, leading to a
device node reference leak.

Fix this by using the __free(device_node) cleanup attribute to automatic
release the reference when the variable goes out of scope.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23426/">CVE-2026-23426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23426">CVE-2026-23426 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261504">SUSE bug 1261504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23427</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23427" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23427" ref_url="https://www.suse.com/security/cve/CVE-2026-23427" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix use-after-free in durable v2 replay of active file handles

parse_durable_handle_context() unconditionally assigns dh_info-&gt;fp-&gt;conn
to the current connection when handling a DURABLE_REQ_V2 context with
SMB2_FLAGS_REPLAY_OPERATION. ksmbd_lookup_fd_cguid() does not filter by
fp-&gt;conn, so it returns file handles that are already actively connected.
The unconditional overwrite replaces fp-&gt;conn, and when the overwriting
connection is subsequently freed, __ksmbd_close_fd() dereferences the
stale fp-&gt;conn via spin_lock(&amp;fp-&gt;conn-&gt;llist_lock), causing a
use-after-free.

KASAN report:

[    7.349357] ==================================================================
[    7.349607] BUG: KASAN: slab-use-after-free in _raw_spin_lock+0x75/0xe0
[    7.349811] Write of size 4 at addr ffff8881056ac18c by task kworker/1:2/108
[    7.350010]
[    7.350064] CPU: 1 UID: 0 PID: 108 Comm: kworker/1:2 Not tainted 7.0.0-rc3+ #58 PREEMPTLAZY
[    7.350068] Hardware name: QEMU Ubuntu 24.04 PC v2 (i440FX + PIIX, arch_caps fix, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[    7.350070] Workqueue: ksmbd-io handle_ksmbd_work
[    7.350083] Call Trace:
[    7.350087]  &lt;TASK&gt;
[    7.350087]  dump_stack_lvl+0x64/0x80
[    7.350094]  print_report+0xce/0x660
[    7.350100]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
[    7.350101]  ? __pfx___mod_timer+0x10/0x10
[    7.350106]  ? _raw_spin_lock+0x75/0xe0
[    7.350108]  kasan_report+0xce/0x100
[    7.350109]  ? _raw_spin_lock+0x75/0xe0
[    7.350114]  kasan_check_range+0x105/0x1b0
[    7.350116]  _raw_spin_lock+0x75/0xe0
[    7.350118]  ? __pfx__raw_spin_lock+0x10/0x10
[    7.350119]  ? __call_rcu_common.constprop.0+0x25e/0x780
[    7.350125]  ? close_id_del_oplock+0x2cc/0x4e0
[    7.350128]  __ksmbd_close_fd+0x27f/0xaf0
[    7.350131]  ksmbd_close_fd+0x135/0x1b0
[    7.350133]  smb2_close+0xb19/0x15b0
[    7.350142]  ? __pfx_smb2_close+0x10/0x10
[    7.350143]  ? xas_load+0x18/0x270
[    7.350146]  ? _raw_spin_lock+0x84/0xe0
[    7.350148]  ? __pfx__raw_spin_lock+0x10/0x10
[    7.350150]  ? _raw_spin_unlock+0xe/0x30
[    7.350151]  ? ksmbd_smb2_check_message+0xeb2/0x24c0
[    7.350153]  ? ksmbd_tree_conn_lookup+0xcd/0xf0
[    7.350154]  handle_ksmbd_work+0x40f/0x1080
[    7.350156]  process_one_work+0x5fa/0xef0
[    7.350162]  ? assign_work+0x122/0x3e0
[    7.350163]  worker_thread+0x54b/0xf70
[    7.350165]  ? __pfx_worker_thread+0x10/0x10
[    7.350166]  kthread+0x346/0x470
[    7.350170]  ? recalc_sigpending+0x19b/0x230
[    7.350176]  ? __pfx_kthread+0x10/0x10
[    7.350178]  ret_from_fork+0x4fb/0x6c0
[    7.350183]  ? __pfx_ret_from_fork+0x10/0x10
[    7.350185]  ? __switch_to+0x36c/0xbe0
[    7.350188]  ? __pfx_kthread+0x10/0x10
[    7.350190]  ret_from_fork_asm+0x1a/0x30
[    7.350197]  &lt;/TASK&gt;
[    7.350197]
[    7.355160] Allocated by task 123:
[    7.355261]  kasan_save_stack+0x33/0x60
[    7.355373]  kasan_save_track+0x14/0x30
[    7.355484]  __kasan_kmalloc+0x8f/0xa0
[    7.355593]  ksmbd_conn_alloc+0x44/0x6d0
[    7.355711]  ksmbd_kthread_fn+0x243/0xd70
[    7.355839]  kthread+0x346/0x470
[    7.355942]  ret_from_fork+0x4fb/0x6c0
[    7.356051]  ret_from_fork_asm+0x1a/0x30
[    7.356164]
[    7.356214] Freed by task 134:
[    7.356305]  kasan_save_stack+0x33/0x60
[    7.356416]  kasan_save_track+0x14/0x30
[    7.356527]  kasan_save_free_info+0x3b/0x60
[    7.356646]  __kasan_slab_free+0x43/0x70
[    7.356761]  kfree+0x1ca/0x430
[    7.356862]  ksmbd_tcp_disconnect+0x59/0xe0
[    7.356993]  ksmbd_conn_handler_loop+0x77e/0xd40
[    7.357138]  kthread+0x346/0x470
[    7.357240]  ret_from_fork+0x4fb/0x6c0
[    7.357350]  ret_from_fork_asm+0x1a/0x30
[    7.357463]
[    7.357513] The buggy address belongs to the object at ffff8881056ac000
[    7.357513]  which belongs to the cache kmalloc-1k of size 1024
[    7.357857] The buggy address is located 396 bytes inside of
[    7.357857]  freed 1024-byte region 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23427/">CVE-2026-23427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23427">CVE-2026-23427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261576">SUSE bug 1261576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23428</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23428" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23428" ref_url="https://www.suse.com/security/cve/CVE-2026-23428" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix use-after-free of share_conf in compound request

smb2_get_ksmbd_tcon() reuses work-&gt;tcon in compound requests without
validating tcon-&gt;t_state. ksmbd_tree_conn_lookup() checks t_state ==
TREE_CONNECTED on the initial lookup path, but the compound reuse path
bypasses this check entirely.

If a prior command in the compound (SMB2_TREE_DISCONNECT) sets t_state
to TREE_DISCONNECTED and frees share_conf via ksmbd_share_config_put(),
subsequent commands dereference the freed share_conf through
work-&gt;tcon-&gt;share_conf.

KASAN report:

[    4.144653] ==================================================================
[    4.145059] BUG: KASAN: slab-use-after-free in smb2_write+0xc74/0xe70
[    4.145415] Read of size 4 at addr ffff88810430c194 by task kworker/1:1/44
[    4.145772]
[    4.145867] CPU: 1 UID: 0 PID: 44 Comm: kworker/1:1 Not tainted 7.0.0-rc3+ #60 PREEMPTLAZY
[    4.145871] Hardware name: QEMU Ubuntu 24.04 PC v2 (i440FX + PIIX, arch_caps fix, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[    4.145875] Workqueue: ksmbd-io handle_ksmbd_work
[    4.145888] Call Trace:
[    4.145892]  &lt;TASK&gt;
[    4.145894]  dump_stack_lvl+0x64/0x80
[    4.145910]  print_report+0xce/0x660
[    4.145919]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
[    4.145928]  ? smb2_write+0xc74/0xe70
[    4.145931]  kasan_report+0xce/0x100
[    4.145934]  ? smb2_write+0xc74/0xe70
[    4.145937]  smb2_write+0xc74/0xe70
[    4.145939]  ? __pfx_smb2_write+0x10/0x10
[    4.145942]  ? _raw_spin_unlock+0xe/0x30
[    4.145945]  ? ksmbd_smb2_check_message+0xeb2/0x24c0
[    4.145948]  ? smb2_tree_disconnect+0x31c/0x480
[    4.145951]  handle_ksmbd_work+0x40f/0x1080
[    4.145953]  process_one_work+0x5fa/0xef0
[    4.145962]  ? assign_work+0x122/0x3e0
[    4.145964]  worker_thread+0x54b/0xf70
[    4.145967]  ? __pfx_worker_thread+0x10/0x10
[    4.145970]  kthread+0x346/0x470
[    4.145976]  ? recalc_sigpending+0x19b/0x230
[    4.145980]  ? __pfx_kthread+0x10/0x10
[    4.145984]  ret_from_fork+0x4fb/0x6c0
[    4.145992]  ? __pfx_ret_from_fork+0x10/0x10
[    4.145995]  ? __switch_to+0x36c/0xbe0
[    4.145999]  ? __pfx_kthread+0x10/0x10
[    4.146003]  ret_from_fork_asm+0x1a/0x30
[    4.146013]  &lt;/TASK&gt;
[    4.146014]
[    4.149858] Allocated by task 44:
[    4.149953]  kasan_save_stack+0x33/0x60
[    4.150061]  kasan_save_track+0x14/0x30
[    4.150169]  __kasan_kmalloc+0x8f/0xa0
[    4.150274]  ksmbd_share_config_get+0x1dd/0xdd0
[    4.150401]  ksmbd_tree_conn_connect+0x7e/0x600
[    4.150529]  smb2_tree_connect+0x2e6/0x1000
[    4.150645]  handle_ksmbd_work+0x40f/0x1080
[    4.150761]  process_one_work+0x5fa/0xef0
[    4.150873]  worker_thread+0x54b/0xf70
[    4.150978]  kthread+0x346/0x470
[    4.151071]  ret_from_fork+0x4fb/0x6c0
[    4.151176]  ret_from_fork_asm+0x1a/0x30
[    4.151286]
[    4.151332] Freed by task 44:
[    4.151418]  kasan_save_stack+0x33/0x60
[    4.151526]  kasan_save_track+0x14/0x30
[    4.151634]  kasan_save_free_info+0x3b/0x60
[    4.151751]  __kasan_slab_free+0x43/0x70
[    4.151861]  kfree+0x1ca/0x430
[    4.151952]  __ksmbd_tree_conn_disconnect+0xc8/0x190
[    4.152088]  smb2_tree_disconnect+0x1cd/0x480
[    4.152211]  handle_ksmbd_work+0x40f/0x1080
[    4.152326]  process_one_work+0x5fa/0xef0
[    4.152438]  worker_thread+0x54b/0xf70
[    4.152545]  kthread+0x346/0x470
[    4.152638]  ret_from_fork+0x4fb/0x6c0
[    4.152743]  ret_from_fork_asm+0x1a/0x30
[    4.152853]
[    4.152900] The buggy address belongs to the object at ffff88810430c180
[    4.152900]  which belongs to the cache kmalloc-96 of size 96
[    4.153226] The buggy address is located 20 bytes inside of
[    4.153226]  freed 96-byte region [ffff88810430c180, ffff88810430c1e0)
[    4.153549]
[    4.153596] The buggy address belongs to the physical page:
[    4.153750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff88810430ce80 pfn:0x10430c
[    4.154000] flags: 0x
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-12"/>
	<updated date="2026-04-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23428/">CVE-2026-23428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23428">CVE-2026-23428 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261577">SUSE bug 1261577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23429</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23429" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23429" ref_url="https://www.suse.com/security/cve/CVE-2026-23429" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/sva: Fix crash in iommu_sva_unbind_device()

domain-&gt;mm-&gt;iommu_mm can be freed by iommu_domain_free():
  iommu_domain_free()
    mmdrop()
      __mmdrop()
        mm_pasid_drop()
After iommu_domain_free() returns, accessing domain-&gt;mm-&gt;iommu_mm may
dereference a freed mm structure, leading to a crash.

Fix this by moving the code that accesses domain-&gt;mm-&gt;iommu_mm to before
the call to iommu_domain_free().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23429/">CVE-2026-23429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23429">CVE-2026-23429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261574">SUSE bug 1261574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23430</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23430" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23430" ref_url="https://www.suse.com/security/cve/CVE-2026-23430" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Don't overwrite KMS surface dirty tracker

We were overwriting the surface's dirty tracker here causing a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23430/">CVE-2026-23430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23430">CVE-2026-23430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261599">SUSE bug 1261599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23431</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23431" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23431" ref_url="https://www.suse.com/security/cve/CVE-2026-23431" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: amlogic-spisg: Fix memory leak in aml_spisg_probe()

In aml_spisg_probe(), ctlr is allocated by
spi_alloc_target()/spi_alloc_host(), but fails to call
spi_controller_put() in several error paths. This leads
to a memory leak whenever the driver fails to probe after
the initial allocation.

Convert to use devm_spi_alloc_host()/devm_spi_alloc_target()
to fix the memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23431/">CVE-2026-23431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23431">CVE-2026-23431 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261583">SUSE bug 1261583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23432</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23432" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23432" ref_url="https://www.suse.com/security/cve/CVE-2026-23432" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mshv: Fix use-after-free in mshv_map_user_memory error path

In the error path of mshv_map_user_memory(), calling vfree() directly on
the region leaves the MMU notifier registered. When userspace later unmaps
the memory, the notifier fires and accesses the freed region, causing a
use-after-free and potential kernel panic.

Replace vfree() with mshv_partition_put() to properly unregister
the MMU notifier before freeing the region.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23432/">CVE-2026-23432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23432">CVE-2026-23432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261612">SUSE bug 1261612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23433</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23433" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23433" ref_url="https://www.suse.com/security/cve/CVE-2026-23433" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm_mpam: Fix null pointer dereference when restoring bandwidth counters

When an MSC supporting memory bandwidth monitoring is brought offline and
then online, mpam_restore_mbwu_state() calls __ris_msmon_read() via ipi to
restore the configuration of the bandwidth counters. It doesn't care about
the value read, mbwu_arg.val, and doesn't set it leading to a null pointer
dereference when __ris_msmon_read() adds to it. This results in a kernel
oops with a call trace such as:

Call trace:
__ris_msmon_read+0x19c/0x64c (P)
mpam_restore_mbwu_state+0xa0/0xe8
smp_call_on_cpu_callback+0x1c/0x38
process_one_work+0x154/0x4b4
worker_thread+0x188/0x310
kthread+0x11c/0x130
ret_from_fork+0x10/0x20

Provide a local variable for val to avoid __ris_msmon_read() dereferencing
a null pointer when adding to val.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23433/">CVE-2026-23433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23433">CVE-2026-23433 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261578">SUSE bug 1261578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23434</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23434" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23434" ref_url="https://www.suse.com/security/cve/CVE-2026-23434" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: rawnand: serialize lock/unlock against other NAND operations

nand_lock() and nand_unlock() call into chip-&gt;ops.lock_area/unlock_area
without holding the NAND device lock. On controllers that implement
SET_FEATURES via multiple low-level PIO commands, these can race with
concurrent UBI/UBIFS background erase/write operations that hold the
device lock, resulting in cmd_pending conflicts on the NAND controller.

Add nand_get_device()/nand_release_device() around the lock/unlock
operations to serialize them against all other NAND controller access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23434/">CVE-2026-23434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23434">CVE-2026-23434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261601">SUSE bug 1261601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23443</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23443" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23443" ref_url="https://www.suse.com/security/cve/CVE-2026-23443" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: processor: Fix previous acpi_processor_errata_piix4() fix

After commi f132e089fe89 ("ACPI: processor: Fix NULL-pointer dereference
in acpi_processor_errata_piix4()"), device pointers may be dereferenced
after dropping references to the device objects pointed to by them,
which may cause a use-after-free to occur.

Moreover, debug messages about enabling the errata may be printed
if the errata flags corresponding to them are unset.

Address all of these issues by moving message printing to the points
in the code where the errata flags are set.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23443/">CVE-2026-23443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23443">CVE-2026-23443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261679">SUSE bug 1261679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23446</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23446" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23446" ref_url="https://www.suse.com/security/cve/CVE-2026-23446" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: aqc111: Do not perform PM inside suspend callback

syzbot reports "task hung in rpm_resume"

This is caused by aqc111_suspend calling
the PM variant of its write_cmd routine.

The simplified call trace looks like this:

rpm_suspend()
  usb_suspend_both() - here udev-&gt;dev.power.runtime_status == RPM_SUSPENDING
    aqc111_suspend() - called for the usb device interface
      aqc111_write32_cmd()
        usb_autopm_get_interface()
          pm_runtime_resume_and_get()
            rpm_resume() - here we call rpm_resume() on our parent
              rpm_resume() - Here we wait for a status change that will never happen.

At this point we block another task which holds
rtnl_lock and locks up the whole networking stack.

Fix this by replacing the write_cmd calls with their _nopm variants
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23446/">CVE-2026-23446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23446">CVE-2026-23446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261778">SUSE bug 1261778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23447</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23447" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23447" ref_url="https://www.suse.com/security/cve/CVE-2026-23447" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check

The same bounds-check bug fixed for NDP16 in the previous patch also
exists in cdc_ncm_rx_verify_ndp32(). The DPE array size is validated
against the total skb length without accounting for ndpoffset, allowing
out-of-bounds reads when the NDP32 is placed near the end of the NTB.

Add ndpoffset to the nframes bounds check and use struct_size_t() to
express the NDP-plus-DPE-array size more clearly.

Compile-tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23447/">CVE-2026-23447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23447">CVE-2026-23447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261751">SUSE bug 1261751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23448</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23448" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23448" ref_url="https://www.suse.com/security/cve/CVE-2026-23448" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: cdc_ncm: add ndpoffset to NDP16 nframes bounds check

cdc_ncm_rx_verify_ndp16() validates that the NDP header and its DPE
entries fit within the skb. The first check correctly accounts for
ndpoffset:

  if ((ndpoffset + sizeof(struct usb_cdc_ncm_ndp16)) &gt; skb_in-&gt;len)

but the second check omits it:

  if ((sizeof(struct usb_cdc_ncm_ndp16) +
       ret * (sizeof(struct usb_cdc_ncm_dpe16))) &gt; skb_in-&gt;len)

This validates the DPE array size against the total skb length as if
the NDP were at offset 0, rather than at ndpoffset. When the NDP is
placed near the end of the NTB (large wNdpIndex), the DPE entries can
extend past the skb data buffer even though the check passes.
cdc_ncm_rx_fixup() then reads out-of-bounds memory when iterating
the DPE array.

Add ndpoffset to the nframes bounds check and use struct_size_t() to
express the NDP-plus-DPE-array size more clearly.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23448/">CVE-2026-23448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23448">CVE-2026-23448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261750">SUSE bug 1261750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23451</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23451" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23451" ref_url="https://www.suse.com/security/cve/CVE-2026-23451" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: prevent potential infinite loop in bond_header_parse()

bond_header_parse() can loop if a stack of two bonding devices is setup,
because skb-&gt;dev always points to the hierarchy top.

Add new "const struct net_device *dev" parameter to
(struct header_ops)-&gt;parse() method to make sure the recursion
is bounded, and that the final leaf parse method is called.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23451/">CVE-2026-23451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23451">CVE-2026-23451 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261604">SUSE bug 1261604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23452</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23452" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23452" ref_url="https://www.suse.com/security/cve/CVE-2026-23452" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM: runtime: Fix a race condition related to device removal

The following code in pm_runtime_work() may dereference the dev-&gt;parent
pointer after the parent device has been freed:

	/* Maybe the parent is now able to suspend. */
	if (parent &amp;&amp; !parent-&gt;power.ignore_children) {
		spin_unlock(&amp;dev-&gt;power.lock);

		spin_lock(&amp;parent-&gt;power.lock);
		rpm_idle(parent, RPM_ASYNC);
		spin_unlock(&amp;parent-&gt;power.lock);

		spin_lock(&amp;dev-&gt;power.lock);
	}

Fix this by inserting a flush_work() call in pm_runtime_remove().

Without this patch blktest block/001 triggers the following complaint
sporadically:

BUG: KASAN: slab-use-after-free in lock_acquire+0x70/0x160
Read of size 1 at addr ffff88812bef7198 by task kworker/u553:1/3081
Workqueue: pm pm_runtime_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x61/0x80
 print_address_description.constprop.0+0x8b/0x310
 print_report+0xfd/0x1d7
 kasan_report+0xd8/0x1d0
 __kasan_check_byte+0x42/0x60
 lock_acquire.part.0+0x38/0x230
 lock_acquire+0x70/0x160
 _raw_spin_lock+0x36/0x50
 rpm_suspend+0xc6a/0xfe0
 rpm_idle+0x578/0x770
 pm_runtime_work+0xee/0x120
 process_one_work+0xde3/0x1410
 worker_thread+0x5eb/0xfe0
 kthread+0x37b/0x480
 ret_from_fork+0x6cb/0x920
 ret_from_fork_asm+0x11/0x20
 &lt;/TASK&gt;

Allocated by task 4314:
 kasan_save_stack+0x2a/0x50
 kasan_save_track+0x18/0x40
 kasan_save_alloc_info+0x3d/0x50
 __kasan_kmalloc+0xa0/0xb0
 __kmalloc_noprof+0x311/0x990
 scsi_alloc_target+0x122/0xb60 [scsi_mod]
 __scsi_scan_target+0x101/0x460 [scsi_mod]
 scsi_scan_channel+0x179/0x1c0 [scsi_mod]
 scsi_scan_host_selected+0x259/0x2d0 [scsi_mod]
 store_scan+0x2d2/0x390 [scsi_mod]
 dev_attr_store+0x43/0x80
 sysfs_kf_write+0xde/0x140
 kernfs_fop_write_iter+0x3ef/0x670
 vfs_write+0x506/0x1470
 ksys_write+0xfd/0x230
 __x64_sys_write+0x76/0xc0
 x64_sys_call+0x213/0x1810
 do_syscall_64+0xee/0xfc0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53

Freed by task 4314:
 kasan_save_stack+0x2a/0x50
 kasan_save_track+0x18/0x40
 kasan_save_free_info+0x3f/0x50
 __kasan_slab_free+0x67/0x80
 kfree+0x225/0x6c0
 scsi_target_dev_release+0x3d/0x60 [scsi_mod]
 device_release+0xa3/0x220
 kobject_cleanup+0x105/0x3a0
 kobject_put+0x72/0xd0
 put_device+0x17/0x20
 scsi_device_dev_release+0xacf/0x12c0 [scsi_mod]
 device_release+0xa3/0x220
 kobject_cleanup+0x105/0x3a0
 kobject_put+0x72/0xd0
 put_device+0x17/0x20
 scsi_device_put+0x7f/0xc0 [scsi_mod]
 sdev_store_delete+0xa5/0x120 [scsi_mod]
 dev_attr_store+0x43/0x80
 sysfs_kf_write+0xde/0x140
 kernfs_fop_write_iter+0x3ef/0x670
 vfs_write+0x506/0x1470
 ksys_write+0xfd/0x230
 __x64_sys_write+0x76/0xc0
 x64_sys_call+0x213/0x1810
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23452/">CVE-2026-23452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23452">CVE-2026-23452 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261618">SUSE bug 1261618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23453</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23453" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23453" ref_url="https://www.suse.com/security/cve/CVE-2026-23453" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ti: icssg-prueth: Fix memory leak in XDP_DROP for non-zero-copy mode

Page recycling was removed from the XDP_DROP path in emac_run_xdp() to
avoid conflicts with AF_XDP zero-copy mode, which uses xsk_buff_free()
instead.

However, this causes a memory leak when running XDP programs that drop
packets in non-zero-copy mode (standard page pool mode). The pages are
never returned to the page pool, leading to OOM conditions.

Fix this by handling cleanup in the caller, emac_rx_packet().
When emac_run_xdp() returns ICSSG_XDP_CONSUMED for XDP_DROP, the
caller now recycles the page back to the page pool. The zero-copy
path, emac_rx_packet_zc() already handles cleanup correctly with
xsk_buff_free().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23453/">CVE-2026-23453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23453">CVE-2026-23453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261633">SUSE bug 1261633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23454</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23454" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23454" ref_url="https://www.suse.com/security/cve/CVE-2026-23454" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown

A potential race condition exists in mana_hwc_destroy_channel() where
hwc-&gt;caller_ctx is freed before the HWC's Completion Queue (CQ) and
Event Queue (EQ) are destroyed. This allows an in-flight CQ interrupt
handler to dereference freed memory, leading to a use-after-free or
NULL pointer dereference in mana_hwc_handle_resp().

mana_smc_teardown_hwc() signals the hardware to stop but does not
synchronize against IRQ handlers already executing on other CPUs. The
IRQ synchronization only happens in mana_hwc_destroy_cq() via
mana_gd_destroy_eq() -&gt; mana_gd_deregister_irq(). Since this runs
after kfree(hwc-&gt;caller_ctx), a concurrent mana_hwc_rx_event_handler()
can dereference freed caller_ctx (and rxq-&gt;msg_buf) in
mana_hwc_handle_resp().

Fix this by reordering teardown to reverse-of-creation order: destroy
the TX/RX work queues and CQ/EQ before freeing hwc-&gt;caller_ctx. This
ensures all in-flight interrupt handlers complete before the memory they
access is freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23454/">CVE-2026-23454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23454">CVE-2026-23454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261780">SUSE bug 1261780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23459</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23459" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23459" ref_url="https://www.suse.com/security/cve/CVE-2026-23459" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip_tunnel: adapt iptunnel_xmit_stats() to NETDEV_PCPU_STAT_DSTATS

Blamed commits forgot that vxlan/geneve use udp_tunnel[6]_xmit_skb() which
call iptunnel_xmit_stats().

iptunnel_xmit_stats() was assuming tunnels were only using
NETDEV_PCPU_STAT_TSTATS.

@syncp offset in pcpu_sw_netstats and pcpu_dstats is different.

32bit kernels would either have corruptions or freezes if the syncp
sequence was overwritten.

This patch also moves pcpu_stat_type closer to dev-&gt;{t,d}stats to avoid
a potential cache line miss since iptunnel_xmit_stats() needs to read it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23459/">CVE-2026-23459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23459">CVE-2026-23459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261704">SUSE bug 1261704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23461</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23461" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23461" ref_url="https://www.suse.com/security/cve/CVE-2026-23461" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix use-after-free in l2cap_unregister_user

After commit ab4eedb790ca ("Bluetooth: L2CAP: Fix corrupted list in
hci_chan_del"), l2cap_conn_del() uses conn-&gt;lock to protect access to
conn-&gt;users. However, l2cap_register_user() and l2cap_unregister_user()
don't use conn-&gt;lock, creating a race condition where these functions can
access conn-&gt;users and conn-&gt;hchan concurrently with l2cap_conn_del().

This can lead to use-after-free and list corruption bugs, as reported
by syzbot.

Fix this by changing l2cap_register_user() and l2cap_unregister_user()
to use conn-&gt;lock instead of hci_dev_lock(), ensuring consistent locking
for the l2cap_conn structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23461/">CVE-2026-23461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23461">CVE-2026-23461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261707">SUSE bug 1261707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1261709">SUSE bug 1261709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23462</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23462" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23462" ref_url="https://www.suse.com/security/cve/CVE-2026-23462" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: HIDP: Fix possible UAF

This fixes the following trace caused by not dropping l2cap_conn
reference when user-&gt;remove callback is called:

[   97.809249] l2cap_conn_free: freeing conn ffff88810a171c00
[   97.809907] CPU: 1 UID: 0 PID: 1419 Comm: repro_standalon Not tainted 7.0.0-rc1-dirty #14 PREEMPT(lazy)
[   97.809935] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-debian-1.17.0-1 04/01/2014
[   97.809947] Call Trace:
[   97.809954]  &lt;TASK&gt;
[   97.809961]  dump_stack_lvl (lib/dump_stack.c:122)
[   97.809990]  l2cap_conn_free (net/bluetooth/l2cap_core.c:1808)
[   97.810017]  l2cap_conn_del (./include/linux/kref.h:66 net/bluetooth/l2cap_core.c:1821 net/bluetooth/l2cap_core.c:1798)
[   97.810055]  l2cap_disconn_cfm (net/bluetooth/l2cap_core.c:7347 (discriminator 1) net/bluetooth/l2cap_core.c:7340 (discriminator 1))
[   97.810086]  ? __pfx_l2cap_disconn_cfm (net/bluetooth/l2cap_core.c:7341)
[   97.810117]  hci_conn_hash_flush (./include/net/bluetooth/hci_core.h:2152 (discriminator 2) net/bluetooth/hci_conn.c:2644 (discriminator 2))
[   97.810148]  hci_dev_close_sync (net/bluetooth/hci_sync.c:5360)
[   97.810180]  ? __pfx_hci_dev_close_sync (net/bluetooth/hci_sync.c:5285)
[   97.810212]  ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221)
[   97.810242]  ? up_write (./arch/x86/include/asm/atomic64_64.h:87 (discriminator 5) ./include/linux/atomic/atomic-arch-fallback.h:2852 (discriminator 5) ./include/linux/atomic/atomic-long.h:268 (discriminator 5) ./include/linux/atomic/atomic-instrumented.h:3391 (discriminator 5) kernel/locking/rwsem.c:1385 (discriminator 5) kernel/locking/rwsem.c:1643 (discriminator 5))
[   97.810267]  ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221)
[   97.810290]  ? rcu_is_watching (./arch/x86/include/asm/atomic.h:23 ./include/linux/atomic/atomic-arch-fallback.h:457 ./include/linux/context_tracking.h:128 kernel/rcu/tree.c:752)
[   97.810320]  hci_unregister_dev (net/bluetooth/hci_core.c:504 net/bluetooth/hci_core.c:2716)
[   97.810346]  vhci_release (drivers/bluetooth/hci_vhci.c:691)
[   97.810375]  ? __pfx_vhci_release (drivers/bluetooth/hci_vhci.c:678)
[   97.810404]  __fput (fs/file_table.c:470)
[   97.810430]  task_work_run (kernel/task_work.c:235)
[   97.810451]  ? __pfx_task_work_run (kernel/task_work.c:201)
[   97.810472]  ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221)
[   97.810495]  ? do_raw_spin_unlock (./include/asm-generic/qspinlock.h:128 (discriminator 5) kernel/locking/spinlock_debug.c:142 (discriminator 5))
[   97.810527]  do_exit (kernel/exit.c:972)
[   97.810547]  ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221)
[   97.810574]  ? __pfx_do_exit (kernel/exit.c:897)
[   97.810594]  ? lock_acquire (kernel/locking/lockdep.c:470 (discriminator 6) kernel/locking/lockdep.c:5870 (discriminator 6) kernel/locking/lockdep.c:5825 (discriminator 6))
[   97.810616]  ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221)
[   97.810639]  ? do_raw_spin_lock (kernel/locking/spinlock_debug.c:95 (discriminator 4) kernel/locking/spinlock_debug.c:118 (discriminator 4))
[   97.810664]  ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221)
[   97.810688]  ? find_held_lock (kernel/locking/lockdep.c:5350 (discriminator 1))
[   97.810721]  do_group_exit (kernel/exit.c:1093)
[   97.810745]  get_signal (kernel/signal.c:3007 (discriminator 1))
[   97.810772]  ? security_file_permission (./arch/x86/include/asm/jump_label.h:37 security/security.c:2366)
[   97.810803]  ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221)
[   97.810826]  ? vfs_read (fs/read_write.c:555)
[   97.810854]  ? __pfx_get_signal (kernel/signal.c:2800)
[   97.810880]  ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221)
[   97.810905]  ? __pfx_vfs_read (fs/read_write.c:555)
[   97.810932]  ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:221)
[   97.810960]  arch_do_signal_or_restart (arch/
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23462/">CVE-2026-23462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23462">CVE-2026-23462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261710">SUSE bug 1261710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1261711">SUSE bug 1261711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23463</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23463" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23463" ref_url="https://www.suse.com/security/cve/CVE-2026-23463" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: fsl: qbman: fix race condition in qman_destroy_fq

When QMAN_FQ_FLAG_DYNAMIC_FQID is set, there's a race condition between
fq_table[fq-&gt;idx] state and freeing/allocating from the pool and
WARN_ON(fq_table[fq-&gt;idx]) in qman_create_fq() gets triggered.

Indeed, we can have:
         Thread A                             Thread B
    qman_destroy_fq()                    qman_create_fq()
      qman_release_fqid()
        qman_shutdown_fq()
        gen_pool_free()
           -- At this point, the fqid is available again --
                                           qman_alloc_fqid()
           -- so, we can get the just-freed fqid in thread B --
                                           fq-&gt;fqid = fqid;
                                           fq-&gt;idx = fqid * 2;
                                           WARN_ON(fq_table[fq-&gt;idx]);
                                           fq_table[fq-&gt;idx] = fq;
     fq_table[fq-&gt;idx] = NULL;

And adding some logs between qman_release_fqid() and
fq_table[fq-&gt;idx] = NULL makes the WARN_ON() trigger a lot more.

To prevent that, ensure that fq_table[fq-&gt;idx] is set to NULL before
gen_pool_free() is called by using smp_wmb().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23463/">CVE-2026-23463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23463">CVE-2026-23463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261713">SUSE bug 1261713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23464</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23464" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23464" ref_url="https://www.suse.com/security/cve/CVE-2026-23464" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: microchip: mpfs: Fix memory leak in mpfs_sys_controller_probe()

In mpfs_sys_controller_probe(), if of_get_mtd_device_by_node() fails,
the function returns immediately without freeing the allocated memory
for sys_controller, leading to a memory leak.

Fix this by jumping to the out_free label to ensure the memory is
properly freed.

Also, consolidate the error handling for the mbox_request_channel()
failure case to use the same label.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23464/">CVE-2026-23464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23464">CVE-2026-23464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261592">SUSE bug 1261592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23466</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23466" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23466" ref_url="https://www.suse.com/security/cve/CVE-2026-23466" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Open-code GGTT MMIO access protection

GGTT MMIO access is currently protected by hotplug (drm_dev_enter),
which works correctly when the driver loads successfully and is later
unbound or unloaded. However, if driver load fails, this protection is
insufficient because drm_dev_unplug() is never called.

Additionally, devm release functions cannot guarantee that all BOs with
GGTT mappings are destroyed before the GGTT MMIO region is removed, as
some BOs may be freed asynchronously by worker threads.

To address this, introduce an open-coded flag, protected by the GGTT
lock, that guards GGTT MMIO access. The flag is cleared during the
dev_fini_ggtt devm release function to ensure MMIO access is disabled
once teardown begins.

(cherry picked from commit 4f3a998a173b4325c2efd90bdadc6ccd3ad9a431)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23466/">CVE-2026-23466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23466">CVE-2026-23466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261714">SUSE bug 1261714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23467</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23467" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23467" ref_url="https://www.suse.com/security/cve/CVE-2026-23467" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/dmc: Fix an unlikely NULL pointer deference at probe

intel_dmc_update_dc6_allowed_count() oopses when DMC hasn't been
initialized, and dmc is thus NULL.

That would be the case when the call path is
intel_power_domains_init_hw() -&gt; {skl,bxt,icl}_display_core_init() -&gt;
gen9_set_dc_state() -&gt; intel_dmc_update_dc6_allowed_count(), as
intel_power_domains_init_hw() is called *before* intel_dmc_init().

However, gen9_set_dc_state() calls intel_dmc_update_dc6_allowed_count()
conditionally, depending on the current and target DC states. At probe,
the target is disabled, but if DC6 is enabled, the function is called,
and an oops follows. Apparently it's quite unlikely that DC6 is enabled
at probe, as we haven't seen this failure mode before.

It is also strange to have DC6 enabled at boot, since that would require
the DMC firmware (loaded by BIOS); the BIOS loading the DMC firmware and
the driver stopping / reprogramming the firmware is a poorly specified
sequence and as such unlikely an intentional BIOS behaviour. It's more
likely that BIOS is leaving an unintentionally enabled DC6 HW state
behind (without actually loading the required DMC firmware for this).

The tracking of the DC6 allowed counter only works if starting /
stopping the counter depends on the _SW_ DC6 state vs. the current _HW_
DC6 state (since stopping the counter requires the DC5 counter captured
when the counter was started). Thus, using the HW DC6 state is incorrect
and it also leads to the above oops. Fix both issues by using the SW DC6
state for the tracking.

This is v2 of the fix originally sent by Jani, updated based on the
first Link: discussion below.

(cherry picked from commit 2344b93af8eb5da5d496b4e0529d35f0f559eaf0)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23467/">CVE-2026-23467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23467">CVE-2026-23467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261586">SUSE bug 1261586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23470</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23470" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23470" ref_url="https://www.suse.com/security/cve/CVE-2026-23470" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/imagination: Fix deadlock in soft reset sequence

The soft reset sequence is currently executed from the threaded IRQ
handler, hence it cannot call disable_irq() which internally waits
for IRQ handlers, i.e. itself, to complete.

Use disable_irq_nosync() during a soft reset instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23470/">CVE-2026-23470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23470">CVE-2026-23470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261585">SUSE bug 1261585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23471</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23471" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23471" ref_url="https://www.suse.com/security/cve/CVE-2026-23471" source="SUSE CVE"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23471/">CVE-2026-23471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23471">CVE-2026-23471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261716">SUSE bug 1261716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1261915">SUSE bug 1261915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23475</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23475" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23475" ref_url="https://www.suse.com/security/cve/CVE-2026-23475" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: fix statistics allocation

The controller per-cpu statistics is not allocated until after the
controller has been registered with driver core, which leaves a window
where accessing the sysfs attributes can trigger a NULL-pointer
dereference.

Fix this by moving the statistics allocation to controller allocation
while tying its lifetime to that of the controller (rather than using
implicit devres).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23475/">CVE-2026-23475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23475">CVE-2026-23475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261644">SUSE bug 1261644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23490</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23490" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23490" ref_url="https://www.suse.com/security/cve/CVE-2026-23490" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1903" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003192.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1904" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002484.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1906" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002485.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3359" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003255.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4141" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002592.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4146" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002558.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4148" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20133-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024488.html" source="SUSE-SU"/>
    <description>
    pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.2, a Denial-of-Service issue has been found that leads to memory exhaustion from malformed RELATIVE-OID with excessive continuation octets. This vulnerability is fixed in 0.6.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-29"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23490/">CVE-2026-23490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23490">CVE-2026-23490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256902">SUSE bug 1256902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039708" comment="python313-pyasn1-0.6.1-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2369</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2369" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2369" ref_url="https://www.suse.com/security/cve/CVE-2026-2369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. An integer underflow vulnerability occurs when processing content with a zero-length resource, leading to a buffer overread. This can allow an attacker to potentially access sensitive information or cause an application level denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2369/">CVE-2026-2369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2369">CVE-2026-2369 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258120">SUSE bug 1258120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23831</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23831" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23831" ref_url="https://www.suse.com/security/cve/CVE-2026-23831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024084.html" source="SUSE-SU"/>
    <description>
    Rekor is a software supply chain transparency log. In versions 1.4.3 and below, the entry implementation can panic on attacker-controlled input when canonicalizing a proposed entry with an empty spec.message, causing nil Pointer Dereference. Function validate() returns nil (success) when message is empty, leaving sign1Msg uninitialized, and Canonicalize() later dereferences v.sign1Msg.Payload. A malformed proposed entry of the cose/v0.0.1 type can cause a panic on a thread within the Rekor process. The thread is recovered so the client receives a 500 error message and service still continues, so the availability impact of this is minimal. This issue has been fixed in version 1.5.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23831/">CVE-2026-23831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23831">CVE-2026-23831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257132">SUSE bug 1257132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009343329" comment="podman is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958376" comment="podman-docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871694" comment="podman-remote is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958377" comment="podmansh is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659876" comment="skopeo is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23893</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23893" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23893" ref_url="https://www.suse.com/security/cve/CVE-2026-23893" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5587" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002618.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5603" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003273.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024341.html" source="SUSE-SU"/>
    <description>
    openCryptoki is a PKCS#11 library and provides tooling for Linux and AIX. Versions 2.3.2 and above are vulnerable to symlink-following when running in privileged contexts. A token-group user can redirect file operations to arbitrary filesystem targets by planting symlinks in group-writable token directories, resulting in privilege escalation or data exposure. Token and lock directories are 0770 (group-writable for token users), so any token-group member can plant files and symlinks inside them. When run as root, the base code handling token directory file access, as well as several openCryptoki tools used for administrative purposes, may reset ownership or permissions on existing files inside the token directories. An attacker with token-group membership can exploit the system when an administrator runs a PKCS#11 application or administrative tool that performs chown on files inside the token directory during normal maintenance. This issue is fixed in commit 5e6e4b4, but has not been included in a released version at the time of publication.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-17"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2026-23893/">CVE-2026-23893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23893">CVE-2026-23893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257116">SUSE bug 1257116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010044105" comment="openCryptoki-3.26.0-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24117</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24117" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24117" ref_url="https://www.suse.com/security/cve/CVE-2026-24117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024084.html" source="SUSE-SU"/>
    <description>
    Rekor is a software supply chain transparency log. In versions 1.4.3 and below, attackers can trigger SSRF to arbitrary internal services because /api/v1/index/retrieve supports retrieving a public key via user-provided URL. Since the SSRF only can trigger GET requests, the request cannot mutate state. The response from the GET request is not returned to the caller so data exfiltration is not possible. A malicious actor could attempt to probe an internal network through Blind SSRF. The issue has been fixed in version 1.5.0. To workaround this issue, disable the search endpoint with --enable_retrieve_api=false.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24117/">CVE-2026-24117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24117">CVE-2026-24117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257135">SUSE bug 1257135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009343329" comment="podman is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958376" comment="podman-docker is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871694" comment="podman-remote is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958377" comment="podmansh is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659876" comment="skopeo is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2443</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2443" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2443" ref_url="https://www.suse.com/security/cve/CVE-2026-2443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw was identified in libsoup, a widely used HTTP library in GNOME-based systems. When processing specially crafted HTTP Range headers, the library may improperly validate requested byte ranges. In certain build configurations, this could allow a remote attacker to access portions of server memory beyond the intended response. Exploitation requires a vulnerable configuration and access to a server using the embedded SoupServer component.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2443/">CVE-2026-2443 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2443">CVE-2026-2443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258170">SUSE bug 1258170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24515</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24515" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24515" ref_url="https://www.suse.com/security/cve/CVE-2026-24515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024658.html" source="SUSE-SU"/>
    <description>
    In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24515/">CVE-2026-24515 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24515">CVE-2026-24515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257144">SUSE bug 1257144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010047320" comment="libexpat1-2.7.1-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019430" comment="python313 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019431" comment="python313-curses is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24882</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24882" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24882" ref_url="https://www.suse.com/security/cve/CVE-2026-24882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024483.html" source="SUSE-SU"/>
    <description>
    In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24882/">CVE-2026-24882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24882">CVE-2026-24882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257396">SUSE bug 1257396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041446" comment="gpg2-2.5.5-160000.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24883</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24883" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24883" ref_url="https://www.suse.com/security/cve/CVE-2026-24883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024024.html" source="SUSE-SU"/>
    <description>
    In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig-&gt;data[] set to a NULL value, leading to a denial of service (application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24883/">CVE-2026-24883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24883">CVE-2026-24883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257395">SUSE bug 1257395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041446" comment="gpg2-2.5.5-160000.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25210</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25210" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25210" ref_url="https://www.suse.com/security/cve/CVE-2026-25210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024658.html" source="SUSE-SU"/>
    <description>
    In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25210/">CVE-2026-25210 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25210">CVE-2026-25210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257496">SUSE bug 1257496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047320" comment="libexpat1-2.7.1-160000.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25547</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25547" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25547" ref_url="https://www.suse.com/security/cve/CVE-2026-25547" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002665.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003291.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1250-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21022-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21024-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045382.html" source="SUSE-SU"/>
    <description>
    @isaacs/brace-expansion is a hybrid CJS/ESM TypeScript fork of brace-expansion. Prior to version 5.0.1, @isaacs/brace-expansion is vulnerable to a denial of service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process. This issue has been patched in version 5.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25547/">CVE-2026-25547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25547">CVE-2026-25547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257834">SUSE bug 1257834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056333" comment="cockpit-354-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056334" comment="cockpit-bridge-354-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056335" comment="cockpit-firewalld-354-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056336" comment="cockpit-kdump-354-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056332" comment="cockpit-machines-346-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056337" comment="cockpit-networkmanager-354-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056331" comment="cockpit-podman-117-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056338" comment="cockpit-selinux-354-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056339" comment="cockpit-storaged-354-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056340" comment="cockpit-system-354-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056341" comment="cockpit-ws-354-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056342" comment="cockpit-ws-selinux-354-160000.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25646</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25646" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25646" ref_url="https://www.suse.com/security/cve/CVE-2026-25646" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3031" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003232.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003222.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3576" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002577.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3968" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002585.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002568.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4728" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002586.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6439" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002643.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6445" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024834.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user's display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification. This vulnerability is fixed in 1.6.55.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25646/">CVE-2026-25646 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25646">CVE-2026-25646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258020">SUSE bug 1258020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050012" comment="libpng16-16-1.6.44-160000.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25727</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25727" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2026:20990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024835.html" source="SUSE-SU"/>
    <description>
    time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-04-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257901">SUSE bug 1257901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050011" comment="python313-maturin-1.8.7-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010049113" comment="rust-keylime-0.2.8+116-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047569" comment="virtiofsd-1.12.0-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009742210" comment="afterburn is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009742211" comment="afterburn-dracut is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25833</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25833" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25833" ref_url="https://www.suse.com/security/cve/CVE-2026-25833" source="SUSE CVE"/>
    <description>
    Mbed TLS 3.5.0 to 3.6.5 fixed in 3.6.6 and 4.1.0 has a buffer overflow in the x509_inet_pton_ipv6() function
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25833/">CVE-2026-25833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25833">CVE-2026-25833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261476">SUSE bug 1261476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009336147" comment="qemu-ovmf-x86_64 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336146" comment="qemu-uefi-aarch64 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673318" comment="qemu-SLOF is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654021" comment="qemu-audio-spice is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335211" comment="qemu-block-iscsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335212" comment="qemu-block-ssh is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654023" comment="qemu-chardev-spice is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335213" comment="qemu-guest-agent is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654024" comment="qemu-hw-display-qxl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654025" comment="qemu-hw-display-virtio-gpu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654026" comment="qemu-hw-display-virtio-gpu-pci is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654027" comment="qemu-hw-display-virtio-vga is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654028" comment="qemu-hw-s390x-virtio-gpu-ccw is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009683071" comment="qemu-hw-usb-host is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654029" comment="qemu-hw-usb-redirect is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859131" comment="qemu-img is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654030" comment="qemu-ksm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335215" comment="qemu-lang is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335216" comment="qemu-ppc is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859132" comment="qemu-pr-helper is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654031" comment="qemu-s390x is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654033" comment="qemu-ui-opengl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654034" comment="qemu-ui-spice-core is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986058" comment="qemu-vmsr-helper is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25834</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25834" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25834" ref_url="https://www.suse.com/security/cve/CVE-2026-25834" source="SUSE CVE"/>
    <description>
    Mbed TLS v3.3.0 up to 3.6.5 and 4.0.0 allows Algorithm Downgrade.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25834/">CVE-2026-25834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25834">CVE-2026-25834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261477">SUSE bug 1261477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009336147" comment="qemu-ovmf-x86_64 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336146" comment="qemu-uefi-aarch64 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673318" comment="qemu-SLOF is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654021" comment="qemu-audio-spice is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335211" comment="qemu-block-iscsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335212" comment="qemu-block-ssh is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654023" comment="qemu-chardev-spice is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335213" comment="qemu-guest-agent is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654024" comment="qemu-hw-display-qxl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654025" comment="qemu-hw-display-virtio-gpu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654026" comment="qemu-hw-display-virtio-gpu-pci is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654027" comment="qemu-hw-display-virtio-vga is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654028" comment="qemu-hw-s390x-virtio-gpu-ccw is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009683071" comment="qemu-hw-usb-host is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654029" comment="qemu-hw-usb-redirect is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859131" comment="qemu-img is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654030" comment="qemu-ksm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335215" comment="qemu-lang is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335216" comment="qemu-ppc is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859132" comment="qemu-pr-helper is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654031" comment="qemu-s390x is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654033" comment="qemu-ui-opengl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654034" comment="qemu-ui-spice-core is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986058" comment="qemu-vmsr-helper is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25835</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25835" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25835" ref_url="https://www.suse.com/security/cve/CVE-2026-25835" source="SUSE CVE"/>
    <description>
    Mbed TLS before 3.6.6 and TF-PSA-Crypto before 1.1.0 misuse seeds in a Pseudo-Random Number Generator (PRNG).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25835/">CVE-2026-25835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25835">CVE-2026-25835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261478">SUSE bug 1261478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009336147" comment="qemu-ovmf-x86_64 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336146" comment="qemu-uefi-aarch64 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673318" comment="qemu-SLOF is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654021" comment="qemu-audio-spice is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335211" comment="qemu-block-iscsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335212" comment="qemu-block-ssh is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654023" comment="qemu-chardev-spice is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335213" comment="qemu-guest-agent is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654024" comment="qemu-hw-display-qxl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654025" comment="qemu-hw-display-virtio-gpu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654026" comment="qemu-hw-display-virtio-gpu-pci is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654027" comment="qemu-hw-display-virtio-vga is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654028" comment="qemu-hw-s390x-virtio-gpu-ccw is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009683071" comment="qemu-hw-usb-host is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654029" comment="qemu-hw-usb-redirect is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859131" comment="qemu-img is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654030" comment="qemu-ksm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335215" comment="qemu-lang is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335216" comment="qemu-ppc is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859132" comment="qemu-pr-helper is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654031" comment="qemu-s390x is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654033" comment="qemu-ui-opengl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654034" comment="qemu-ui-spice-core is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986058" comment="qemu-vmsr-helper is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26007</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26007" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26007" ref_url="https://www.suse.com/security/cve/CVE-2026-26007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21021-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045385.html" source="SUSE-SU"/>
    <description>
    cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Prior to 46.0.5, the public_key_from_numbers (or EllipticCurvePublicNumbers.public_key()), EllipticCurvePublicNumbers.public_key(), load_der_public_key() and load_pem_public_key() functions do not verify that the point belongs to the expected prime-order subgroup of the curve. This missing validation allows an attacker to provide a public key point P from a small-order subgroup. This can lead to security issues in various situations, such as the most commonly used signature verification (ECDSA) and shared key negotiation (ECDH). When the victim computes the shared secret as S = [victim_private_key]P via ECDH, this leaks information about victim_private_key mod (small_subgroup_order). For curves with cofactor &gt; 1, this reveals the least significant bits of the private key. When these weak public keys are used in ECDSA , it's easy to forge signatures on the small subgroup. Only SECT curves are impacted by this. This vulnerability is fixed in 46.0.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-13"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26007/">CVE-2026-26007 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26007">CVE-2026-26007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258074">SUSE bug 1258074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056343" comment="python313-cryptography-44.0.3-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26080</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26080" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26080" ref_url="https://www.suse.com/security/cve/CVE-2026-26080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024602.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26080/">CVE-2026-26080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26080">CVE-2026-26080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257976">SUSE bug 1257976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010046321" comment="haproxy-3.2.12+git0.6011f448e-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26081</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26081" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26081" ref_url="https://www.suse.com/security/cve/CVE-2026-26081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024602.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26081/">CVE-2026-26081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26081">CVE-2026-26081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257976">SUSE bug 1257976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010046321" comment="haproxy-3.2.12+git0.6011f448e-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26269</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26269" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26269" ref_url="https://www.suse.com/security/cve/CVE-2026-26269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025100.html" source="SUSE-SU"/>
    <description>
    Vim is an open source, command line text editor. Prior to 9.1.2148, a stack buffer overflow vulnerability exists in Vim's NetBeans integration when processing the specialKeys command, affecting Vim builds that enable and use the NetBeans feature. The Stack buffer overflow exists in special_keys() (in src/netbeans.c). The while (*tok) loop writes two bytes per iteration into a 64-byte stack buffer (keybuf) with no bounds check. A malicious NetBeans server can overflow keybuf with a single specialKeys command. The issue has been fixed as of Vim patch v9.1.2148.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-26269/">CVE-2026-26269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26269">CVE-2026-26269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258229">SUSE bug 1258229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050022" comment="vim-data-common-9.2.0110-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050023" comment="vim-small-9.2.0110-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2673</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2673" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2673" ref_url="https://www.suse.com/security/cve/CVE-2026-2673" source="SUSE CVE"/>
    <description>
    Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected
preferred key exchange group when its key exchange group configuration includes
the default by using the 'DEFAULT' keyword.

Impact summary: A less preferred key exchange may be used even when a more
preferred group is supported by both client and server, if the group
was not included among the client's initial predicated keyshares.
This will sometimes be the case with the new hybrid post-quantum groups,
if the client chooses to defer their use until specifically requested by
the server.

If an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to
interpolate the built-in default group list into its own configuration, perhaps
adding or removing specific elements, then an implementation defect causes the
'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups
were treated as a single sufficiently secure 'tuple', with the server not
sending a Hello Retry Request (HRR) even when a group in a more preferred tuple
was mutually supported.

As a result, the client and server might fail to negotiate a mutually supported
post-quantum key agreement group, such as 'X25519MLKEM768', if the client's
configuration results in only 'classical' groups (such as 'X25519' being the
only ones in the client's initial keyshare prediction).

OpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS
1.3 key agreement group on TLS servers.  The old syntax had a single 'flat'
list of groups, and treated all the supported groups as sufficiently secure.
If any of the keyshares predicted by the client were supported by the server
the most preferred among these was selected, even if other groups supported by
the client, but not included in the list of predicted keyshares would have been
more preferred, if included.

The new syntax partitions the groups into distinct 'tuples' of roughly
equivalent security.  Within each tuple the most preferred group included among
the client's predicted keyshares is chosen, but if the client supports a group
from a more preferred tuple, but did not predict any corresponding keyshares,
the server will ask the client to retry the ClientHello (by issuing a Hello
Retry Request or HRR) with the most preferred mutually supported group.

The above works as expected when the server's configuration uses the built-in
default group list, or explicitly defines its own list by directly defining the
various desired groups and group 'tuples'.

No OpenSSL FIPS modules are affected by this issue, the code in question lies
outside the FIPS boundary.

OpenSSL 3.6 and 3.5 are vulnerable to this issue.

OpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released.
OpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released.

OpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2673/">CVE-2026-2673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2673">CVE-2026-2673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259652">SUSE bug 1259652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941029" comment="openssl-3-livepatches is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26996</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26996" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26996" ref_url="https://www.suse.com/security/cve/CVE-2026-26996" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002665.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003291.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1250-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20950-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20967-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21022-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21024-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045382.html" source="SUSE-SU"/>
    <description>
    minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2026-26996/">CVE-2026-26996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26996">CVE-2026-26996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258621">SUSE bug 1258621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056333" comment="cockpit-354-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056334" comment="cockpit-bridge-354-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056335" comment="cockpit-firewalld-354-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056336" comment="cockpit-kdump-354-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056332" comment="cockpit-machines-346-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056337" comment="cockpit-networkmanager-354-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056331" comment="cockpit-podman-117-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053188" comment="cockpit-repos-4.7-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056338" comment="cockpit-selinux-354-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056339" comment="cockpit-storaged-354-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056340" comment="cockpit-system-354-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056341" comment="cockpit-ws-354-160000.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056342" comment="cockpit-ws-selinux-354-160000.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2708</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2708" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2708" ref_url="https://www.suse.com/security/cve/CVE-2026-2708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2708/">CVE-2026-2708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2708">CVE-2026-2708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258508">SUSE bug 1258508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27135</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27135" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27135" ref_url="https://www.suse.com/security/cve/CVE-2026-27135" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002665.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003291.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1247-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20925-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20950-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045289.html" source="SUSE-SU"/>
    <description>
    nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. Prior to version 1.68.1, the nghttp2 library stops reading the incoming data when user facing public API `nghttp2_session_terminate_session` or `nghttp2_session_terminate_session2` is called by the application. They might be called internally by the library when it detects the situation that is subject to connection error. Due to the missing internal state validation, the library keeps reading the rest of the data after one of those APIs is called. Then receiving a malformed frame that causes FRAME_SIZE_ERROR causes assertion failure. nghttp2 v1.68.1 adds missing state validation to avoid assertion failure. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27135/">CVE-2026-27135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27135">CVE-2026-27135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259835">SUSE bug 1259835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051784" comment="libnghttp2-14-1.64.0-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27171</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27171" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27171" ref_url="https://www.suse.com/security/cve/CVE-2026-27171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21013-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045395.html" source="SUSE-SU"/>
    <description>
    zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-13"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27171/">CVE-2026-27171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27171">CVE-2026-27171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258392">SUSE bug 1258392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056312" comment="libz1-1.2.13-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056313" comment="zlib-devel-1.2.13-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2739</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2739" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2739" ref_url="https://www.suse.com/security/cve/CVE-2026-2739" source="SUSE CVE"/>
    <description>
    This affects versions of the package bn.js before 5.2.3. Calling maskn(0) on any BN instance corrupts the internal state, causing toString(), divmod(), and other methods to enter an infinite loop, hanging the process indefinitely.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2739/">CVE-2026-2739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2739">CVE-2026-2739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258647">SUSE bug 1258647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009750396" comment="cockpit is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750397" comment="cockpit-bridge is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029139" comment="cockpit-firewalld is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029140" comment="cockpit-kdump is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750404" comment="cockpit-networkmanager is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750405" comment="cockpit-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750406" comment="cockpit-storaged is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750399" comment="cockpit-system is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750400" comment="cockpit-ws is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029142" comment="cockpit-ws-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750402" comment="cockpit-machines is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27601</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27601" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27601" ref_url="https://www.suse.com/security/cve/CVE-2026-27601" source="SUSE CVE"/>
    <description>
    Underscore.js is a utility-belt library for JavaScript. Prior to 1.13.8, the _.flatten and _.isEqual functions use recursion without a depth limit. Under very specific conditions, detailed below, an attacker could exploit this in a Denial of Service (DoS) attack by triggering a stack overflow. Untrusted input must be used to create a recursive datastructure, for example using JSON.parse, with no enforced depth limit. The datastructure thus created must be passed to _.flatten or _.isEqual. In the case of _.flatten, the vulnerability can only be exploited if it is possible for a remote client to prepare a datastructure that consists of arrays at all levels AND if no finite depth limit is passed as the second argument to _.flatten. In the case of _.isEqual, the vulnerability can only be exploited if there exists a code path in which two distinct datastructures that were submitted by the same remote client are compared using _.isEqual. For example, if a client submits data that are stored in a database, and the same client can later submit another datastructure that is then compared to the data that were saved in the database previously, OR if a client submits a single request, but its data are parsed twice, creating two non-identical but equivalent datastructures that are then compared. Exceptions originating from the call to _.flatten or _.isEqual, as a result of a stack overflow, are not being caught. This vulnerability is fixed in 1.13.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27601/">CVE-2026-27601 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27601">CVE-2026-27601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259157">SUSE bug 1259157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009750396" comment="cockpit is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750397" comment="cockpit-bridge is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029139" comment="cockpit-firewalld is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029140" comment="cockpit-kdump is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750404" comment="cockpit-networkmanager is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750405" comment="cockpit-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750406" comment="cockpit-storaged is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750399" comment="cockpit-system is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750400" comment="cockpit-ws is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029142" comment="cockpit-ws-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750402" comment="cockpit-machines is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28390</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28390" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28390" ref_url="https://www.suse.com/security/cve/CVE-2026-28390" source="SUSE CVE"/>
    <description>
    Issue summary: During processing of a crafted CMS EnvelopedData message
with KeyTransportRecipientInfo a NULL pointer dereference can happen.

Impact summary: Applications that process attacker-controlled CMS data may
crash before authentication or cryptographic operations occur resulting in
Denial of Service.

When a CMS EnvelopedData message that uses KeyTransportRecipientInfo with
RSA-OAEP encryption is processed, the optional parameters field of
RSA-OAEP SourceFunc algorithm identifier is examined without checking
for its presence. This results in a NULL pointer dereference if the field
is missing.

Applications and services that call CMS_decrypt() on untrusted input
(e.g., S/MIME processing or CMS-based protocols) are vulnerable.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this
issue, as the affected code is outside the OpenSSL FIPS module boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28390/">CVE-2026-28390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28390">CVE-2026-28390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261678">SUSE bug 1261678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334864" comment="libopenssl-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28417</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28417" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28417" ref_url="https://www.suse.com/security/cve/CVE-2026-28417" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6539" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002658.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6915" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025100.html" source="SUSE-SU"/>
    <description>
    Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection vulnerability exists in the `netrw` standard plugin bundled with Vim. By inducing a user to open a crafted URL (e.g., using the `scp://` protocol handler), an attacker can execute arbitrary shell commands with the privileges of the Vim process. Version 9.2.0073 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28417/">CVE-2026-28417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28417">CVE-2026-28417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259051">SUSE bug 1259051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050022" comment="vim-data-common-9.2.0110-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050023" comment="vim-small-9.2.0110-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202629074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-29074</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-29074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29074" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-29074" ref_url="https://www.suse.com/security/cve/CVE-2026-29074" source="SUSE CVE"/>
    <description>
    SVGO, short for SVG Optimizer, is a Node.js library and command-line application for optimizing SVG files. From version 2.1.0 to before version 2.8.1, from version 3.0.0 to before version 3.3.3, and before version 4.0.1, SVGO accepts XML with custom entities, without guards against entity expansion or recursion. This can result in a small XML file (811 bytes) stalling the application and even crashing the Node.js process with JavaScript heap out of memory. This issue has been patched in versions 2.8.1, 3.3.3, and 4.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-29"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-29074/">CVE-2026-29074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-29074">CVE-2026-29074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259289">SUSE bug 1259289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009750396" comment="cockpit is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750397" comment="cockpit-bridge is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029139" comment="cockpit-firewalld is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029140" comment="cockpit-kdump is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750404" comment="cockpit-networkmanager is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750405" comment="cockpit-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750406" comment="cockpit-storaged is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750399" comment="cockpit-system is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750400" comment="cockpit-ws is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029142" comment="cockpit-ws-selinux is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750402" comment="cockpit-machines is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009750401" comment="cockpit-podman is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202629111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-29111</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-29111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29111" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-29111" ref_url="https://www.suse.com/security/cve/CVE-2026-29111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20998-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045403.html" source="SUSE-SU"/>
    <description>
    systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-13"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-29111/">CVE-2026-29111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-29111">CVE-2026-29111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259418">SUSE bug 1259418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053372" comment="libsystemd0-257.13-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053373" comment="libudev1-257.13-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053374" comment="systemd-257.13-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053376" comment="systemd-container-257.13-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053379" comment="systemd-experimental-257.13-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053381" comment="systemd-journal-remote-257.13-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053384" comment="systemd-portable-257.13-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053387" comment="udev-257.13-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202630922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-30922</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-30922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-30922" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-30922" ref_url="https://www.suse.com/security/cve/CVE-2026-30922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1158-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045223.html" source="SUSE-SU"/>
    <description>
    pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.3, the `pyasn1` library is vulnerable to a Denial of Service (DoS) attack caused by uncontrolled recursion when decoding ASN.1 data with deeply nested structures. An attacker can supply a crafted payload containing thousands of nested `SEQUENCE` (`0x30`) or `SET` (`0x31`) tags with "Indefinite Length" (`0x80`) markers. This forces the decoder to recursively call itself until the Python interpreter crashes with a `RecursionError` or consumes all available memory (OOM), crashing the host application. This is a distinct vulnerability from CVE-2026-23490 (which addressed integer overflows in OID decoding). The fix for CVE-2026-23490 (`MAX_OID_ARC_CONTINUATION_OCTETS`) does not mitigate this recursion issue. Version 0.6.3 fixes this specific issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30922/">CVE-2026-30922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-30922">CVE-2026-30922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259803">SUSE bug 1259803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051874" comment="python313-pyasn1-0.6.1-160000.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202631389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-31389</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-31389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31389" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-31389" ref_url="https://www.suse.com/security/cve/CVE-2026-31389" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: fix use-after-free on controller registration failure

Make sure to deregister from driver core also in the unlikely event that
per-cpu statistics allocation fails during controller registration to
avoid use-after-free (of driver resources) and unclocked register
accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31389/">CVE-2026-31389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31389">CVE-2026-31389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261789">SUSE bug 1261789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202631390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-31390</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-31390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31390" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-31390" ref_url="https://www.suse.com/security/cve/CVE-2026-31390" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Fix memory leak in xe_vm_madvise_ioctl

When check_bo_args_are_sane() validation fails, jump to the new
free_vmas cleanup label to properly free the allocated resources.
This ensures proper cleanup in this error path.

(cherry picked from commit 29bd06faf727a4b76663e4be0f7d770e2d2a7965)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31390/">CVE-2026-31390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31390">CVE-2026-31390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261587">SUSE bug 1261587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202631393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-31393</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-31393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31393" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-31393" ref_url="https://www.suse.com/security/cve/CVE-2026-31393" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access

l2cap_information_rsp() checks that cmd_len covers the fixed
l2cap_info_rsp header (type + result, 4 bytes) but then reads
rsp-&gt;data without verifying that the payload is present:

 - L2CAP_IT_FEAT_MASK calls get_unaligned_le32(rsp-&gt;data), which reads
   4 bytes past the header (needs cmd_len &gt;= 8).

 - L2CAP_IT_FIXED_CHAN reads rsp-&gt;data[0], 1 byte past the header
   (needs cmd_len &gt;= 5).

A truncated L2CAP_INFO_RSP with result == L2CAP_IR_SUCCESS triggers an
out-of-bounds read of adjacent skb data.

Guard each data access with the required payload length check.  If the
payload is too short, skip the read and let the state machine complete
with safe defaults (feat_mask and remote_fixed_chan remain zero from
kzalloc), so the info timer cleanup and l2cap_conn_start() still run
and the connection is not stalled.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31393/">CVE-2026-31393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31393">CVE-2026-31393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261719">SUSE bug 1261719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202631394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-31394</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-31394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31394" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-31394" ref_url="https://www.suse.com/security/cve/CVE-2026-31394" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211: fix crash in ieee80211_chan_bw_change for AP_VLAN stations

ieee80211_chan_bw_change() iterates all stations and accesses
link-&gt;reserved.oper via sta-&gt;sdata-&gt;link[link_id]. For stations on
AP_VLAN interfaces (e.g. 4addr WDS clients), sta-&gt;sdata points to
the VLAN sdata, whose link never participates in chanctx reservations.
This leaves link-&gt;reserved.oper zero-initialized with chan == NULL,
causing a NULL pointer dereference in __ieee80211_sta_cap_rx_bw()
when accessing chandef-&gt;chan-&gt;band during CSA.

Resolve the VLAN sdata to its parent AP sdata using get_bss_sdata()
before accessing link data.

[also change sta-&gt;sdata in ARRAY_SIZE even if it doesn't matter]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31394/">CVE-2026-31394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31394">CVE-2026-31394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261637">SUSE bug 1261637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202631397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-31397</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-31397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31397" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-31397" ref_url="https://www.suse.com/security/cve/CVE-2026-31397" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/huge_memory: fix use of NULL folio in move_pages_huge_pmd()

move_pages_huge_pmd() handles UFFDIO_MOVE for both normal THPs and huge
zero pages.  For the huge zero page path, src_folio is explicitly set to
NULL, and is used as a sentinel to skip folio operations like lock and
rmap.

In the huge zero page branch, src_folio is NULL, so folio_mk_pmd(NULL,
pgprot) passes NULL through folio_pfn() and page_to_pfn().  With
SPARSEMEM_VMEMMAP this silently produces a bogus PFN, installing a PMD
pointing to non-existent physical memory.  On other memory models it is a
NULL dereference.

Use page_folio(src_page) to obtain the valid huge zero folio from the
page, which was obtained from pmd_page() and remains valid throughout.

After commit d82d09e48219 ("mm/huge_memory: mark PMD mappings of the huge
zero folio special"), moved huge zero PMDs must remain special so
vm_normal_page_pmd() continues to treat them as special mappings.

move_pages_huge_pmd() currently reconstructs the destination PMD in the
huge zero page branch, which drops PMD state such as pmd_special() on
architectures with CONFIG_ARCH_HAS_PTE_SPECIAL.  As a result,
vm_normal_page_pmd() can treat the moved huge zero PMD as a normal page
and corrupt its refcount.

Instead of reconstructing the PMD from the folio, derive the destination
entry from src_pmdval after pmdp_huge_clear_flush(), then handle the PMD
metadata the same way move_huge_pmd() does for moved entries by marking it
soft-dirty and clearing uffd-wp.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31397/">CVE-2026-31397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31397">CVE-2026-31397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261627">SUSE bug 1261627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202631398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-31398</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-31398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31398" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-31398" ref_url="https://www.suse.com/security/cve/CVE-2026-31398" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/rmap: fix incorrect pte restoration for lazyfree folios

We batch unmap anonymous lazyfree folios by folio_unmap_pte_batch.  If the
batch has a mix of writable and non-writable bits, we may end up setting
the entire batch writable.  Fix this by respecting writable bit during
batching.

Although on a successful unmap of a lazyfree folio, the soft-dirty bit is
lost, preserve it on pte restoration by respecting the bit during
batching, to make the fix consistent w.r.t both writable bit and
soft-dirty bit.

I was able to write the below reproducer and crash the kernel. 
Explanation of reproducer (set 64K mTHP to always):

Fault in a 64K large folio.  Split the VMA at mid-point with
MADV_DONTFORK.  fork() - parent points to the folio with 8 writable ptes
and 8 non-writable ptes.  Merge the VMAs with MADV_DOFORK so that
folio_unmap_pte_batch() can determine all the 16 ptes as a batch.  Do
MADV_FREE on the range to mark the folio as lazyfree.  Write to the memory
to dirty the pte, eventually rmap will dirty the folio.  Then trigger
reclaim, we will hit the pte restoration path, and the kernel will crash
with the trace given below.

The BUG happens at:

	BUG_ON(atomic_inc_return(&amp;ptc-&gt;anon_map_count) &gt; 1 &amp;&amp; rw);

The code path is asking for anonymous page to be mapped writable into the
pagetable.  The BUG_ON() firing implies that such a writable page has been
mapped into the pagetables of more than one process, which breaks
anonymous memory/CoW semantics.

[   21.134473] kernel BUG at mm/page_table_check.c:118!
[   21.134497] Internal error: Oops - BUG: 00000000f2000800 [#1]  SMP
[   21.135917] Modules linked in:
[   21.136085] CPU: 1 UID: 0 PID: 1735 Comm: dup-lazyfree Not tainted 7.0.0-rc1-00116-g018018a17770 #1028 PREEMPT
[   21.136858] Hardware name: linux,dummy-virt (DT)
[   21.137019] pstate: 21400005 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   21.137308] pc : page_table_check_set+0x28c/0x2a8
[   21.137607] lr : page_table_check_set+0x134/0x2a8
[   21.137885] sp : ffff80008a3b3340
[   21.138124] x29: ffff80008a3b3340 x28: fffffdffc3d14400 x27: ffffd1a55e03d000
[   21.138623] x26: 0040000000000040 x25: ffffd1a55f7dd000 x24: 0000000000000001
[   21.139045] x23: 0000000000000001 x22: 0000000000000001 x21: ffffd1a55f217f30
[   21.139629] x20: 0000000000134521 x19: 0000000000134519 x18: 005c43e000040000
[   21.140027] x17: 0001400000000000 x16: 0001700000000000 x15: 000000000000ffff
[   21.140578] x14: 000000000000000c x13: 005c006000000000 x12: 0000000000000020
[   21.140828] x11: 0000000000000000 x10: 005c000000000000 x9 : ffffd1a55c079ee0
[   21.141077] x8 : 0000000000000001 x7 : 005c03e000040000 x6 : 000000004000ffff
[   21.141490] x5 : ffff00017fffce00 x4 : 0000000000000001 x3 : 0000000000000002
[   21.141741] x2 : 0000000000134510 x1 : 0000000000000000 x0 : ffff0000c08228c0
[   21.141991] Call trace:
[   21.142093]  page_table_check_set+0x28c/0x2a8 (P)
[   21.142265]  __page_table_check_ptes_set+0x144/0x1e8
[   21.142441]  __set_ptes_anysz.constprop.0+0x160/0x1a8
[   21.142766]  contpte_set_ptes+0xe8/0x140
[   21.142907]  try_to_unmap_one+0x10c4/0x10d0
[   21.143177]  rmap_walk_anon+0x100/0x250
[   21.143315]  try_to_unmap+0xa0/0xc8
[   21.143441]  shrink_folio_list+0x59c/0x18a8
[   21.143759]  shrink_lruvec+0x664/0xbf0
[   21.144043]  shrink_node+0x218/0x878
[   21.144285]  __node_reclaim.constprop.0+0x98/0x338
[   21.144763]  user_proactive_reclaim+0x2a4/0x340
[   21.145056]  reclaim_store+0x3c/0x60
[   21.145216]  dev_attr_store+0x20/0x40
[   21.145585]  sysfs_kf_write+0x84/0xa8
[   21.145835]  kernfs_fop_write_iter+0x130/0x1c8
[   21.145994]  vfs_write+0x2b8/0x368
[   21.146119]  ksys_write+0x70/0x110
[   21.146240]  __arm64_sys_write+0x24/0x38
[   21.146380]  invoke_syscall+0x50/0x120
[   21.146513]  el0_svc_common.constprop.0+0x48/0xf8
[   21.146679]  do_el0_svc+0x28/0x40
[   21.146798]  el0_svc+0x34/0x110
[   21.146926]  el0t
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31398/">CVE-2026-31398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31398">CVE-2026-31398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261600">SUSE bug 1261600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202631400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-31400</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-31400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31400" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-31400" ref_url="https://www.suse.com/security/cve/CVE-2026-31400" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sunrpc: fix cache_request leak in cache_release

When a reader's file descriptor is closed while in the middle of reading
a cache_request (rp-&gt;offset != 0), cache_release() decrements the
request's readers count but never checks whether it should free the
request.

In cache_read(), when readers drops to 0 and CACHE_PENDING is clear, the
cache_request is removed from the queue and freed along with its buffer
and cache_head reference. cache_release() lacks this cleanup.

The only other path that frees requests with readers == 0 is
cache_dequeue(), but it runs only when CACHE_PENDING transitions from
set to clear. If that transition already happened while readers was
still non-zero, cache_dequeue() will have skipped the request, and no
subsequent call will clean it up.

Add the same cleanup logic from cache_read() to cache_release(): after
decrementing readers, check if it reached 0 with CACHE_PENDING clear,
and if so, dequeue and free the cache_request.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31400/">CVE-2026-31400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31400">CVE-2026-31400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261645">SUSE bug 1261645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202631405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-31405</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-31405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31405" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-31405" ref_url="https://www.suse.com/security/cve/CVE-2026-31405" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-net: fix OOB access in ULE extension header tables

The ule_mandatory_ext_handlers[] and ule_optional_ext_handlers[] tables
in handle_one_ule_extension() are declared with 255 elements (valid
indices 0-254), but the index htype is derived from network-controlled
data as (ule_sndu_type &amp; 0x00FF), giving a range of 0-255. When
htype equals 255, an out-of-bounds read occurs on the function pointer
table, and the OOB value may be called as a function pointer.

Add a bounds check on htype against the array size before either table
is accessed. Out-of-range values now cause the SNDU to be discarded.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31405/">CVE-2026-31405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31405">CVE-2026-31405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261700">SUSE bug 1261700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1261701">SUSE bug 1261701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202631408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-31408</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-31408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31408" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-31408" ref_url="https://www.suse.com/security/cve/CVE-2026-31408" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: SCO: Fix use-after-free in sco_recv_frame() due to missing sock_hold

sco_recv_frame() reads conn-&gt;sk under sco_conn_lock() but immediately
releases the lock without holding a reference to the socket. A concurrent
close() can free the socket between the lock release and the subsequent
sk-&gt;sk_state access, resulting in a use-after-free.

Other functions in the same file (sco_sock_timeout(), sco_conn_del())
correctly use sco_sock_hold() to safely hold a reference under the lock.

Fix by using sco_sock_hold() to take a reference before releasing the
lock, and adding sock_put() on all exit paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31408/">CVE-2026-31408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31408">CVE-2026-31408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261797">SUSE bug 1261797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1261799">SUSE bug 1261799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202631412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-31412</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-31412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31412" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-31412" ref_url="https://www.suse.com/security/cve/CVE-2026-31412" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_mass_storage: Fix potential integer overflow in check_command_size_in_blocks()

The `check_command_size_in_blocks()` function calculates the data size
in bytes by left shifting `common-&gt;data_size_from_cmnd` by the block
size (`common-&gt;curlun-&gt;blkbits`). However, it does not validate whether
this shift operation will cause an integer overflow.

Initially, the block size is set up in `fsg_lun_open()` , and the
`common-&gt;data_size_from_cmnd` is set up in `do_scsi_command()`. During
initialization, there is no integer overflow check for the interaction
between two variables.

So if a malicious USB host sends a SCSI READ or WRITE command
requesting a large amount of data (`common-&gt;data_size_from_cmnd`), the
left shift operation can wrap around. This results in a truncated data
size, which can bypass boundary checks and potentially lead to memory
corruption or out-of-bounds accesses.

Fix this by using the check_shl_overflow() macro to safely perform the
shift and catch any overflows.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31412/">CVE-2026-31412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31412">CVE-2026-31412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261896">SUSE bug 1261896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202631413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-31413</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-31413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31413" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-31413" ref_url="https://www.suse.com/security/cve/CVE-2026-31413" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix unsound scalar forking in maybe_fork_scalars() for BPF_OR

maybe_fork_scalars() is called for both BPF_AND and BPF_OR when the
source operand is a constant.  When dst has signed range [-1, 0], it
forks the verifier state: the pushed path gets dst = 0, the current
path gets dst = -1.

For BPF_AND this is correct: 0 &amp; K == 0.
For BPF_OR this is wrong:    0 | K == K, not 0.

The pushed path therefore tracks dst as 0 when the runtime value is K,
producing an exploitable verifier/runtime divergence that allows
out-of-bounds map access.

Fix this by passing env-&gt;insn_idx (instead of env-&gt;insn_idx + 1) to
push_stack(), so the pushed path re-executes the ALU instruction with
dst = 0 and naturally computes the correct result for any opcode.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-14"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31413/">CVE-2026-31413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31413">CVE-2026-31413 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1262014">SUSE bug 1262014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1262015">SUSE bug 1262015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334791" comment="kernel-devel is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334792" comment="kernel-macros is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3184</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3184" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3184" ref_url="https://www.suse.com/security/cve/CVE-2026-3184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0982-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21016-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045390.html" source="SUSE-SU"/>
    <description>
    A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-13"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3184/">CVE-2026-3184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3184">CVE-2026-3184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258859">SUSE bug 1258859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056314" comment="lastlog2-2.41.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056315" comment="libblkid1-2.41.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056316" comment="libfdisk1-2.41.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056317" comment="liblastlog2-2-2.41.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056318" comment="libmount1-2.41.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056319" comment="libsmartcols1-2.41.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056320" comment="libuuid1-2.41.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056321" comment="util-linux-2.41.1-160000.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056322" comment="util-linux-systemd-2.41.1-160000.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202631958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-31958</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-31958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31958" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-31958" ref_url="https://www.suse.com/security/cve/CVE-2026-31958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025097.html" source="SUSE-SU"/>
    <description>
    Tornado is a Python web framework and asynchronous networking library. In versions of Tornado prior to 6.5.5, the only limit on the number of parts in multipart/form-data is the max_body_size setting (default 100MB). Since parsing occurs synchronously on the main thread, this creates the possibility of denial-of-service due to the cost of parsing very large multipart bodies with many parts. This vulnerability is fixed in 6.5.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31958/">CVE-2026-31958 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31958">CVE-2026-31958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259552">SUSE bug 1259552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050026" comment="python313-tornado6-6.5-160000.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202632285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-32285</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-32285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32285" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-32285" ref_url="https://www.suse.com/security/cve/CVE-2026-32285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045152.html" source="SUSE-SU"/>
    <description>
    The Delete function fails to properly validate offsets when processing malformed JSON input. This can lead to a negative slice index and a runtime panic, allowing a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-01"/>
	<updated date="2026-04-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32285/">CVE-2026-32285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32285">CVE-2026-32285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261230">SUSE bug 1261230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052339" comment="mcphost is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202632597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-32597</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-32597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32597" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-32597" ref_url="https://www.suse.com/security/cve/CVE-2026-32597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1199-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045218.html" source="SUSE-SU"/>
    <description>
    PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 ?4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC. This vulnerability is fixed in 2.12.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32597/">CVE-2026-32597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32597">CVE-2026-32597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259616">SUSE bug 1259616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051999" comment="python313-PyJWT-2.12.1-160000.1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202632776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-32776</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-32776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32776" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-32776" ref_url="https://www.suse.com/security/cve/CVE-2026-32776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1166-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21062-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045462.html" source="SUSE-SU"/>
    <description>
    libexpat before 2.7.5 allows a NULL pointer dereference with empty external parameter entity content.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32776/">CVE-2026-32776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32776">CVE-2026-32776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259724">SUSE bug 1259724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052635" comment="libexpat1-2.7.1-160000.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202632777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-32777</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-32777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32777" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-32777" ref_url="https://www.suse.com/security/cve/CVE-2026-32777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1166-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21062-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045462.html" source="SUSE-SU"/>
    <description>
    libexpat before 2.7.5 allows an infinite loop while parsing DTD content.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32777/">CVE-2026-32777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32777">CVE-2026-32777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259710">SUSE bug 1259710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052635" comment="libexpat1-2.7.1-160000.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202632778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-32778</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-32778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32778" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-32778" ref_url="https://www.suse.com/security/cve/CVE-2026-32778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1166-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21062-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045462.html" source="SUSE-SU"/>
    <description>
    libexpat before 2.7.5 allows a NULL pointer dereference in the function setContext on retry after an earlier ouf-of-memory condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32778/">CVE-2026-32778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32778">CVE-2026-32778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259725">SUSE bug 1259725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052635" comment="libexpat1-2.7.1-160000.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202633186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-33186</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-33186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33186" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-33186" ref_url="https://www.suse.com/security/cve/CVE-2026-33186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1197-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1198-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1200-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1205-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045306.html" source="SUSE-SU"/>
    <description>
    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated the raw, non-canonical path string. Consequently, "deny" rules defined using canonical paths (starting with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback "allow" rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific "deny" rules for canonical paths but allows other requests by default (a fallback "allow" rule). The vulnerability is exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching authorization interceptors or handlers with a non-canonical path string. While upgrading is the most secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy hardening.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-07"/>
	<updated date="2026-04-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33186/">CVE-2026-33186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33186">CVE-2026-33186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260085">SUSE bug 1260085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659876" comment="skopeo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202633416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-33416</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-33416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33416" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-33416" ref_url="https://www.suse.com/security/cve/CVE-2026-33416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:21000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21067-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045457.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.2.1 through 1.6.55, `png_set_tRNS` and `png_set_PLTE` each alias a heap-allocated buffer between `png_struct` and `png_info`, sharing a single allocation across two structs with independent lifetimes. The `trans_alpha` aliasing has been present since at least libpng 1.0, and the `palette` aliasing since at least 1.2.1. Both affect all prior release lines `png_set_tRNS` sets `png_ptr-&gt;trans_alpha = info_ptr-&gt;trans_alpha` (256-byte buffer) and `png_set_PLTE` sets `info_ptr-&gt;palette = png_ptr-&gt;palette` (768-byte buffer). In both cases, calling `png_free_data` (with `PNG_FREE_TRNS` or `PNG_FREE_PLTE`) frees the buffer through `info_ptr` while the corresponding `png_ptr` pointer remains dangling. Subsequent row-transform functions dereference and, in some code paths, write to the freed memory. A second call to `png_set_tRNS` or `png_set_PLTE` has the same effect, because both functions call `png_free_data` internally before reallocating the `info_ptr` buffer. Version 1.6.56 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33416/">CVE-2026-33416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33416">CVE-2026-33416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260754">SUSE bug 1260754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053360" comment="libpng16-16-1.6.44-160000.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202633540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-33540</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-33540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33540" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-33540" ref_url="https://www.suse.com/security/cve/CVE-2026-33540" source="SUSE CVE"/>
		<reference ref_id="GHSA-3p65-76g6-3w7r" ref_url="https://github.com/distribution/distribution/security/advisories//GHSA-3p65-76g6-3w7r" source="SUSE-SU"/>
    <description>
    Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.0, in pull-through cache mode, distribution discovers token auth endpoints by parsing WWW-Authenticate challenges returned by the configured upstream registry. The realm URL from a bearer challenge is used without validating that it matches the upstream registry host. As a result, an attacker-controlled upstream (or an attacker with MitM position to the upstream) can cause distribution to send the configured upstream credentials via basic auth to an attacker-controlled realm URL. This vulnerability is fixed in 3.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-33540/">CVE-2026-33540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33540">CVE-2026-33540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261793">SUSE bug 1261793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009339480" comment="helm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009683669" comment="helm-bash-completion is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202633636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-33636</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-33636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33636" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-33636" ref_url="https://www.suse.com/security/cve/CVE-2026-33636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:21000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21067-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045457.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.6.36 through 1.6.55, an out-of-bounds read and write exists in libpng's ARM/AArch64 Neon-optimized palette expansion path. When expanding 8-bit paletted rows to RGB or RGBA, the Neon loop processes a final partial chunk without verifying that enough input pixels remain. Because the implementation works backward from the end of the row, the final iteration dereferences pointers before the start of the row buffer (OOB read) and writes expanded pixel data to the same underflowed positions (OOB write). This is reachable via normal decoding of attacker-controlled PNG input if Neon is enabled. Version 1.6.56 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33636/">CVE-2026-33636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33636">CVE-2026-33636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260755">SUSE bug 1260755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053360" comment="libpng16-16-1.6.44-160000.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202634073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-34073</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-34073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34073" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-34073" ref_url="https://www.suse.com/security/cve/CVE-2026-34073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:21021-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045385.html" source="SUSE-SU"/>
    <description>
    cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Prior to version 46.0.6, DNS name constraints were only validated against SANs within child certificates, and not the "peer name" presented during each validation. Consequently, cryptography would allow a peer named bar.example.com to validate against a wildcard leaf certificate for *.example.com, even if the leaf's parent certificate (or upwards) contained an excluded subtree constraint for bar.example.com. This issue has been patched in version 46.0.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-13"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34073/">CVE-2026-34073 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-34073">CVE-2026-34073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260876">SUSE bug 1260876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056343" comment="python313-cryptography-44.0.3-160000.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202634874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-34874</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-34874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34874" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-34874" ref_url="https://www.suse.com/security/cve/CVE-2026-34874" source="SUSE CVE"/>
    <description>
    An issue was discovered in Mbed TLS through 3.6.5 and 4.x through 4.0.0. There is a NULL pointer dereference in distinguished name parsing that allows an attacker to write to address 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-04"/>
	<updated date="2026-04-04"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-34874/">CVE-2026-34874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-34874">CVE-2026-34874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261469">SUSE bug 1261469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009336147" comment="qemu-ovmf-x86_64 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336146" comment="qemu-uefi-aarch64 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673318" comment="qemu-SLOF is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654021" comment="qemu-audio-spice is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335211" comment="qemu-block-iscsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335212" comment="qemu-block-ssh is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654023" comment="qemu-chardev-spice is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335213" comment="qemu-guest-agent is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654024" comment="qemu-hw-display-qxl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654025" comment="qemu-hw-display-virtio-gpu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654026" comment="qemu-hw-display-virtio-gpu-pci is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654027" comment="qemu-hw-display-virtio-vga is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654028" comment="qemu-hw-s390x-virtio-gpu-ccw is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009683071" comment="qemu-hw-usb-host is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654029" comment="qemu-hw-usb-redirect is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859131" comment="qemu-img is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654030" comment="qemu-ksm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335215" comment="qemu-lang is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335216" comment="qemu-ppc is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859132" comment="qemu-pr-helper is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654031" comment="qemu-s390x is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654033" comment="qemu-ui-opengl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654034" comment="qemu-ui-spice-core is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986058" comment="qemu-vmsr-helper is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202635406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-35406</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-35406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35406" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-35406" ref_url="https://www.suse.com/security/cve/CVE-2026-35406" source="SUSE CVE"/>
    <description>
    Aardvark-dns is an authoritative dns server for A/AAAA container records. From 1.16.0 to 1.17.0, a truncated TCP DNS query followed by a connection reset causes aardvark-dns to enter an unrecoverable infinite error loop at 100% CPU. This vulnerability is fixed in 1.17.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-35406/">CVE-2026-35406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-35406">CVE-2026-35406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261735">SUSE bug 1261735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855782" comment="aardvark-dns is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3783</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3783" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3783" ref_url="https://www.suse.com/security/cve/CVE-2026-3783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025098.html" source="SUSE-SU"/>
    <description>
    When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer
performs a redirect to a second URL, curl could leak that token to the second
hostname under some circumstances.

If the hostname that the first request is redirected to has information in the
used .netrc file, with either of the `machine` or `default` keywords, curl
would pass on the bearer token set for the first host also to the second one.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3783/">CVE-2026-3783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3783">CVE-2026-3783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259363">SUSE bug 1259363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050024" comment="curl-8.14.1-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050025" comment="libcurl4-8.14.1-160000.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3784</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3784" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3784" ref_url="https://www.suse.com/security/cve/CVE-2026-3784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025098.html" source="SUSE-SU"/>
    <description>
    curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a
server, even if the new request uses different credentials for the HTTP proxy.
The proper behavior is to create or use a separate connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3784/">CVE-2026-3784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3784">CVE-2026-3784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259364">SUSE bug 1259364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050024" comment="curl-8.14.1-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050025" comment="libcurl4-8.14.1-160000.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3805</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3805" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3805" ref_url="https://www.suse.com/security/cve/CVE-2026-3805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025098.html" source="SUSE-SU"/>
    <description>
    When doing a second SMB request to the same host again, curl would wrongly use
a data pointer pointing into already freed memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3805/">CVE-2026-3805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3805">CVE-2026-3805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259365">SUSE bug 1259365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050024" comment="curl-8.14.1-160000.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050025" comment="libcurl4-8.14.1-160000.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202639892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-39892</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-39892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-39892" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-39892" ref_url="https://www.suse.com/security/cve/CVE-2026-39892" source="SUSE CVE"/>
    <description>
    cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. From 45.0.0 to before 46.0.7, if a non-contiguous buffer was passed to APIs which accepted Python buffers (e.g. Hash.update()), this could lead to buffer overflows. This vulnerability is fixed in 46.0.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-39892/">CVE-2026-39892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-39892">CVE-2026-39892 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261863">SUSE bug 1261863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010029188" comment="python313-cryptography is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202640224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-40224</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-40224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-40224" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-40224" ref_url="https://www.suse.com/security/cve/CVE-2026-40224" source="SUSE CVE"/>
    <description>
    In systemd 259 before 260, there is local privilege escalation in systemd-machined because varlink can be used to reach the root namespace.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-14"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-40224/">CVE-2026-40224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-40224">CVE-2026-40224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261978">SUSE bug 1261978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009336434" comment="libsystemd0 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335309" comment="libudev1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624596" comment="systemd-container is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870567" comment="systemd-experimental is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009707100" comment="systemd-journal-remote is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870568" comment="systemd-portable is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335314" comment="udev is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202640227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-40227</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-40227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-40227" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-40227" ref_url="https://www.suse.com/security/cve/CVE-2026-40227" source="SUSE CVE"/>
    <description>
    In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-14"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-40227/">CVE-2026-40227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-40227">CVE-2026-40227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261980">SUSE bug 1261980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009336434" comment="libsystemd0 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335309" comment="libudev1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624596" comment="systemd-container is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870567" comment="systemd-experimental is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009707100" comment="systemd-journal-remote is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870568" comment="systemd-portable is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335314" comment="udev is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202640228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-40228</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-40228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-40228" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-40228" ref_url="https://www.suse.com/security/cve/CVE-2026-40228" source="SUSE CVE"/>
    <description>
    In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users when a "logger -p emerg" command is executed, if ForwardToWall=yes is set.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-14"/>
	<updated date="2026-04-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-40228/">CVE-2026-40228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-40228">CVE-2026-40228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261981">SUSE bug 1261981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009336434" comment="libsystemd0 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335309" comment="libudev1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624596" comment="systemd-container is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870567" comment="systemd-experimental is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009707100" comment="systemd-journal-remote is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870568" comment="systemd-portable is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335314" comment="udev is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4046</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4046" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4046" ref_url="https://www.suse.com/security/cve/CVE-2026-4046" source="SUSE CVE"/>
    <description>
    The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application.



This vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-01"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4046/">CVE-2026-4046 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4046">CVE-2026-4046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261206">SUSE bug 1261206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1261209">SUSE bug 1261209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037683" comment="glibc-livepatches is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037673" comment="linux-glibc-devel is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4105</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4105" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4105" ref_url="https://www.suse.com/security/cve/CVE-2026-4105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20998-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045403.html" source="SUSE-SU"/>
    <description>
    A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4105/">CVE-2026-4105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4105">CVE-2026-4105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259650">SUSE bug 1259650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053372" comment="libsystemd0-257.13-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053373" comment="libudev1-257.13-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053374" comment="systemd-257.13-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053376" comment="systemd-container-257.13-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053379" comment="systemd-experimental-257.13-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053381" comment="systemd-journal-remote-257.13-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053384" comment="systemd-portable-257.13-160000.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053387" comment="udev-257.13-160000.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4437</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4437" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4437" ref_url="https://www.suse.com/security/cve/CVE-2026-4437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20999-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21069-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045455.html" source="SUSE-SU"/>
    <description>
    Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-13"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4437/">CVE-2026-4437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4437">CVE-2026-4437 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260078">SUSE bug 1260078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056325" comment="glibc-2.40-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056326" comment="glibc-devel-2.40-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056327" comment="glibc-gconv-modules-extra-2.40-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056328" comment="glibc-locale-2.40-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056329" comment="glibc-locale-base-2.40-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4438</title>
    <affected family="unix">
            <platform>SUSE Linux Micro 6.2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4438" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4438" ref_url="https://www.suse.com/security/cve/CVE-2026-4438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20999-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21069-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045455.html" source="SUSE-SU"/>
    <description>
    Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-13"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4438/">CVE-2026-4438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4438">CVE-2026-4438 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260082">SUSE bug 1260082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1260333">SUSE bug 1260333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sl-micro:6.2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025852" comment="SUSE Linux Micro 6.2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056325" comment="glibc-2.40-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056326" comment="glibc-devel-2.40-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056327" comment="glibc-gconv-modules-extra-2.40-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056328" comment="glibc-locale-2.40-160000.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056329" comment="glibc-locale-base-2.40-160000.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711319" version="1" comment="kernel-default is ==3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711320" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711323" version="1" comment="kernel-default is ==3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711324" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711326" version="1" comment="kernel-default is ==3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711327" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711329" version="1" comment="kernel-default is ==3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711330" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711332" version="1" comment="kernel-default is ==3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711333" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711335" version="1" comment="kernel-default is ==3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711336" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714891" version="1" comment="kernel-default is ==3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711338" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=5-14.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711340" version="1" comment="kernel-default is ==3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711341" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711343" version="1" comment="kernel-default is ==3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711344" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711346" version="1" comment="kernel-default is ==3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711347" version="1" comment="kgraft-patch-3_12_51-52_39-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711349" version="1" comment="kernel-default is ==3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711350" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711352" version="1" comment="kernel-default is ==3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711353" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711355" version="1" comment="kernel-default is ==3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711356" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711358" version="1" comment="kernel-default is ==3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711359" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711361" version="1" comment="kernel-default is ==3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711362" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711364" version="1" comment="kernel-default is ==3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711365" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129402" version="1" comment="kernel-default is &lt;3.12.59-60.45.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711368" version="1" comment="kernel-default is ==3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711369" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105317" version="1" comment="kernel-default is &lt;3.12.32-33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711371" version="1" comment="kernel-default is ==3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711372" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105748" version="1" comment="kernel-default is &lt;3.12.36-38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711374" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=2-7.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711376" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=2-10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108369" version="1" comment="kernel-default is &lt;3.12.39-47.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711378" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711380" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711382" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=2-6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110507" version="1" comment="kernel-default is &lt;3.12.43-52.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711384" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711386" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711388" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711390" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711392" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711394" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711396" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711398" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711400" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=2-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141891" version="1" comment="kernel-default is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711402" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711404" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711406" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711408" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711410" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711412" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711414" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114432" version="1" comment="kernel-default is &lt;3.12.44-52.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121536" version="1" comment="kernel-default is &lt;3.12.51-60.25.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711416" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711418" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118983" version="1" comment="kernel-default is &lt;3.12.51-60.20.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711420" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711422" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711424" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711426" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711428" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711430" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711432" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711434" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711436" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=4-11.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711438" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711440" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711442" version="1" comment="kgraft-patch-3_12_51-52_39-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711444" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711446" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711448" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123221" version="1" comment="kernel-default is &lt;3.12.53-60.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711450" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711452" version="1" comment="kernel-default is ==4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711453" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711454" version="1" comment="kernel-default is ==4.4.21-81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711455" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711456" version="1" comment="kernel-default is ==4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711457" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711458" version="1" comment="kernel-default is ==4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711459" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711460" version="1" comment="kernel-default is ==4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711461" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147227" version="1" comment="kernel-default is &lt;4.4.38-93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125799" version="1" comment="kernel-default is &lt;3.12.57-60.35.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711462" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=6-17.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711464" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711466" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711468" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711470" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711472" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129344" version="1" comment="kernel-default is &lt;3.12.59-60.41.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711474" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=7-20.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711476" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711478" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711480" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711482" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711484" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711486" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711488" version="1" comment="kernel-default is ==3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711489" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=3-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131004" version="1" comment="kernel-default is &lt;3.12.62-60.62.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711491" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711493" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=2-9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711495" version="1" comment="kernel-default is ==3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711496" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131270" version="1" comment="kernel-default is &lt;3.12.62-60.64.8.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711498" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=8-23.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711500" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711502" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711504" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711506" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711508" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711510" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711512" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711514" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711516" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711518" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711520" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711522" version="1" comment="kernel-default is ==3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711523" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715596" version="1" comment="kernel-default is &lt;4.4.21-81.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711525" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711527" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711529" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711531" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711533" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711535" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=2-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711536" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711537" version="1" comment="kernel-default is ==3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711538" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136647" version="1" comment="kernel-default is &lt;4.4.21-84.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711540" version="1" comment="kernel-default is ==4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711541" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711542" version="1" comment="kernel-default is ==4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711543" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711544" version="1" comment="kernel-default is ==4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711545" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711546" version="1" comment="kernel-default is ==4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711547" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711548" version="1" comment="kernel-default is ==4.4.82-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711549" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711550" version="1" comment="kernel-default is ==4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711551" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711552" version="1" comment="kernel-default is ==4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711553" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167761" version="1" comment="kernel-default is &lt;4.4.92-6.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711554" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=9-18.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711555" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711556" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711557" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711558" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711559" version="1" comment="kernel-default is ==4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711560" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711561" version="1" comment="kernel-default is ==4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711562" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711563" version="1" comment="kernel-default is ==4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711564" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711565" version="1" comment="kernel-default is ==4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711566" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711567" version="1" comment="kernel-default is ==4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711568" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711569" version="1" comment="kernel-default is ==4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711570" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711571" version="1" comment="kernel-default is ==4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711572" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711573" version="1" comment="kernel-default is ==4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711574" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711575" version="1" comment="kernel-default is ==4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711576" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164286" version="1" comment="kernel-default is &lt;4.4.74-92.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711577" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=10-18.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711578" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=10-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711579" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711580" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711581" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711582" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=7-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711583" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=6-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711584" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=5-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711585" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=5-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711586" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711587" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711588" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711589" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161762" version="1" comment="kernel-default is &lt;4.4.74-92.35.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711590" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162427" version="1" comment="kernel-default is &lt;4.4.82-6.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711591" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=7-21.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711592" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=7-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711593" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711594" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711595" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711596" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=4-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711597" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=3-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711598" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711599" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156965" version="1" comment="kernel-default is &lt;4.4.59-92.20.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711600" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711601" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711602" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711603" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711604" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711605" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711606" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711607" version="1" comment="kernel-default is ==4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711608" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166113" version="1" comment="kernel-default is &lt;4.4.90-92.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711609" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711610" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711611" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711612" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166003" version="1" comment="kernel-default is &lt;4.4.92-6.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711613" version="1" comment="kernel-default is ==4.12.14-95.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711614" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711615" version="1" comment="kernel-default is &lt;4.12.14-95.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711616" version="1" comment="kernel-default is ==4.12.14-120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711617" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=8-21.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711618" version="1" comment="kernel-default is ==4.12.14-122.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711619" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711620" version="1" comment="kernel-default is &lt;4.12.14-122.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711621" version="1" comment="kernel-default is ==4.12.14-150.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711622" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711623" version="1" comment="kernel-default is &lt;4.12.14-150.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711624" version="1" comment="kernel-default is ==4.12.14-197.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711625" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711626" version="1" comment="kernel-default is &lt;4.12.14-197.26.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711627" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711628" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711629" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711630" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711631" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157580" version="1" comment="kernel-default is &lt;4.4.59-92.24.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711632" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711633" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711634" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711635" version="1" comment="kernel-default is &lt;4.4.82-6.9.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711636" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711637" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711638" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711639" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711640" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711641" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711642" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711643" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711644" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711645" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711646" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711647" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711648" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711649" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711650" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711651" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711652" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711653" version="1" comment="kernel-default is ==4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711654" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711655" version="1" comment="kernel-default is ==4.4.114-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711656" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711657" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711658" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711659" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711660" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711661" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140695" version="1" comment="kernel-default is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711662" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711663" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711664" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711665" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711666" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711667" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711668" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711669" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711670" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711671" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711672" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711673" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711674" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711675" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711676" version="1" comment="kernel-default is ==4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711677" version="1" comment="kgraft-patch-4_4_103-92_53-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711678" version="1" comment="kernel-default is ==4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711679" version="1" comment="kgraft-patch-4_4_103-92_56-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711680" version="1" comment="kernel-default is ==4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711681" version="1" comment="kgraft-patch-4_4_90-92_50-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167754" version="1" comment="kernel-default is &lt;4.4.90-92.50.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711682" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711683" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711684" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711685" version="1" comment="kgraft-patch-4_4_103-92_53-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711686" version="1" comment="kgraft-patch-4_4_103-92_56-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711687" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711688" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711689" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711690" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711691" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711692" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711693" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711694" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711695" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711696" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711697" version="1" comment="kgraft-patch-4_4_90-92_50-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711698" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711699" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711700" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711701" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711702" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711703" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711704" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711705" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711706" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711707" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711708" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711709" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711710" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714892" version="1" comment="kernel-default is ==4.12.14-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711711" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711712" version="1" comment="kernel-default is ==4.12.14-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711713" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714893" version="1" comment="kernel-default is &lt;4.12.14-25.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711714" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=8-18.7.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711715" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711716" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711717" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711718" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711719" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149009" version="1" comment="kernel-default is &lt;4.4.49-92.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711720" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711722" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711724" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711726" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711728" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711730" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711732" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711734" version="1" comment="kernel-default is ==3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711735" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711737" version="1" comment="kernel-default is ==3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711738" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711740" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=4-11.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711741" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711742" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711743" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711744" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711745" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711747" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711749" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711751" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711753" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711755" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711757" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711759" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711761" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711763" version="1" comment="kernel-default is ==3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711764" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711766" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=5-14.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711767" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711768" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711769" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711770" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711771" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711772" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711774" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711776" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711778" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711780" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711782" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711784" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711786" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711788" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711790" version="1" comment="kernel-default is ==3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711791" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711793" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=6-17.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711794" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711795" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711796" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711797" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711798" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711799" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150055" version="1" comment="kernel-default is &lt;4.4.49-92.14.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711800" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711801" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711802" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711803" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711804" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158776" version="1" comment="kernel-default is &lt;4.4.74-92.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711805" version="1" comment="kernel-default is ==4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711806" version="1" comment="kgraft-patch-4_4_73-5-default is &gt;=2-2.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159035" version="1" comment="kernel-default is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711807" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711808" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711809" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711810" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711811" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711812" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711813" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711814" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711815" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711816" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711817" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711818" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711819" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711820" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711821" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711822" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711823" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711824" version="1" comment="kernel-default is ==4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711825" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711826" version="1" comment="kernel-default is ==4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711827" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711828" version="1" comment="kernel-default is ==4.12.14-95.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711829" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711830" version="1" comment="kernel-default is ==4.12.14-95.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711831" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711832" version="1" comment="kernel-default is ==4.12.14-95.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711833" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711834" version="1" comment="kernel-default is ==4.12.14-95.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711835" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711836" version="1" comment="kernel-default is ==4.12.14-95.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711837" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711838" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711839" version="1" comment="kernel-default is ==4.12.14-95.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711840" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711841" version="1" comment="kernel-default is ==4.12.14-95.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711842" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711843" version="1" comment="kernel-default is ==4.12.14-95.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711844" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711845" version="1" comment="kernel-default is &lt;4.12.14-95.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711846" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=5-12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711847" version="1" comment="kernel-default is ==4.12.14-122.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711848" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711849" version="1" comment="kernel-default is ==4.12.14-122.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711850" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711851" version="1" comment="kernel-default is ==4.12.14-122.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711852" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711853" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711854" version="1" comment="kernel-default is ==4.12.14-150.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711855" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711856" version="1" comment="kernel-default is ==4.12.14-150.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711857" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711858" version="1" comment="kernel-default is ==4.12.14-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711859" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711860" version="1" comment="kernel-default is ==4.12.14-150.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711861" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711862" version="1" comment="kernel-default is ==4.12.14-150.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711863" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711864" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711865" version="1" comment="kernel-default is ==4.12.14-150.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711866" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711867" version="1" comment="kernel-default is &lt;4.12.14-150.47.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714895" version="1" comment="kernel-default is ==4.12.14-195.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711868" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=12-34.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711869" version="1" comment="kernel-default is ==4.12.14-197.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711870" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711871" version="1" comment="kernel-default is ==4.12.14-197.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711872" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711873" version="1" comment="kernel-default is ==4.12.14-197.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711874" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711875" version="1" comment="kernel-default is ==4.12.14-197.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711876" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711877" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711878" version="1" comment="kernel-default is ==4.12.14-197.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711879" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711880" version="1" comment="kernel-default is ==4.12.14-197.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711881" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711882" version="1" comment="kernel-default is ==4.12.14-197.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711883" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711884" version="1" comment="kernel-default is ==4.12.14-197.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711885" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711886" version="1" comment="kernel-default is ==4.12.14-197.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711887" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711888" version="1" comment="kernel-default is ==4.12.14-197.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711889" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712211" version="1" comment="kernel-default is &lt;4.12.14-197.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711890" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711891" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711892" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711893" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711894" version="1" comment="kernel-default is ==4.4.131-94.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711895" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711896" version="1" comment="kernel-default is ==4.4.132-94.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711897" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711898" version="1" comment="kernel-default is ==4.12.14-25.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711899" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711900" version="1" comment="kernel-default is ==4.12.14-25.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711901" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712098" version="1" comment="kernel-default is &lt;4.12.14-25.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711902" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711903" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711904" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711905" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711906" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711907" version="1" comment="kernel-default is ==4.4.138-94.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711908" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711909" version="1" comment="kernel-default is ==4.4.140-94.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711910" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711911" version="1" comment="kernel-default is ==4.4.143-94.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711912" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711913" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=4-10.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711914" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711915" version="1" comment="kernel-default is ==4.12.14-25.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711916" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711917" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711918" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=9-25.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711919" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480339" version="1" comment="kernel-default is &lt;4.12.14-23.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711920" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711921" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711922" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711923" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711924" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711925" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711926" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711927" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711928" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711929" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711930" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711931" version="1" comment="kernel-default is ==4.4.155-94.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711932" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711933" version="1" comment="kernel-default is ==4.4.156-94.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711934" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711935" version="1" comment="kernel-default is ==4.4.156-94.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711936" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711937" version="1" comment="kernel-default is ==4.4.156-94.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711938" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711939" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711940" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711941" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=5-13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711942" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711943" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711944" version="1" comment="kernel-default is ==4.12.14-25.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711945" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711946" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711947" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711948" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711949" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711950" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711951" version="1" comment="kernel-default is &lt;4.4.140-94.42.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711952" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=10-28.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711953" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711954" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=3-7.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711955" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711956" version="1" comment="kernel-default is ==4.12.14-94.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711957" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=9-2.25.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711958" version="1" comment="kernel-default is ==4.12.14-95.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711959" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=8-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711960" version="1" comment="kernel-default is ==4.12.14-95.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711961" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711962" version="1" comment="kernel-default is &lt;4.12.14-95.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711963" version="1" comment="kernel-default is ==4.12.14-25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711964" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711965" version="1" comment="kernel-default is &lt;4.12.14-25.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711966" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711967" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711968" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711969" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711970" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711971" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711972" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711973" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711974" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711975" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711976" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711977" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711978" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711979" version="1" comment="kernel-default is ==4.4.162-94.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711980" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711981" version="1" comment="kernel-default is ==4.4.162-94.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711982" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711983" version="1" comment="kernel-default is &lt;4.4.162-94.72.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711984" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=3-2.7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711985" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711986" version="1" comment="kernel-default is &lt;4.12.14-95.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711987" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=8-22.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711988" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711989" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711990" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711991" version="1" comment="kernel-default is ==4.12.14-25.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711992" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711993" version="1" comment="kernel-default is ==4.12.14-25.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711994" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711995" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711996" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711997" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711998" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711999" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712000" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=6-16.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712001" version="1" comment="kernel-default is ==4.12.14-95.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712002" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712003" version="1" comment="kernel-default is ==4.12.14-95.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712004" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698690" version="1" comment="kernel-default is ==4.12.14-95.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712005" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698692" version="1" comment="kernel-default is ==4.12.14-95.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712006" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698694" version="1" comment="kernel-default is ==4.12.14-95.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712007" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698696" version="1" comment="kernel-default is ==4.12.14-95.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712008" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698698" version="1" comment="kernel-default is &lt;4.12.14-95.83.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712009" version="1" comment="kernel-default is ==4.12.14-150.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712010" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712011" version="1" comment="kernel-default is ==4.12.14-150.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712012" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698720" version="1" comment="kernel-default is ==4.12.14-150.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712013" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698722" version="1" comment="kernel-default is ==4.12.14-150.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712014" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698724" version="1" comment="kernel-default is ==4.12.14-150.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712015" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698726" version="1" comment="kernel-default is &lt;4.12.14-150.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712016" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712017" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712018" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712019" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=5-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712020" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=5-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712021" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=4-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712022" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=4-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712023" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=2-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712024" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=2-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712025" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=10-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712026" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=9-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712027" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=9-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712028" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=8-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712029" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712030" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712031" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712032" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712033" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712034" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712035" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712036" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712037" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712038" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712039" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712040" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712041" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712042" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712043" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712044" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712045" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712046" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712047" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712048" version="1" comment="kernel-default is &lt;4.4.132-94.33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712049" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=7-19.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712050" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712051" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712052" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712053" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=6-15.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512974" version="1" comment="kernel-default is &lt;4.12.14-120.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712054" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712055" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712056" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712057" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712058" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712059" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712060" version="1" comment="kernel-default is ==4.12.14-95.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712061" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=6-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712062" version="1" comment="kernel-default is ==4.12.14-95.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712063" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=6-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712064" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712065" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712066" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712067" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712068" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712069" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712070" version="1" comment="kernel-default is ==4.12.14-150.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712071" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712072" version="1" comment="kernel-default is ==4.12.14-150.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712073" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712074" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712075" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712076" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712077" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712078" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712079" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712080" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=8-22.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712081" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712082" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712083" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712084" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712085" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712086" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712087" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=5-2.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712088" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712089" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712090" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712091" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712092" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712093" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712094" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712095" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712096" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712097" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712099" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712100" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712101" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712102" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712103" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712104" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712105" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712106" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712107" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712108" version="1" comment="kernel-default is ==4.4.175-94.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712109" version="1" comment="kgraft-patch-4_4_175-94_79-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712110" version="1" comment="kernel-default is ==4.4.176-94.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712111" version="1" comment="kgraft-patch-4_4_176-94_88-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712112" version="1" comment="kernel-default is ==4.4.178-94.91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712113" version="1" comment="kgraft-patch-4_4_178-94_91-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712114" version="1" comment="kernel-default is &lt;4.4.178-94.91.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712115" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=6-2.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712116" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712117" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712118" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712119" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712120" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712121" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712122" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712123" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712124" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712125" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712126" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712127" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712128" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712129" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712130" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=4-10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481199" version="1" comment="kernel-default is &lt;4.12.14-195.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712131" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712132" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712133" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712134" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712135" version="1" comment="kernel-default is ==4.4.180-94.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712136" version="1" comment="kgraft-patch-4_4_180-94_97-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712137" version="1" comment="kernel-default is &lt;4.4.180-94.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712138" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712139" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712140" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712141" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712142" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712143" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=3-7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712144" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714896" version="1" comment="kernel-default is &lt;4.12.14-197.4.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712145" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=5-13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712146" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712147" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712148" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=7-2.19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712149" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712150" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712151" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712152" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712153" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712154" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712155" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712156" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712157" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712158" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712159" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712160" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712161" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712162" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712163" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712164" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712165" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=6-16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712166" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712167" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712168" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712169" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712170" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712171" version="1" comment="kernel-default is &lt;4.12.14-95.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712172" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712173" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712174" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712175" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712176" version="1" comment="kernel-default is &lt;4.12.14-197.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712177" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712178" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712179" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712180" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712181" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712182" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712183" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712184" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712185" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712186" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712187" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712188" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712189" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712190" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712191" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712192" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712193" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712194" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712195" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712196" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712197" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712198" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712199" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=9-25.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712200" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712201" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712202" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712203" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712204" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712205" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712206" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712207" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712208" version="1" comment="kernel-default is &lt;4.12.14-197.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712209" version="1" comment="kernel-default is &lt;4.12.14-95.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712210" version="1" comment="kernel-default is &lt;4.12.14-150.32.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712212" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712213" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712214" version="1" comment="kernel-default is ==4.12.14-95.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712215" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712216" version="1" comment="kernel-default is &lt;4.12.14-95.54.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712217" version="1" comment="kernel-default is ==4.12.14-150.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712218" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712219" version="1" comment="kernel-default is &lt;4.12.14-150.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712220" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=8-2.22.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712221" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712222" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712223" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712224" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712225" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712226" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712227" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712228" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712229" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712230" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712231" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712232" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712233" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712234" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712235" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712236" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712237" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=7-19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712238" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712239" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712240" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712241" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712242" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334017" version="1" comment="kernel-default is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334791" version="1" comment="kernel-devel is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334792" version="1" comment="kernel-macros is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333928" version="1" comment="kernel-source is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025852" version="1" comment="SL-Micro-release is ==6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712243" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712244" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712245" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712246" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712247" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712248" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712249" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712250" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712251" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=3-6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712252" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712253" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712254" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712255" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712256" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712257" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712258" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712259" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712260" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712261" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712262" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712263" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=10-28.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712264" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712265" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712266" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712267" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712268" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712269" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712270" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712271" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712272" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712273" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712274" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712275" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712276" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712277" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712278" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712279" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712280" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712281" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712282" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712283" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712284" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712285" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=4-2.10.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712286" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712287" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712288" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712289" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712290" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712291" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712292" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712293" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712294" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712295" version="1" comment="kgraft-patch-4_4_175-94_79-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712296" version="1" comment="kernel-default is &lt;4.4.175-94.79.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712297" version="1" comment="kernel-default is &lt;4.12.14-95.48.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712298" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712299" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712300" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712301" version="1" comment="kernel-default is &lt;4.12.14-197.37.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712302" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712303" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712304" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712305" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712306" version="1" comment="kernel-default is ==4.12.14-95.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712307" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712308" version="1" comment="kernel-default is ==4.12.14-95.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712309" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712310" version="1" comment="kernel-default is &lt;4.12.14-95.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712311" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712312" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712313" version="1" comment="kernel-default is ==4.12.14-150.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712314" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712315" version="1" comment="kernel-default is ==4.12.14-150.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712316" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712317" version="1" comment="kernel-default is &lt;4.12.14-150.58.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712318" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712319" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712320" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712321" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712322" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712323" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=7-18.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712324" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712325" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712326" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712327" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712328" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712329" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712330" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712331" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712332" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712333" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712334" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712335" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712336" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712337" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712338" version="1" comment="kernel-default is &lt;4.12.14-197.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712339" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712340" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712341" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712342" version="1" comment="kernel-default is ==4.12.14-150.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712343" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712344" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712345" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712346" version="1" comment="kernel-default is &lt;4.12.14-150.69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712347" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712348" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712349" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712350" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712351" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712352" version="1" comment="kernel-default is ==4.12.14-95.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712353" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712354" version="1" comment="kernel-default is &lt;4.12.14-95.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712355" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712356" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712357" version="1" comment="kernel-default is ==4.12.14-122.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712358" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712359" version="1" comment="kernel-default is ==4.12.14-122.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712360" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712361" version="1" comment="kernel-default is ==4.12.14-122.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712362" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712363" version="1" comment="kernel-default is ==4.12.14-122.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712364" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712365" version="1" comment="kernel-default is ==4.12.14-122.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712366" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712367" version="1" comment="kernel-default is ==4.12.14-122.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712368" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712369" version="1" comment="kernel-default is ==4.12.14-122.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712370" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712371" version="1" comment="kernel-default is ==4.12.14-122.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712372" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712373" version="1" comment="kernel-default is ==4.12.14-122.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712374" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712375" version="1" comment="kernel-default is &lt;4.12.14-122.54.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712376" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712377" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712378" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712379" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712380" version="1" comment="kernel-default is &lt;4.12.14-150.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712381" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712382" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712383" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712384" version="1" comment="kernel-default is ==4.12.14-197.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712385" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712386" version="1" comment="kernel-default is ==4.12.14-197.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712387" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712388" version="1" comment="kernel-default is ==4.12.14-197.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712389" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712390" version="1" comment="kernel-default is ==4.12.14-197.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712391" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712392" version="1" comment="kernel-default is ==4.12.14-197.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712393" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712394" version="1" comment="kernel-default is ==4.12.14-197.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712395" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712396" version="1" comment="kernel-default is ==4.12.14-197.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712397" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712398" version="1" comment="kernel-default is ==4.12.14-197.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712399" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712400" version="1" comment="kernel-default is ==4.12.14-197.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712401" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712402" version="1" comment="kernel-default is &lt;4.12.14-197.75.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714897" version="1" comment="kernel-default is ==5.3.18-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712403" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=7-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712404" version="1" comment="kernel-default is ==5.3.18-24.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712405" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712406" version="1" comment="kernel-default is ==5.3.18-24.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712407" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712408" version="1" comment="kernel-default is ==5.3.18-24.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712409" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714898" version="1" comment="kernel-default is &lt;5.3.18-24.9.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712410" version="1" comment="kernel-default is ==5.3.18-24.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712411" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712412" version="1" comment="kernel-default is ==5.3.18-24.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712413" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712414" version="1" comment="kernel-default is ==5.3.18-24.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712415" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712416" version="1" comment="kernel-default is ==5.3.18-24.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712417" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712418" version="1" comment="kernel-default is ==5.3.18-24.43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712419" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712420" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712421" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712422" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712423" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712424" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712425" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712426" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712427" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712428" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712429" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712430" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712431" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712432" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712433" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712434" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712435" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712436" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712437" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712438" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712439" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712440" version="1" comment="kernel-default is &lt;4.12.14-197.61.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712441" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=4-11.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712442" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712443" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712444" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712445" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712446" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712447" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712448" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712449" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712450" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712451" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712452" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712453" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712454" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712455" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712456" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=4-9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712457" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712458" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712459" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712460" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712461" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712462" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712463" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712464" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712465" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712466" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712467" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712468" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712469" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=11-31.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712470" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712471" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712472" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712473" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712474" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712475" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712476" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712477" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712478" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712479" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712480" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712481" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712482" version="1" comment="kernel-default is &lt;4.12.14-95.57.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712483" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712484" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712485" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712486" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712487" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712488" version="1" comment="kernel-default is &lt;4.12.14-150.55.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712489" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712490" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712491" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712492" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712493" version="1" comment="kernel-default is &lt;4.12.14-197.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712494" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=2-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712495" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712496" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712497" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712498" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712499" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712500" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712501" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712502" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712503" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712504" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712505" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712506" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712507" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712508" version="1" comment="kernel-default is &lt;4.12.14-197.56.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712509" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712510" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712511" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712512" version="1" comment="kernel-default is &lt;4.12.14-197.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482053" version="1" comment="kernel-default is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712513" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712514" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712515" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712516" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712517" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712518" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712519" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712520" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712521" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712522" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712523" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712524" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712525" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=9-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712526" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712527" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712528" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712529" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712530" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712531" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712532" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712533" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712534" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712535" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712536" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712537" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712538" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712539" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712540" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712541" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712542" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712543" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712544" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712545" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712546" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712547" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712548" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712549" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712550" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712551" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712552" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712553" version="1" comment="kernel-default is &lt;4.12.14-197.67.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712554" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=5-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712555" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712556" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712557" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712558" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712559" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712560" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712561" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712562" version="1" comment="kernel-default is &lt;4.12.14-95.71.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712563" version="1" comment="kernel-default is ==4.12.14-122.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712564" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712565" version="1" comment="kernel-default is ==4.12.14-122.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712566" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712567" version="1" comment="kernel-default is &lt;4.12.14-122.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712568" version="1" comment="kernel-default is ==4.12.14-197.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712569" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712570" version="1" comment="kernel-default is ==4.12.14-197.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712571" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712572" version="1" comment="kernel-default is &lt;4.12.14-197.86.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712573" version="1" comment="kernel-default is ==5.3.18-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712574" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712575" version="1" comment="kernel-default is ==5.3.18-24.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712576" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712577" version="1" comment="kernel-default is &lt;5.3.18-24.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698763" version="1" comment="kernel-default is ==5.3.18-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712578" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=10-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628531" version="1" comment="kernel-default is &lt;5.3.18-57.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712579" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712580" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712581" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712582" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712583" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712584" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712585" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712586" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712587" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712588" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712589" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712590" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712591" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712592" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712593" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712594" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712595" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712596" version="1" comment="kernel-default is ==4.12.14-122.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712597" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712598" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712599" version="1" comment="kernel-default is &lt;4.12.14-122.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712600" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712601" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712602" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712603" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712604" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712605" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712606" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712607" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712608" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712609" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712610" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712611" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712612" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712613" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712614" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712615" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712616" version="1" comment="kernel-default is ==4.12.14-197.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712617" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712618" version="1" comment="kernel-default is &lt;4.12.14-197.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712619" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=8-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712620" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712621" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712622" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712623" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712624" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712625" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712626" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712627" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712628" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712629" version="1" comment="kernel-default is &lt;4.12.14-95.68.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712630" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712631" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712632" version="1" comment="kernel-default is &lt;4.12.14-150.66.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712633" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712634" version="1" comment="kernel-default is &lt;4.12.14-197.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712635" version="1" comment="kernel-default is ==5.3.18-24.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712636" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712637" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712638" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=6-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712639" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712640" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712641" version="1" comment="kernel-default is &lt;4.12.14-122.57.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712642" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712643" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712644" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712645" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712646" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712647" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712648" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712649" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712650" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712651" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712652" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712653" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712654" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712655" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712656" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712657" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712658" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712659" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712660" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712661" version="1" comment="kernel-default is ==4.12.14-122.66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712662" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712663" version="1" comment="kernel-default is &lt;4.12.14-122.66.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712664" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712665" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712666" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712667" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712668" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712669" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712670" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712671" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712672" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712673" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712674" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712675" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712676" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=11-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712677" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712678" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712679" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712680" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712681" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712682" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712683" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712684" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712685" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712686" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698736" version="1" comment="kernel-default is ==5.3.18-24.53.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712687" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712688" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712689" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712690" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712691" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712692" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712693" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712694" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712695" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712696" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712697" version="1" comment="kernel-default is &lt;4.12.14-95.77.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712698" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712699" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712700" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712701" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712702" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712703" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712704" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712705" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712706" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712707" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712708" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698703" version="1" comment="kernel-default is ==4.12.14-122.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712709" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698705" version="1" comment="kernel-default is ==4.12.14-122.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712710" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698707" version="1" comment="kernel-default is ==4.12.14-122.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712711" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712712" version="1" comment="kernel-default is &lt;4.12.14-122.77.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712713" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712714" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712715" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712716" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712717" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712718" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712719" version="1" comment="kernel-default is &lt;4.12.14-150.72.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712720" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712721" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712722" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712723" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712724" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712725" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712726" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712727" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712728" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712729" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712730" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698729" version="1" comment="kernel-default is ==4.12.14-197.89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712731" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698731" version="1" comment="kernel-default is ==4.12.14-197.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712732" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712733" version="1" comment="kernel-default is &lt;4.12.14-197.92.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712734" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=14-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712735" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712736" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712737" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712738" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712739" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712740" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712741" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712742" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712743" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712744" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698791" version="1" comment="kernel-default is ==5.3.18-24.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712745" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698738" version="1" comment="kernel-default is ==5.3.18-24.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712746" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698740" version="1" comment="kernel-default is ==5.3.18-24.67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712747" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712748" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712749" version="1" comment="kernel-default is ==4.12.14-95.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712750" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712751" version="1" comment="kernel-default is ==4.12.14-95.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712752" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712753" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701405" version="1" comment="kernel-default is ==4.12.14-95.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712754" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701143" version="1" comment="kernel-default is ==4.12.14-95.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712755" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701407" version="1" comment="kernel-default is ==4.12.14-95.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712756" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701145" version="1" comment="kernel-default is ==4.12.14-95.99.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712757" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701147" version="1" comment="kernel-default is &lt;4.12.14-95.99.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698699" version="1" comment="kernel-default is ==4.12.14-122.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712758" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698701" version="1" comment="kernel-default is ==4.12.14-122.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712759" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701411" version="1" comment="kernel-default is ==4.12.14-122.110.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712760" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701413" version="1" comment="kernel-default is ==4.12.14-122.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712761" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701148" version="1" comment="kernel-default is ==4.12.14-122.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712762" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701415" version="1" comment="kernel-default is ==4.12.14-122.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712763" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701150" version="1" comment="kernel-default is ==4.12.14-122.124.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712764" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712765" version="1" comment="kernel-default is ==4.12.14-122.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712766" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712767" version="1" comment="kernel-default is ==4.12.14-122.130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712768" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698713" version="1" comment="kernel-default is ==4.12.14-122.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712769" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698715" version="1" comment="kernel-default is ==4.12.14-122.91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712770" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698717" version="1" comment="kernel-default is ==4.12.14-122.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712771" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698719" version="1" comment="kernel-default is &lt;4.12.14-122.98.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701421" version="1" comment="kernel-default is ==4.12.14-150000.150.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712772" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=7-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701260" version="1" comment="kernel-default is ==4.12.14-150000.150.92.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712773" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712774" version="1" comment="kernel-default is ==4.12.14-150000.150.95.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712775" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712776" version="1" comment="kernel-default is ==4.12.14-150000.150.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712777" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712778" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=13-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701262" version="1" comment="kernel-default is ==4.12.14-150.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712779" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701425" version="1" comment="kernel-default is ==4.12.14-150.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712780" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701427" version="1" comment="kernel-default is &lt;4.12.14-150.86.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701265" version="1" comment="kernel-default is ==4.12.14-150100.197.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712781" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701154" version="1" comment="kernel-default is ==4.12.14-150100.197.114.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712782" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712783" version="1" comment="kernel-default is ==4.12.14-150100.197.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712784" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712785" version="1" comment="kernel-default is ==4.12.14-150100.197.120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712786" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698727" version="1" comment="kernel-default is ==4.12.14-197.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712787" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701428" version="1" comment="kernel-default is ==4.12.14-197.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712788" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701268" version="1" comment="kernel-default is ==4.12.14-197.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712789" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701270" version="1" comment="kernel-default is &lt;4.12.14-197.108.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698822" version="1" comment="kernel-default is ==5.3.18-150200.24.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712790" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698824" version="1" comment="kernel-default is ==5.3.18-150200.24.115.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712791" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709908" version="1" comment="kernel-default is ==5.3.18-150200.24.126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709909" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698786" version="1" comment="kernel-default is ==5.3.18-24.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712792" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698788" version="1" comment="kernel-default is ==5.3.18-24.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712793" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698748" version="1" comment="kernel-default is ==5.3.18-24.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712794" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698750" version="1" comment="kernel-default is ==5.3.18-24.86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712795" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698752" version="1" comment="kernel-default is ==5.3.18-24.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712796" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698754" version="1" comment="kernel-default is ==5.3.18-24.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712797" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698756" version="1" comment="kernel-default is ==5.3.18-24.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712798" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698758" version="1" comment="kernel-default is &lt;5.3.18-24.99.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698759" version="1" comment="kernel-default is ==5.3.18-150300.59.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712799" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698761" version="1" comment="kernel-default is ==5.3.18-150300.59.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712800" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698805" version="1" comment="kernel-default is ==5.3.18-150300.59.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712801" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698807" version="1" comment="kernel-default is ==5.3.18-150300.59.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712802" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698809" version="1" comment="kernel-default is ==5.3.18-150300.59.60.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712803" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698842" version="1" comment="kernel-default is ==5.3.18-150300.59.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712804" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698844" version="1" comment="kernel-default is ==5.3.18-150300.59.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712805" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698846" version="1" comment="kernel-default is ==5.3.18-150300.59.71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712806" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701403" version="1" comment="kernel-default is ==5.3.18-150300.59.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712807" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706111" version="1" comment="kernel-default is ==5.3.18-150300.59.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712808" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698773" version="1" comment="kernel-default is ==5.3.18-59.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712809" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698775" version="1" comment="kernel-default is ==5.3.18-59.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712810" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698777" version="1" comment="kernel-default is ==5.3.18-59.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712811" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698779" version="1" comment="kernel-default is ==5.3.18-59.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712812" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698781" version="1" comment="kernel-default is ==5.3.18-59.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712813" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701452" version="1" comment="kernel-default is &lt;5.3.18-59.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698874" version="1" comment="kernel-default is ==5.14.21-150400.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712814" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=5-150400.4.12.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712815" version="1" comment="kernel-default is ==5.14.21-150400.24.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712816" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712817" version="1" comment="kernel-default is ==5.14.21-150400.24.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712818" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712819" version="1" comment="kernel-default is &lt;5.14.21-150400.24.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725853" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725854" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=6-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725497" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725855" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=15-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725856" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=11-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725857" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712820" version="1" comment="kernel-default is &lt;4.12.14-95.80.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712821" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712822" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712823" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712824" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698709" version="1" comment="kernel-default is ==4.12.14-122.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712825" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698711" version="1" comment="kernel-default is ==4.12.14-122.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712826" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712827" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712828" version="1" comment="kernel-default is &lt;4.12.14-122.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712829" version="1" comment="kernel-default is &lt;4.12.14-150.75.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712830" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712831" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698733" version="1" comment="kernel-default is ==4.12.14-197.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712832" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698735" version="1" comment="kernel-default is &lt;4.12.14-197.99.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712833" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712834" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712835" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712836" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698742" version="1" comment="kernel-default is ==5.3.18-24.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712837" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698744" version="1" comment="kernel-default is ==5.3.18-24.75.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712838" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698746" version="1" comment="kernel-default is ==5.3.18-24.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712839" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712840" version="1" comment="kernel-default is &lt;5.3.18-24.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698765" version="1" comment="kernel-default is ==5.3.18-59.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712841" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698767" version="1" comment="kernel-default is ==5.3.18-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712842" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698769" version="1" comment="kernel-default is ==5.3.18-59.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712843" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698771" version="1" comment="kernel-default is ==5.3.18-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712844" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698783" version="1" comment="kernel-default is ==5.3.18-59.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712845" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698785" version="1" comment="kernel-default is &lt;5.3.18-59.5.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712846" version="1" comment="kernel-default is &lt;4.12.14-197.64.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712847" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712848" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712849" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712850" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712851" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712852" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712853" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712854" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712855" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712856" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712857" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712858" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712859" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712860" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712861" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712862" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712863" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712864" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712865" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712866" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712867" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712868" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712869" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712870" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712871" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712872" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712873" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712874" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712875" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712876" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712877" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712878" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712879" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712880" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712881" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712882" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712883" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=13-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712884" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712885" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712886" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712887" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712888" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712889" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712890" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712891" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712892" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712893" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712894" version="1" comment="kernel-default is &lt;4.12.14-122.32.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712895" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712896" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712897" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712898" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712899" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712900" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712901" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712902" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712903" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712904" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712905" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712906" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712907" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712908" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712909" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712910" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712911" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712912" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712913" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712914" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712915" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712916" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712917" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712918" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712919" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712920" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712921" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712922" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712923" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712924" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712925" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712926" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712927" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712928" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712929" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712930" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712931" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712932" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712933" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712934" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712935" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712936" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712937" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712938" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712939" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=12-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712940" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712941" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712942" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712943" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712944" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712945" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712946" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712947" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712948" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712949" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712950" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712951" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712952" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712953" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712954" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712955" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712956" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712957" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712958" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712959" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712960" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712961" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712962" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712963" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712964" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712965" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712966" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712967" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712968" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712969" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712970" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712971" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712972" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712973" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712974" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712975" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712976" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712977" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712978" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712979" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712980" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712981" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712982" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712983" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712984" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712985" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712986" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712987" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712988" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712989" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712990" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712991" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712992" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712993" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712994" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712995" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712996" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712997" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712998" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712999" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713000" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713001" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713002" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713003" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713004" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713005" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713006" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713007" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713008" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713009" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713010" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713011" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713012" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713013" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713014" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713015" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713016" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713017" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713018" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713019" version="1" comment="kernel-default is &lt;5.3.18-24.53.4.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713020" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=9-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713021" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713022" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713023" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713024" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713025" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713026" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713027" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713028" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713029" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713030" version="1" comment="kernel-default is &lt;5.3.18-24.93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713031" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713032" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713033" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713034" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713035" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713036" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713037" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713038" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713041" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713042" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713043" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713044" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713045" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713046" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713047" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713048" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713049" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713050" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713051" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713052" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713053" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713054" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713055" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713056" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713057" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713058" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713059" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713060" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713061" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713062" version="1" comment="kernel-default is &lt;4.12.14-122.80.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713063" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713064" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713065" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713066" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713067" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713068" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713069" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713070" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713071" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713072" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713073" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713074" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713075" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713076" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713077" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713078" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713079" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713080" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713081" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713082" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713083" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713084" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713085" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713086" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713087" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713088" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713089" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713090" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713091" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713092" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713093" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713094" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713095" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713096" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713097" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713098" version="1" comment="kernel-default is &lt;5.3.18-24.75.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713099" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=5-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713100" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713101" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713102" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713103" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713104" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713105" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=4-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713106" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713107" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713108" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713109" version="1" comment="kernel-default is &lt;4.12.14-95.74.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713110" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713111" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713112" version="1" comment="kernel-default is &lt;4.12.14-122.71.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713113" version="1" comment="kernel-default is &lt;4.12.14-197.89.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713114" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713115" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713116" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713117" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=3-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713118" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713119" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713120" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713121" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713122" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713123" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713124" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713125" version="1" comment="kernel-default is &lt;5.3.18-24.64.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713126" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713127" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713128" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713129" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713130" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713131" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713132" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713133" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713134" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713135" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713136" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713137" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713138" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713139" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713140" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713141" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713142" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713143" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713144" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713145" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713146" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713147" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713148" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713149" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713150" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713151" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713152" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713153" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713154" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713155" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713156" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713157" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713158" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713159" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713160" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713161" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713162" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=10-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713163" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713164" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713165" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713166" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713167" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713168" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713169" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713170" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713171" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713172" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713173" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713174" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713175" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713176" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713177" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713178" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713179" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713180" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713181" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713182" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713183" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713184" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713185" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713186" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713187" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713188" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713189" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713190" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713191" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713192" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713193" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713194" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713195" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713196" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713197" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713198" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713199" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713200" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713201" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713202" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713203" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713204" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713205" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713206" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713207" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713208" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713209" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713210" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713211" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713212" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=9-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713213" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713214" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713215" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713216" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713217" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713218" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713219" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713220" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713221" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713222" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713223" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713224" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713225" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713226" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713227" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713228" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=7-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713229" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713230" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713231" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713232" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713233" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713234" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713235" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713236" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713237" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713238" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713239" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713240" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713241" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713242" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713243" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713244" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713245" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713246" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713247" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713248" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713249" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713250" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713251" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713252" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713253" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713254" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713255" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713256" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713257" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713258" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713259" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713260" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713261" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713262" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=12-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713263" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713264" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713265" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713266" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713267" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713268" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713269" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713270" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713271" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713272" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713273" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725499" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725858" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725859" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725860" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725861" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725862" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725863" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725864" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725865" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725866" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725867" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725868" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725869" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725501" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725870" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725871" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725872" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725503" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725873" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=15-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725874" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725875" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725876" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725877" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725878" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725879" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725880" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725881" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725882" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725883" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725884" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725885" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725886" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725887" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725888" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725889" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725890" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725891" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725505" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725892" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725893" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725894" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725895" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=8-150400.4.21.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725506" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713798" version="1" comment="kernel-default is &lt;5.14.21-150400.24.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713274" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=8-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713275" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713276" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713277" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713278" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713279" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713280" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713281" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713282" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713283" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713284" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713285" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713286" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713287" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713288" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713289" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713290" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713291" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713292" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713293" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713294" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713295" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713296" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713297" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713298" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713299" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713300" version="1" comment="kernel-default is &lt;4.12.14-122.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713301" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713302" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713303" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713304" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713305" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713306" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713307" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713308" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713309" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713310" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713311" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713312" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713313" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713314" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713315" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713316" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713317" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713318" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713319" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713320" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713321" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713322" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713323" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713324" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713325" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713326" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713327" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713328" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713329" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713330" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713331" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713332" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713333" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713334" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713335" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713336" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713337" version="1" comment="kernel-default is &lt;5.3.18-24.70.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713338" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713339" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713340" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713341" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713342" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713343" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713344" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713345" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713346" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713347" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713348" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713349" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713350" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713351" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713352" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713353" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713354" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713355" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713356" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713357" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713358" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713359" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713360" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713361" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713362" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713363" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713364" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713365" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713366" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713367" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713368" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713369" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713370" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713371" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713372" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713373" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713374" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713375" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713376" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713377" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713378" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713379" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713380" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713381" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713382" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713383" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713384" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713385" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713386" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713387" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713388" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713389" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713390" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713391" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713392" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713393" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=6-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713394" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713395" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713396" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713397" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713398" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713399" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713400" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713401" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713402" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713403" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713404" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713405" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713406" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713407" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698825" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=2-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716156" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718697" version="1" comment="kernel-default is ==5.3.18-150200.24.129.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718698" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725507" version="1" comment="kernel-default is ==5.3.18-150200.24.134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725508" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713408" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713409" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713410" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713411" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713412" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713413" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713414" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713415" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713416" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713417" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713418" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713419" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713420" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713421" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713422" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713423" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713424" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713425" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713426" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713427" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713428" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701443" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701404" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706112" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709695" version="1" comment="kernel-default is ==5.3.18-150300.59.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715597" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715598" version="1" comment="kernel-default is ==5.3.18-150300.59.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715599" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725509" version="1" comment="kernel-default is ==5.3.18-150300.59.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725510" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713429" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=14-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713430" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713431" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713432" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713433" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713434" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713435" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713436" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713437" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713438" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713439" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698875" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=2-150400.4.3.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715600" version="1" comment="kernel-default is ==5.14.21-150400.24.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715601" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725511" version="1" comment="kernel-default is ==5.14.21-150400.24.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725512" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729488" version="1" comment="kernel-default is ==5.14.21-150400.24.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729489" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729490" version="1" comment="kernel-default is &lt;5.14.21-150400.24.33.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713440" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713441" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713442" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713443" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713444" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713445" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713446" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713447" version="1" comment="kernel-default is &lt;4.12.14-95.96.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713448" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713449" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=15-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713450" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=12-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713451" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=7-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713452" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713453" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713454" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=13-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713455" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713456" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713457" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713458" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713459" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713460" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713461" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713462" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713463" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713464" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713465" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713466" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713467" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713468" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713469" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713470" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713471" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713472" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713473" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713474" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713475" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713476" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713477" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713478" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713479" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713480" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713481" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713482" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713483" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713484" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713485" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713486" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713487" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713488" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713489" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713490" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713491" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713492" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713493" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713494" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713495" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713496" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713497" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713498" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713499" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713500" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713501" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713502" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713503" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713504" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713505" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713506" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713507" version="1" comment="kernel-default is &lt;5.3.18-24.96.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713508" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=11-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713509" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713510" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713511" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713512" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713513" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713514" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713515" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713516" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713517" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713518" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713519" version="1" comment="kernel-default is &lt;4.12.14-122.91.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713520" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713521" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713522" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713523" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713524" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713525" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713526" version="1" comment="kernel-default is &lt;5.3.18-24.86.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713527" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713528" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713529" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713530" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044012" version="1" comment="patch is &lt;2.7.6-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776021" version="1" comment="kernel-default is ==4.12.14-122.162.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868478" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794744" version="1" comment="kernel-default is ==4.12.14-122.165.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868479" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798684" version="1" comment="kernel-default is ==4.12.14-122.173.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868480" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807350" version="1" comment="kernel-default is ==4.12.14-122.176.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868481" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807695" version="1" comment="kernel-default is ==4.12.14-122.179.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868482" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816437" version="1" comment="kernel-default is ==4.12.14-122.183.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868483" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845680" version="1" comment="kernel-default is ==4.12.14-122.186.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868926" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845682" version="1" comment="kernel-default is ==4.12.14-122.189.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868484" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849119" version="1" comment="kernel-default is ==4.12.14-122.194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868485" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854320" version="1" comment="kernel-default is ==4.12.14-122.201.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960101" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=11-8.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868487" version="1" comment="kernel-default is ==4.12.14-122.216.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960102" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=9-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868489" version="1" comment="kernel-default is &lt;4.12.14-122.216.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776028" version="1" comment="kernel-default is ==5.3.18-150200.24.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868490" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795754" version="1" comment="kernel-default is ==5.3.18-150200.24.157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868491" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799561" version="1" comment="kernel-default is ==5.3.18-150200.24.160.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868492" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804085" version="1" comment="kernel-default is ==5.3.18-150200.24.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868493" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804087" version="1" comment="kernel-default is ==5.3.18-150200.24.166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868494" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816090" version="1" comment="kernel-default is ==5.3.18-150200.24.169.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868495" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845690" version="1" comment="kernel-default is ==5.3.18-150200.24.172.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868496" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845859" version="1" comment="kernel-default is ==5.3.18-150200.24.175.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868497" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849454" version="1" comment="kernel-default is ==5.3.18-150200.24.178.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868498" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854323" version="1" comment="kernel-default is ==5.3.18-150200.24.183.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956848" version="1" comment="kernel-livepatch-5_3_18-150200_24_183-default is &gt;=10-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861753" version="1" comment="kernel-default is ==5.3.18-150200.24.188.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957141" version="1" comment="kernel-livepatch-5_3_18-150200_24_188-default is &gt;=9-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861755" version="1" comment="kernel-default is &lt;5.3.18-150200.24.188.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775813" version="1" comment="kernel-default is ==5.3.18-150300.59.124.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868501" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796008" version="1" comment="kernel-default is ==5.3.18-150300.59.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868502" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799638" version="1" comment="kernel-default is ==5.3.18-150300.59.130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868503" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804090" version="1" comment="kernel-default is ==5.3.18-150300.59.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868504" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804092" version="1" comment="kernel-default is ==5.3.18-150300.59.138.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868505" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816440" version="1" comment="kernel-default is ==5.3.18-150300.59.141.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868506" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845693" version="1" comment="kernel-default is ==5.3.18-150300.59.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868507" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845695" version="1" comment="kernel-default is ==5.3.18-150300.59.147.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868508" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849457" version="1" comment="kernel-default is ==5.3.18-150300.59.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868509" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854326" version="1" comment="kernel-default is ==5.3.18-150300.59.153.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961304" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=12-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861761" version="1" comment="kernel-default is ==5.3.18-150300.59.158.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961280" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=11-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861763" version="1" comment="kernel-default is &lt;5.3.18-150300.59.158.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968248" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=18-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968249" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968250" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868517" version="1" comment="kernel-default is ==5.3.18-150300.59.161.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968251" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871852" version="1" comment="kernel-default is &lt;5.3.18-150300.59.161.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947485" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947486" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947487" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947488" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947489" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947408" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868514" version="1" comment="kernel-default is ==5.3.18-150200.24.191.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956850" version="1" comment="kernel-livepatch-5_3_18-150200_24_191-default is &gt;=8-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878063" version="1" comment="kernel-default is ==5.3.18-150200.24.194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956851" version="1" comment="kernel-livepatch-5_3_18-150200_24_194-default is &gt;=5-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947492" version="1" comment="kernel-default is ==5.3.18-150200.24.197.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956852" version="1" comment="kernel-livepatch-5_3_18-150200_24_197-default is &gt;=4-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947494" version="1" comment="kernel-default is &lt;5.3.18-150200.24.197.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947495" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947496" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947497" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947498" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947499" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947500" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961281" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=10-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878066" version="1" comment="kernel-default is ==5.3.18-150300.59.164.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961282" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=7-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947503" version="1" comment="kernel-default is ==5.3.18-150300.59.167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961305" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=6-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947505" version="1" comment="kernel-default is &lt;5.3.18-150300.59.167.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881211" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881212" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881075" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881213" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881214" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881215" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881216" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881217" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881218" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881219" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881220" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881221" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881222" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881223" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868516" version="1" comment="kernel-default is &lt;5.3.18-150200.24.191.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881225" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881226" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881227" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881228" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881229" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881230" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881231" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874159" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874160" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874161" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874162" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874163" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874164" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874165" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874166" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874167" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871835" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871836" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871837" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871838" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871839" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871840" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871841" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871842" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871843" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871845" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871846" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871847" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872165" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871848" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871849" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872415" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871850" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872166" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968252" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968253" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966031" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965285" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965820" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845879" version="1" comment="kernel-default is ==5.14.21-150500.55.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956546" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845884" version="1" comment="kernel-default is ==5.14.21-150500.55.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956854" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849163" version="1" comment="kernel-default is ==5.14.21-150500.55.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956547" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854334" version="1" comment="kernel-default is ==5.14.21-150500.55.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961306" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=13-150500.11.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861773" version="1" comment="kernel-default is ==5.14.21-150500.55.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961307" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=11-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861864" version="1" comment="kernel-default is ==5.14.21-150500.55.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961308" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=11-150500.11.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872677" version="1" comment="kernel-default is ==5.14.21-150500.55.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961309" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=9-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873488" version="1" comment="kernel-default is ==5.14.21-150500.55.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961310" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=9-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878545" version="1" comment="kernel-default is ==5.14.21-150500.55.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961311" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=8-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956857" version="1" comment="kernel-default is ==5.14.21-150500.55.73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960514" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=3-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956859" version="1" comment="kernel-default is &lt;5.14.21-150500.55.73.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948640" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948641" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948642" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948620" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950329" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948643" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948644" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948645" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950330" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948646" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846011" version="1" comment="kernel-default is ==5.14.21-150400.24.100.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948621" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849156" version="1" comment="kernel-default is ==5.14.21-150400.24.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948647" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854329" version="1" comment="kernel-default is ==5.14.21-150400.24.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961312" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=13-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861848" version="1" comment="kernel-default is ==5.14.21-150400.24.111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961313" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=11-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861850" version="1" comment="kernel-default is ==5.14.21-150400.24.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961314" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=11-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868526" version="1" comment="kernel-default is ==5.14.21-150400.24.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961315" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=10-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878543" version="1" comment="kernel-default is ==5.14.21-150400.24.122.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961316" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=8-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947538" version="1" comment="kernel-default is ==5.14.21-150400.24.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960109" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=5-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807720" version="1" comment="kernel-default is ==5.14.21-150400.24.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948652" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816464" version="1" comment="kernel-default is ==5.14.21-150400.24.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948653" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846009" version="1" comment="kernel-default is ==5.14.21-150400.24.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948654" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849160" version="1" comment="kernel-default is &lt;5.14.21-150400.24.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807722" version="1" comment="kernel-default is ==5.14.21-150500.55.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948655" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816469" version="1" comment="kernel-default is ==5.14.21-150500.55.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948656" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950373" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950374" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950292" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943401" version="1" comment="kernel-default is &lt;5.14.21-150500.55.68.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713531" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713532" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713533" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713534" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713535" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698691" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698693" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698695" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698697" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698700" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698702" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698704" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698706" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698708" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698710" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698712" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698714" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698716" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698718" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698721" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=16-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698723" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=13-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698725" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=8-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698728" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698730" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=16-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698732" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=15-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698734" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698737" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698739" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=16-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698741" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698743" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698745" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698747" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698749" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698751" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698753" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698755" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698757" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698760" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698762" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698764" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=16-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698766" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698768" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698770" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698772" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698774" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698776" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698778" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698780" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698782" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698784" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713536" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713537" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713538" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713539" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713540" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713541" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713542" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713543" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713544" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713545" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713546" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713547" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713548" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713549" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713550" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713551" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713552" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713553" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713554" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=13-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713555" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=10-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713556" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713557" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713558" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713559" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=12-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713560" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=10-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713561" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713562" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713563" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713564" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713565" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713566" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713567" version="1" comment="kernel-default is &lt;4.12.14-95.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713568" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713569" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701264" version="1" comment="kernel-default is &lt;4.12.14-150.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713570" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713571" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713572" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713573" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713574" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713575" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713576" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713577" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713578" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713579" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713580" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713581" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713582" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713583" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713584" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713585" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713586" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713587" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713588" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713589" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713590" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713591" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713592" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713593" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713594" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713595" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713596" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713597" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713598" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713599" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713600" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713601" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=15-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713602" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=14-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713603" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=12-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698787" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698789" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698790" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698792" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698793" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698794" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698795" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698796" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698797" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698798" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698799" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698800" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698801" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698802" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698803" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698804" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698806" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698808" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698810" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698811" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=15-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698812" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698813" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698814" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698815" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698816" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698817" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698818" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698819" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698820" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698821" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713604" version="1" comment="kernel-default is &lt;4.12.14-95.93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685665" version="1" comment="kernel-default is &lt;5.14.21-150400.22.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713605" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713606" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713607" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713608" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713609" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713610" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713611" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713612" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713613" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713614" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713615" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713616" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713617" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713618" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713619" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713620" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713621" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=14-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713622" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713623" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713624" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=4-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713625" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713626" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713627" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713628" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=16-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713629" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=14-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713630" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713631" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713632" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713633" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713634" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713635" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713636" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713637" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713638" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713639" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713640" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713641" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713642" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713643" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713644" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713645" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713646" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713647" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=18-150200.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713648" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713649" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713650" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713651" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713652" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713653" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713654" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713655" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713656" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713657" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698823" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=4-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698826" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698827" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698828" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698829" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698830" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698831" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698832" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698833" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698834" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698835" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698836" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698837" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698838" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698839" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698840" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698841" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698843" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698845" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698847" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709696" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698848" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=19-150200.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698849" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698850" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698851" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698852" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698853" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698854" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698855" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698856" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698857" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698858" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713658" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713659" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713660" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713661" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713662" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713663" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713664" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713665" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713666" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713667" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713668" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713669" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713670" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713671" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713672" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713673" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713674" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713675" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713676" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713677" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713678" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713679" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713680" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713681" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713682" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713683" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713684" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713685" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713686" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713687" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713688" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713689" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713690" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713691" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=17-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713692" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713693" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713694" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713695" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713696" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713697" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713698" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713699" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713700" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713701" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713702" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713703" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713704" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713705" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713706" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713707" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713708" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713709" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713710" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713711" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713712" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713713" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713714" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713715" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=6-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713716" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=12-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713717" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713718" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=7-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713719" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713720" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713721" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713722" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714500" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714501" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714502" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715338" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715339" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715340" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715603" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714503" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715341" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714504" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715342" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714505" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714506" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715811" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715604" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=14-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715605" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714507" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714508" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715606" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=14-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714509" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715607" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716236" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716237" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715812" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715813" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715814" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716238" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716239" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716240" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716157" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715815" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714900" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716158" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715608" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715609" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716159" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715610" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715611" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715612" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715816" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715817" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714902" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=6-150400.4.15.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713723" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713724" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713725" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713726" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713727" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713728" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713729" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713730" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713731" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713732" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713733" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713734" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713735" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713736" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713737" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713738" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713739" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713740" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713741" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713742" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713743" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713744" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713745" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713746" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713747" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713748" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713749" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713750" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713751" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713752" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713753" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=4-150400.4.9.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701141" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701142" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701406" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701144" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701408" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701146" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701409" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701410" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701412" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701414" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701149" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701416" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701417" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=18-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701418" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=17-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701419" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701420" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701152" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701153" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701422" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=5-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701423" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=16-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701424" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=11-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701263" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=7-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701426" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=6-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701266" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701267" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=11-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701429" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=7-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701269" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=6-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701430" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=16-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701271" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701431" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=10-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701272" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701432" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=18-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701273" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=17-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701433" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=16-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701274" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701434" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701435" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701275" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701276" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701436" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701437" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701438" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701439" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701440" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=8-150300.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701441" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701442" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701444" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=18-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701445" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=17-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701446" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=16-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701447" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701448" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701449" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701450" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701451" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701453" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=3-150400.4.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713754" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713755" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713756" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713757" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713758" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713759" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713760" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713761" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713762" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713763" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713764" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713765" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713766" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713767" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713768" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713769" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713770" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713771" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=4-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713772" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=15-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713773" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713774" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=6-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713775" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713776" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713777" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713778" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713779" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713780" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=15-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725514" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701151" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701261" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701155" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701157" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699741" version="1" comment="containerized-data-importer-manifests is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713781" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713782" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713783" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713784" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713785" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713786" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713787" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713788" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713789" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713790" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713791" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713792" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713793" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713794" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713795" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=14-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713796" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713797" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=11-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725516" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725518" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725520" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725522" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725524" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725526" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737234" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737179" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737180" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737181" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737182" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737235" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737236" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737318" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729590" version="1" comment="kernel-default is ==5.3.18-150300.59.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738271" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737319" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737320" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737321" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737610" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737611" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737612" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737322" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737323" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737324" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737364" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737238" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737239" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737365" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729113" version="1" comment="kernel-default is &lt;5.3.18-150300.59.98.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737366" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=10-150400.4.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737613" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737367" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738272" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737368" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737614" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713799" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713800" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713801" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713802" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713803" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713804" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713805" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713806" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713807" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=14-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713808" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=11-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713809" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=6-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713810" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713811" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670552" version="1" comment="conmon is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339480" version="1" comment="helm is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683669" version="1" comment="helm-bash-completion is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962708" version="1" comment="ignition is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699742" version="1" comment="kubevirt-manifests is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699743" version="1" comment="kubevirt-virtctl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009343329" version="1" comment="podman is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958376" version="1" comment="podman-docker is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871694" version="1" comment="podman-remote is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958377" version="1" comment="podmansh is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659876" version="1" comment="skopeo is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015151" version="1" comment="suseconnect-ng is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715614" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715615" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715343" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714903" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714904" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714905" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716160" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715818" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714906" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715344" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715616" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729566" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729567" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729771" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729491" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729492" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729493" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729494" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729568" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729569" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=16-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729570" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=12-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729571" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=11-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729496" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=16-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729497" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729498" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729772" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729773" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729774" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729572" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729573" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729499" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729574" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729500" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729575" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=19-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729576" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729577" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755119" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755215" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755384" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755120" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755216" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755217" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755121" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725519" version="1" comment="kernel-default is &lt;4.12.14-122.130.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755218" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755219" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755220" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725523" version="1" comment="kernel-default is &lt;4.12.14-150100.197.120.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755221" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755222" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725525" version="1" comment="kernel-default is &lt;5.3.18-150200.24.126.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713812" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713813" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713814" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713815" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713816" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713817" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737240" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737009" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714512" version="1" comment="kernel-default is ==4.12.14-95.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737241" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729505" version="1" comment="kernel-default is ==4.12.14-95.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737242" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737325" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737326" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737369" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737327" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737328" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737329" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737370" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737330" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737331" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737371" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737332" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715347" version="1" comment="kernel-default is ==4.12.14-122.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737372" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729511" version="1" comment="kernel-default is ==4.12.14-122.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737333" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729513" version="1" comment="kernel-default is &lt;4.12.14-122.136.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737244" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737183" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737184" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737185" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729104" version="1" comment="kernel-default is ==4.12.14-150100.197.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737010" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729519" version="1" comment="kernel-default is ==4.12.14-150100.197.126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737186" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737187" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737188" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725513" version="1" comment="kernel-default is &lt;5.14.21-150400.24.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729502" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729503" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729504" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729506" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729578" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729097" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729579" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729507" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729508" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729509" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729098" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729510" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729512" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729099" version="1" comment="kernel-default is ==4.12.14-150000.150.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729100" version="1" comment="kernel-livepatch-4_12_14-150000_150_101-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729514" version="1" comment="kernel-default is ==4.12.14-150000.150.104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729515" version="1" comment="kernel-livepatch-4_12_14-150000_150_104-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729580" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729581" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=7-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729582" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729583" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729517" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729102" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729103" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729518" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729105" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729520" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729775" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729107" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729108" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729521" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729109" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729584" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729585" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729522" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729586" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729523" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729524" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729111" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729112" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729587" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=9-150400.4.24.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729114" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729115" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729588" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729589" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742686" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742526" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742527" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742528" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742251" version="1" comment="kernel-default is ==4.12.14-95.114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742252" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742529" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742687" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742530" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742531" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742688" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742689" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742532" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742533" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742534" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742690" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742535" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729116" version="1" comment="kernel-default is ==4.12.14-122.139.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742254" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742255" version="1" comment="kernel-default is ==4.12.14-122.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742256" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742257" version="1" comment="kernel-default is &lt;4.12.14-122.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742536" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742537" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742538" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742539" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742540" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742541" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742258" version="1" comment="kernel-default is ==4.12.14-150100.197.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742259" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742542" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742691" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742543" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742544" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742545" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742546" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742261" version="1" comment="kernel-default is ==5.3.18-150200.24.139.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742262" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742547" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737237" version="1" comment="kernel-default is &lt;5.3.18-24.107.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742264" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742548" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742549" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742692" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742693" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742550" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742694" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742695" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742696" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742697" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742698" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743615" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=11-150400.7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743616" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743617" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743618" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743619" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333988" version="1" comment="qemu is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673318" version="1" comment="qemu-SLOF is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335414" version="1" comment="qemu-arm is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654021" version="1" comment="qemu-audio-spice is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335211" version="1" comment="qemu-block-iscsi is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335212" version="1" comment="qemu-block-ssh is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654023" version="1" comment="qemu-chardev-spice is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335213" version="1" comment="qemu-guest-agent is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654024" version="1" comment="qemu-hw-display-qxl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654025" version="1" comment="qemu-hw-display-virtio-gpu is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654026" version="1" comment="qemu-hw-display-virtio-gpu-pci is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654027" version="1" comment="qemu-hw-display-virtio-vga is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654028" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683071" version="1" comment="qemu-hw-usb-host is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654029" version="1" comment="qemu-hw-usb-redirect is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859131" version="1" comment="qemu-img is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335214" version="1" comment="qemu-ipxe is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654030" version="1" comment="qemu-ksm is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335215" version="1" comment="qemu-lang is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335216" version="1" comment="qemu-ppc is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859132" version="1" comment="qemu-pr-helper is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654031" version="1" comment="qemu-s390x is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335244" version="1" comment="qemu-seabios is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335217" version="1" comment="qemu-tools is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654033" version="1" comment="qemu-ui-opengl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654034" version="1" comment="qemu-ui-spice-core is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335218" version="1" comment="qemu-vgabios is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986058" version="1" comment="qemu-vmsr-helper is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335246" version="1" comment="qemu-x86 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715346" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714511" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714513" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714514" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715348" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714515" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715618" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714516" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715619" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718699" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718700" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718701" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718702" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718703" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718704" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718705" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718706" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718707" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718708" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718709" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718710" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718860" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718711" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718712" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718713" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718714" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718715" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718716" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718717" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718368" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718718" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718719" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718720" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718721" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718722" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=7-150400.4.18.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718723" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718370" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718371" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715602" version="1" comment="kernel-default is &lt;5.14.21-150400.24.21.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729591" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725528" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725256" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729117" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737373" version="1" comment="kernel-default is ==5.14.21-150400.24.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737374" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737375" version="1" comment="kernel-default is &lt;5.14.21-150400.24.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769980" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769981" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769982" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770206" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751206" version="1" comment="kernel-default is ==5.3.18-150200.24.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769983" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=5-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751208" version="1" comment="kernel-default is ==5.3.18-150200.24.145.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769984" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751210" version="1" comment="kernel-default is &lt;5.3.18-150200.24.145.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770207" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742266" version="1" comment="kernel-default is ==5.3.18-150300.59.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770208" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742711" version="1" comment="kernel-default is ==5.3.18-150300.59.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770209" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751212" version="1" comment="kernel-default is ==5.3.18-150300.59.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770210" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751214" version="1" comment="kernel-default is ==5.3.18-150300.59.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769985" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770211" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770251" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770212" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770213" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770214" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770252" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770215" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770229" version="1" comment="kernel-default is ==4.12.14-122.159.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861619" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861620" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861621" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861741" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861622" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861623" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861624" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861625" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861626" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861742" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854322" version="1" comment="kernel-default is &lt;4.12.14-122.201.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764737" version="1" comment="kernel-default is ==5.3.18-150200.24.151.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861743" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861744" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861745" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861746" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861747" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861844" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861748" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861749" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861750" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861751" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764740" version="1" comment="kernel-default is ==5.3.18-150300.59.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861756" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861757" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861758" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861759" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861760" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861628" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861629" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861845" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861846" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861630" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861764" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861765" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764673" version="1" comment="kernel-default is ==5.14.21-150400.24.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861766" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764743" version="1" comment="kernel-default is ==5.14.21-150400.24.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861852" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776036" version="1" comment="kernel-default is ==5.14.21-150400.24.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861853" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796010" version="1" comment="kernel-default is ==5.14.21-150400.24.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861767" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796012" version="1" comment="kernel-default is ==5.14.21-150400.24.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861854" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799692" version="1" comment="kernel-default is ==5.14.21-150400.24.81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861855" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861768" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861856" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861769" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877783" version="1" comment="kernel-rt is ==5.14.21-150500.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861770" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=13-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776034" version="1" comment="kernel-default is ==5.14.21-150500.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861857" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=12-150500.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796015" version="1" comment="kernel-default is ==5.14.21-150500.55.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861858" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799694" version="1" comment="kernel-default is ==5.14.21-150500.55.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861859" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861860" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861861" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861862" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861634" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861863" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796017" version="1" comment="kernel-default is ==5.14.21-150500.55.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861775" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796019" version="1" comment="kernel-default is &lt;5.14.21-150500.55.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944105" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944106" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944081" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944429" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944082" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944107" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944108" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=14-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944109" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=13-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944110" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=12-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944111" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=11-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944112" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=11-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944113" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=10-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943397" version="1" comment="kernel-default is &lt;5.14.21-150500.55.59.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960110" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960111" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960112" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868197" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=14-150500.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868931" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=13-150500.9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765681" version="1" comment="kernel-default is &lt;5.14.21-150500.53.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970722" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970723" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878540" version="1" comment="kernel-default is ==4.12.14-122.219.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970724" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947540" version="1" comment="kernel-default is ==4.12.14-122.222.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970725" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956559" version="1" comment="kernel-default is ==4.12.14-122.225.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970726" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960515" version="1" comment="kernel-default is ==4.12.14-122.228.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970727" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968261" version="1" comment="kernel-default is &lt;4.12.14-122.228.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974048" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974049" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974166" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974167" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974050" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956871" version="1" comment="kernel-default is ==5.3.18-150300.59.170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974168" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956873" version="1" comment="kernel-default is &lt;5.3.18-150300.59.170.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968254" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968255" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968256" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947542" version="1" comment="kernel-default is &lt;4.12.14-122.222.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968257" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968258" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968259" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968260" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968262" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960520" version="1" comment="kernel-default is ==5.3.18-150300.59.174.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968263" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961325" version="1" comment="kernel-default is &lt;5.3.18-150300.59.174.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968264" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968265" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968266" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968267" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968268" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968269" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957147" version="1" comment="kernel-default is ==5.14.21-150400.24.128.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968270" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960526" version="1" comment="kernel-default is ==5.14.21-150400.24.133.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968271" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963660" version="1" comment="kernel-default is &lt;5.14.21-150400.24.133.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968272" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968273" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968274" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968275" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968276" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968277" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968278" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960532" version="1" comment="kernel-default is ==5.14.21-150500.55.80.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968279" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968280" version="1" comment="kernel-default is &lt;5.14.21-150500.55.80.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963652" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963347" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963348" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963349" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963350" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963653" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963351" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963352" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963353" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963354" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963355" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963356" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963357" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963654" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963655" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963358" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957149" version="1" comment="kernel-default is &lt;5.14.21-150400.24.128.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963656" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963657" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963359" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963360" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963361" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963362" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963363" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963658" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963659" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947529" version="1" comment="kernel-default is &lt;5.14.21-150500.55.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960113" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=6-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960114" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=4-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960115" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=3-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960516" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=2-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960517" version="1" comment="kernel-default is ==4.12.14-122.231.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029759" version="1" comment="kgraft-patch-4_12_14-122_231-default is &gt;=18-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960519" version="1" comment="kernel-default is &lt;4.12.14-122.231.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960408" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960116" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960117" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961317" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=4-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961318" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=3-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960522" version="1" comment="kernel-default is ==5.3.18-150300.59.179.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960523" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=2-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960524" version="1" comment="kernel-default is &lt;5.3.18-150300.59.179.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960339" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960118" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960525" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=3-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960527" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=2-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960528" version="1" comment="kernel-default is ==5.14.21-150400.24.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960529" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=2-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960530" version="1" comment="kernel-default is &lt;5.14.21-150400.24.136.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960531" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960120" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960533" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=2-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960534" version="1" comment="kernel-default is ==5.14.21-150500.55.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960535" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=2-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960536" version="1" comment="kernel-default is &lt;5.14.21-150500.55.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975029" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975043" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975044" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975030" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975045" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975046" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975047" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975048" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975049" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975401" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975050" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975051" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975052" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975053" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974051" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974052" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017397" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017398" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960541" version="1" comment="kernel-default is ==4.12.14-122.234.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017400" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975403" version="1" comment="kernel-default is ==4.12.14-122.237.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017401" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975405" version="1" comment="kernel-default is ==4.12.14-122.244.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017402" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986269" version="1" comment="kernel-default is ==4.12.14-122.247.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017403" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986280" version="1" comment="kernel-default is ==4.12.14-122.250.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017404" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986282" version="1" comment="kernel-default is &lt;4.12.14-122.250.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017405" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017406" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017329" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960544" version="1" comment="kernel-default is ==5.3.18-150300.59.182.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017407" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966288" version="1" comment="kernel-default is ==5.3.18-150300.59.185.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017330" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966290" version="1" comment="kernel-default is ==5.3.18-150300.59.188.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017331" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986726" version="1" comment="kernel-default is ==5.3.18-150300.59.195.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017408" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986730" version="1" comment="kernel-default is ==5.3.18-150300.59.198.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017409" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986732" version="1" comment="kernel-default is &lt;5.3.18-150300.59.198.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017667" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017410" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017668" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960752" version="1" comment="kernel-default is ==5.14.21-150400.24.141.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017669" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966293" version="1" comment="kernel-default is ==5.14.21-150400.24.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017670" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966295" version="1" comment="kernel-default is ==5.14.21-150400.24.147.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017671" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986625" version="1" comment="kernel-default is ==5.14.21-150400.24.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017672" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986633" version="1" comment="kernel-default is ==5.14.21-150400.24.153.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017673" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008960" version="1" comment="kernel-default is ==5.14.21-150400.24.158.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017411" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008962" version="1" comment="kernel-default is &lt;5.14.21-150400.24.158.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017859" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017674" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017860" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968297" version="1" comment="kernel-default is ==5.14.21-150500.55.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017675" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968299" version="1" comment="kernel-default is ==5.14.21-150500.55.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017861" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986277" version="1" comment="kernel-default is ==5.14.21-150500.55.94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017862" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986283" version="1" comment="kernel-default is ==5.14.21-150500.55.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017863" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986285" version="1" comment="kernel-default is &lt;5.14.21-150500.55.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986262" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=17-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986105" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986263" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986264" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986106" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986266" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986267" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986268" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986270" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986271" version="1" comment="kernel-default is &lt;4.12.14-122.247.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986272" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986273" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986614" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986615" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986616" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986148" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986274" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986275" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986276" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986727" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986728" version="1" comment="kernel-default is &lt;5.3.18-150300.59.195.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986617" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=18-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986618" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=16-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986619" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986729" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986620" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986621" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986622" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986623" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986624" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986626" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986627" version="1" comment="kernel-default is &lt;5.14.21-150400.24.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986149" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=17-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986150" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=17-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986151" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986152" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=11-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986153" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=9-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986154" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=9-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986155" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=5-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986156" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=5-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986278" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=2-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986279" version="1" comment="kernel-default is &lt;5.14.21-150500.55.94.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987582" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=18-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987583" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996805" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987584" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987585" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987643" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996806" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987586" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987587" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996807" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996808" version="1" comment="kernel-default is ==4.12.14-122.255.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996809" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996810" version="1" comment="kernel-default is &lt;4.12.14-122.255.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008768" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008700" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008701" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010059" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008770" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008771" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008772" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008702" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008773" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008774" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008775" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008776" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008777" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008778" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008779" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008780" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008781" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008782" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008783" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008784" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008785" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=18-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008786" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008787" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008788" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008789" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008790" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008791" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008792" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008793" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008794" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008961" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996811" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=19-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996812" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996813" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996814" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996815" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996816" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996817" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997085" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996818" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997086" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987644" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975402" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975404" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975406" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986281" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975408" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975409" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975410" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986731" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037981" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037982" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037983" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037984" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037985" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011973" version="1" comment="kernel-default is ==4.12.14-122.258.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037986" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014519" version="1" comment="kernel-default is ==4.12.14-122.261.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037987" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014521" version="1" comment="kernel-default is ==4.12.14-122.266.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037988" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019465" version="1" comment="kernel-default is ==4.12.14-122.269.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037989" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022330" version="1" comment="kernel-default is ==4.12.14-122.272.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037990" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022332" version="1" comment="kernel-default is &lt;4.12.14-122.272.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037991" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=19-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037992" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=18-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037993" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037994" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037995" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008967" version="1" comment="kernel-default is ==5.14.21-150400.24.161.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037996" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008969" version="1" comment="kernel-default is ==5.14.21-150400.24.164.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037997" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012372" version="1" comment="kernel-default is ==5.14.21-150400.24.167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037998" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014752" version="1" comment="kernel-default is ==5.14.21-150400.24.170.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037999" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019721" version="1" comment="kernel-default is ==5.14.21-150400.24.173.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038211" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023345" version="1" comment="kernel-default is ==5.14.21-150400.24.176.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038000" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023347" version="1" comment="kernel-default is &lt;5.14.21-150400.24.176.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025285" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=19-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025286" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=17-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025287" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=15-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025288" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025289" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=11-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025290" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008807" version="1" comment="kernel-default is ==5.3.18-150300.59.201.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025291" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=9-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008964" version="1" comment="kernel-default is ==5.3.18-150300.59.204.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025292" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=9-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012375" version="1" comment="kernel-default is ==5.3.18-150300.59.207.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025293" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=8-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012379" version="1" comment="kernel-default is ==5.3.18-150300.59.211.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025294" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=8-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019755" version="1" comment="kernel-default is ==5.3.18-150300.59.215.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025525" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025254" version="1" comment="kernel-default is ==5.3.18-150300.59.218.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025255" version="1" comment="kernel-livepatch-5_3_18-150300_59_218-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025256" version="1" comment="kernel-default is &lt;5.3.18-150300.59.218.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025295" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=18-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025296" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=14-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025297" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=13-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025298" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=11-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025299" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025300" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=10-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025301" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025302" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=7-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025303" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=7-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025526" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024667" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025304" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=18-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025305" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=17-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025306" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=16-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025307" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=15-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025527" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=10-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025308" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=10-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025309" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=9-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025310" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=9-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025311" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=9-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025312" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=8-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025313" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=7-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025314" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025257" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=3-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011979" version="1" comment="kernel-default is ==5.14.21-150500.55.100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025528" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=9-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011981" version="1" comment="kernel-default is ==5.14.21-150500.55.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025529" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=9-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011983" version="1" comment="kernel-default is ==5.14.21-150500.55.110.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025315" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=8-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011988" version="1" comment="kernel-default is ==5.14.21-150500.55.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025530" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=8-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014542" version="1" comment="kernel-default is ==5.14.21-150500.55.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025531" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=6-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023037" version="1" comment="kernel-default is ==5.14.21-150500.55.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025258" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=3-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025532" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=18-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025533" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=14-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025534" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=14-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025535" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=10-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025536" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=10-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035092" version="1" comment="kernel-64kb is &lt;6.12.0-160000.8.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035096" version="1" comment="kernel-default is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035097" version="1" comment="kernel-default-base is &lt;6.12.0-160000.8.1.160000.2.5 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035099" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036935" version="1" comment="kernel-default-livepatch is &lt;6.12.0-160000.8.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035108" version="1" comment="kernel-macros is &lt;6.12.0-160000.8.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035111" version="1" comment="kernel-rt is &lt;6.12.0-160000.8.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037015" version="1" comment="kernel-rt-livepatch is &lt;6.12.0-160000.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035116" version="1" comment="kernel-source is &lt;6.12.0-160000.8.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038212" version="1" comment="kernel-default is ==4.12.14-122.275.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038213" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038214" version="1" comment="kernel-default is &lt;4.12.14-122.275.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031207" version="1" comment="kernel-default is ==5.14.21-150400.24.179.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038215" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031209" version="1" comment="kernel-default is &lt;5.14.21-150400.24.179.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038216" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038001" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038217" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038218" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038219" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038220" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037072" version="1" comment="kernel-default is ==5.14.21-150500.55.124.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038221" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038002" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038509" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038222" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038223" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022248" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=18-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022275" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=17-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022276" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022277" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022278" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022279" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022280" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022281" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022282" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022283" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022611" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022331" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030679" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=18-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030649" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030680" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030681" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030682" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030683" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030684" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030685" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030686" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030650" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030687" version="1" comment="kernel-livepatch-5_3_18-150300_59_218-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031652" version="1" comment="kernel-default is ==5.3.18-150300.59.221.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031653" version="1" comment="kernel-livepatch-5_3_18-150300_59_221-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031654" version="1" comment="kernel-default is &lt;5.3.18-150300.59.221.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049711" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049712" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050984" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049713" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049764" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050306" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049765" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049766" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049767" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046222" version="1" comment="kernel-default is ==4.12.14-122.280.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049768" version="1" comment="kgraft-patch-4_12_14-122_280-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046224" version="1" comment="kernel-default is ==4.12.14-122.283.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049769" version="1" comment="kgraft-patch-4_12_14-122_283-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046236" version="1" comment="kernel-default is ==4.12.14-122.290.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049770" version="1" comment="kgraft-patch-4_12_14-122_290-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046238" version="1" comment="kernel-default is &lt;4.12.14-122.290.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050307" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=16-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049771" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=16-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049772" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=15-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049773" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=15-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050070" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050071" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050072" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050073" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050074" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050075" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046274" version="1" comment="kernel-default is ==5.14.21-150400.24.184.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050308" version="1" comment="kernel-livepatch-5_14_21-150400_24_184-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046276" version="1" comment="kernel-default is ==5.14.21-150400.24.187.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050309" version="1" comment="kernel-livepatch-5_14_21-150400_24_187-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046278" version="1" comment="kernel-default is &lt;5.14.21-150400.24.187.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050310" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=15-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050311" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050312" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050313" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050314" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050985" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050986" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046286" version="1" comment="kernel-default is ==5.14.21-150500.55.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050987" version="1" comment="kernel-livepatch-5_14_21-150500_55_127-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046288" version="1" comment="kernel-default is ==5.14.21-150500.55.130.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050988" version="1" comment="kernel-livepatch-5_14_21-150500_55_130-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046292" version="1" comment="kernel-default is ==5.14.21-150500.55.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050989" version="1" comment="kernel-livepatch-5_14_21-150500_55_133-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050315" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050316" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045279" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045280" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046215" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046216" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046217" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046218" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046219" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046220" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046221" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046223" version="1" comment="kgraft-patch-4_12_14-122_280-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046225" version="1" comment="kgraft-patch-4_12_14-122_283-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046226" version="1" comment="kernel-default is &lt;4.12.14-122.283.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046227" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046228" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046229" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046230" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046231" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046232" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046233" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046234" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046235" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046273" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046275" version="1" comment="kernel-livepatch-5_14_21-150400_24_184-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046277" version="1" comment="kernel-livepatch-5_14_21-150400_24_187-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046279" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046280" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046281" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046282" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046283" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046284" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046285" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046287" version="1" comment="kernel-livepatch-5_14_21-150500_55_127-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046289" version="1" comment="kernel-livepatch-5_14_21-150500_55_130-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046290" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046291" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046237" version="1" comment="kgraft-patch-4_12_14-122_290-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742267" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742712" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743622" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743623" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743624" version="1" comment="kernel-default is ==5.14.21-150400.24.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743625" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877718" version="1" comment="kernel-default is &lt;5.14.21-150400.24.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751177" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751178" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751179" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751180" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751181" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751182" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751183" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751184" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751185" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751186" version="1" comment="kernel-default is ==4.12.14-122.147.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751187" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751188" version="1" comment="kernel-default is &lt;4.12.14-122.147.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750757" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750758" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750759" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750760" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751189" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751190" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742263" version="1" comment="kernel-default is &lt;5.3.18-150200.24.139.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750762" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750763" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751191" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=17-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751192" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751193" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751194" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751195" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751196" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751197" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750764" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751198" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751199" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=12-150400.10.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751200" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751201" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751202" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751203" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751204" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751205" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752332" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=3-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877784" version="1" comment="kernel-rt is ==5.14.21-150400.15.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764659" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765065" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=14-150400.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764664" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764665" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764666" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=10-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764667" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764668" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764669" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764670" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751216" version="1" comment="kernel-default is ==5.14.21-150400.24.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764671" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755396" version="1" comment="kernel-default is ==5.14.21-150400.24.55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764672" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=3-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764674" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796020" version="1" comment="kernel-default is &lt;5.14.21-150400.24.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764675" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764676" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764677" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764678" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764679" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764680" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764681" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764682" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=7-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764683" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764684" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764685" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764686" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764687" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764688" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764689" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764690" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764691" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764692" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761482" version="1" comment="kernel-default is &lt;5.14.21-150400.24.46.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852715" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=9-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852366" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=9-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755385" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755386" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755223" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751223" version="1" comment="kernel-default is ==4.12.14-95.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755387" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755224" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755225" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755226" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755227" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755228" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755229" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755230" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755231" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751233" version="1" comment="kernel-default is ==4.12.14-150100.197.134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755232" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751235" version="1" comment="kernel-default is &lt;4.12.14-150100.197.134.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755233" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755234" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755235" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=4-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755236" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751236" version="1" comment="kernel-default is &lt;5.3.18-150200.24.142.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755237" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755238" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755388" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755389" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755239" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755240" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755241" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755242" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755243" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755244" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755245" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755390" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=13-150400.13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755391" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755392" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755248" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755393" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755394" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755249" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=5-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755395" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786219" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786220" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794740" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795130" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795131" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795992" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751227" version="1" comment="kernel-default is ==4.12.14-122.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786221" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764702" version="1" comment="kernel-default is ==4.12.14-122.153.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786222" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764728" version="1" comment="kernel-default is ==4.12.14-122.156.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786223" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795132" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786224" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776023" version="1" comment="kernel-default is &lt;4.12.14-122.162.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795133" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782315" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782316" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794741" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795134" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764712" version="1" comment="kernel-default is ==4.12.14-150100.197.137.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782317" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764731" version="1" comment="kernel-default is ==4.12.14-150100.197.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782318" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764734" version="1" comment="kernel-default is ==4.12.14-150100.197.145.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782319" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764736" version="1" comment="kernel-default is &lt;4.12.14-150100.197.145.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795742" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795743" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795744" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795745" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795746" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795747" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764715" version="1" comment="kernel-default is ==5.3.18-150200.24.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795748" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795749" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795750" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776030" version="1" comment="kernel-default is &lt;5.3.18-150200.24.154.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795751" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794742" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795752" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795753" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795824" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764718" version="1" comment="kernel-default is ==5.3.18-150300.59.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795993" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795825" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795994" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795135" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794743" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795136" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796654" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795995" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795996" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795997" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795998" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795999" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796000" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796001" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796002" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796003" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796004" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796005" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796006" version="1" comment="kernel-default is &lt;5.14.21-150400.24.66.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796660" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=3-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796007" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=3-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751207" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751209" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751211" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751213" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751215" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750644" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751217" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755122" version="1" comment="kernel-default is ==4.12.14-95.120.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755123" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755250" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751229" version="1" comment="kernel-default is &lt;4.12.14-122.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755251" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755642" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764693" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764694" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764695" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764696" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764697" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764698" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764699" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764700" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764701" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764703" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807351" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807696" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807697" version="1" comment="kernel-default is &lt;4.12.14-122.179.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764705" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764706" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764707" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764708" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764709" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764710" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764711" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764713" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807353" version="1" comment="kernel-default is ==4.12.14-150100.197.157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807354" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807355" version="1" comment="kernel-default is &lt;4.12.14-150100.197.157.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877719" version="1" comment="kernel-default is &lt;5.14.21-150400.24.55.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769736" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769737" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769987" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770216" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769988" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769989" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769738" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755124" version="1" comment="kernel-default is &lt;4.12.14-95.120.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770217" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770218" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770219" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769990" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769991" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769992" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770220" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770221" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769993" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764704" version="1" comment="kernel-default is &lt;4.12.14-122.153.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770222" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769994" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770223" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769995" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769996" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769997" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769998" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764714" version="1" comment="kernel-default is &lt;4.12.14-150100.197.137.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755397" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798679" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798650" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798651" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798680" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798681" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798652" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798653" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798682" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798654" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798655" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798683" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798685" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816438" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845681" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845683" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849120" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798903" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798687" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798904" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798905" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798906" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798907" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799060" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775802" version="1" comment="kernel-default is ==4.12.14-150100.197.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799061" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782321" version="1" comment="kernel-default is ==4.12.14-150100.197.151.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799062" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799063" version="1" comment="kernel-default is ==4.12.14-150100.197.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799064" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816087" version="1" comment="kernel-default is ==4.12.14-150100.197.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816088" version="1" comment="kernel-livepatch-4_12_14-150100_197_160-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845685" version="1" comment="kernel-default is ==4.12.14-150100.197.165.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845686" version="1" comment="kernel-livepatch-4_12_14-150100_197_165-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845687" version="1" comment="kernel-default is ==4.12.14-150100.197.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845688" version="1" comment="kernel-livepatch-4_12_14-150100_197_168-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845689" version="1" comment="kernel-default is &lt;4.12.14-150100.197.168.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799066" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798908" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799558" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799067" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799068" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799069" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799070" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799559" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799560" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799562" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804086" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804088" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816091" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845691" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845860" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849455" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799630" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799690" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799631" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799632" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799633" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799634" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799635" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799636" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799637" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799639" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804091" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804093" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816441" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845694" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845696" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849458" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799564" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799640" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799641" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798909" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799642" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799643" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799644" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799645" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799646" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799647" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799648" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799649" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799650" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799651" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798916" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=4-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799652" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=4-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764716" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764717" version="1" comment="kernel-default is &lt;5.3.18-150200.24.148.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764719" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764720" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764721" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764722" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764723" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764724" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764725" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764726" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764727" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764729" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764730" version="1" comment="kernel-default is &lt;4.12.14-122.156.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764732" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764733" version="1" comment="kernel-default is &lt;4.12.14-150100.197.142.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776019" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775786" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775787" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775788" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775789" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775790" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775791" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775792" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775793" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776020" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776022" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775794" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775795" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775796" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775797" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775798" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775799" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775800" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775801" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775803" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775804" version="1" comment="kernel-default is &lt;4.12.14-150100.197.148.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775805" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776024" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775806" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776025" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775807" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776026" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776027" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775808" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776029" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776031" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776032" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775809" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776033" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775810" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775811" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775812" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775814" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775815" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775816" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775817" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775818" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775823" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775824" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775825" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775826" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775827" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775828" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775829" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775830" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775831" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776228" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=2-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776035" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=2-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796009" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796011" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796013" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796014" version="1" comment="kernel-default is &lt;5.14.21-150400.24.74.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796016" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796018" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816442" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816443" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816444" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816093" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816094" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816445" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816095" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816096" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816097" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816446" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804089" version="1" comment="kernel-default is &lt;5.3.18-150200.24.166.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816447" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816448" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816449" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816450" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816451" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816098" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816099" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816100" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816101" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816102" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816452" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816453" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816454" version="1" comment="kernel-default is &lt;5.3.18-150300.59.138.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816104" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816456" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816457" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816458" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816114" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816459" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816460" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816115" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816116" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816461" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816462" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816117" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816463" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816118" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816465" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852611" version="1" comment="kernel-default is &lt;5.14.21-150400.24.92.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816119" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=6-150500.15.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816124" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=6-150500.15.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816466" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816467" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816468" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816470" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816125" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770231" version="1" comment="kernel-default is &lt;4.12.14-122.159.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764735" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764738" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764739" version="1" comment="kernel-default is &lt;5.3.18-150200.24.151.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764741" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764744" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796021" version="1" comment="kernel-default is &lt;5.14.21-150400.24.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742253" version="1" comment="kernel-default is &lt;4.12.14-95.114.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742260" version="1" comment="kernel-default is &lt;4.12.14-150100.197.131.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770224" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770225" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770226" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770253" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770227" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751218" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751219" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751220" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751221" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751222" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751224" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751225" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751226" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751228" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750765" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=13-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750766" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=10-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751230" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750767" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750768" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751231" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751232" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=3-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751234" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=2-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770228" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770230" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770001" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770002" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770003" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=5-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770232" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770233" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782320" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799653" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796022" version="1" comment="kernel-default is &lt;5.14.21-150400.24.69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799654" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770234" version="1" comment="kernel-default is ==4.12.14-95.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770235" version="1" comment="kgraft-patch-4_12_14-95_125-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770236" version="1" comment="kernel-default is &lt;4.12.14-95.125.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770005" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770237" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770238" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770239" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770240" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770241" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804094" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804095" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804096" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=10-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804097" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807356" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804098" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804099" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804100" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804101" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795756" version="1" comment="kernel-default is &lt;5.3.18-150200.24.157.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804102" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=12-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804103" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=10-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804104" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=10-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804105" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=9-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804106" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804107" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807357" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803408" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804108" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804109" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803252" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807336" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=13-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807698" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807358" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807359" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=10-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807699" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807700" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807360" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807701" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807702" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807703" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803099" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=5-150500.12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807704" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=5-150500.12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807705" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794745" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794746" version="1" comment="kernel-default is &lt;4.12.14-122.165.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782322" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782323" version="1" comment="kernel-default is &lt;4.12.14-150100.197.151.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795755" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775833" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776037" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799655" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799691" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849473" version="1" comment="kernel-default is &lt;5.14.21-150400.24.81.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798686" version="1" comment="kernel-default is &lt;4.12.14-122.173.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799065" version="1" comment="kernel-default is &lt;4.12.14-150100.197.154.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852098" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=8-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852367" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=7-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852368" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=6-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852369" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=5-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852099" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=8-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849459" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849122" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849123" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849124" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849125" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849126" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849127" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849128" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849129" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849130" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849131" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816439" version="1" comment="kernel-default is &lt;4.12.14-122.183.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849132" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849133" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849134" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849135" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849136" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849137" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849138" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849139" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849140" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849141" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816092" version="1" comment="kernel-default is &lt;5.3.18-150200.24.169.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849460" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849461" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849462" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849463" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849464" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849465" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849466" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849467" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849468" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849469" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849470" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845718" version="1" comment="kernel-default is &lt;5.3.18-150300.59.141.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849142" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849143" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849144" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849145" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849146" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849147" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849471" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849148" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849472" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849149" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=8-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849474" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=8-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849475" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849476" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849477" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804110" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807706" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807707" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807708" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807709" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799563" version="1" comment="kernel-default is &lt;5.3.18-150200.24.160.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799693" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799695" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854051" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854052" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854053" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854054" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854055" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854056" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854328" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804116" version="1" comment="kernel-default is &lt;5.3.18-150200.24.163.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854057" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854058" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854059" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854060" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854061" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854062" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854063" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816477" version="1" comment="kernel-default is &lt;5.3.18-150300.59.133.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854707" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854708" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854836" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854709" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854710" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854711" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854712" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854837" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849151" version="1" comment="kernel-default is &lt;5.14.21-150400.24.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853704" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=10-150500.9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854064" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=10-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854065" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854066" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854067" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854068" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958738" version="1" comment="docker-compose is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056312" version="1" comment="libz1 is &lt;1.2.13-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056313" version="1" comment="zlib-devel is &lt;1.2.13-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816127" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816128" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816471" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816472" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816473" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816129" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816130" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816474" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816131" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816132" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816133" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807352" version="1" comment="kernel-default is &lt;4.12.14-122.176.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816475" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816476" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816134" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816135" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816136" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816137" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816138" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816139" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816140" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803255" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807710" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807711" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807712" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807713" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807714" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807715" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807716" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803410" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807717" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804111" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807361" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=12-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804112" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=12-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807718" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=10-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807362" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=9-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804113" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807363" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807364" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807365" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807719" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804114" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804115" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807721" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807723" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852602" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852603" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852604" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852605" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852606" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852607" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852608" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852609" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852610" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849150" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849478" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853304" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852100" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852101" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852370" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852371" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852372" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852102" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852373" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852374" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852103" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852375" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845730" version="1" comment="kernel-default is &lt;4.12.14-122.186.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852376" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852377" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852378" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852379" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852380" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852104" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=7-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852105" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852381" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852106" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852382" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845692" version="1" comment="kernel-default is &lt;5.3.18-150200.24.172.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852107" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852383" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852384" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852108" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852385" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852386" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=7-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852387" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852388" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852109" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852389" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845739" version="1" comment="kernel-default is &lt;5.3.18-150300.59.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852612" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852613" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852390" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=4-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852391" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=4-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845575" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845862" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845863" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845864" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845697" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845698" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845865" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845699" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845700" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845866" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845867" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845701" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845585" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=7-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845868" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=7-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845869" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845702" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845703" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845870" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845871" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849152" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849153" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845684" version="1" comment="kernel-default is &lt;4.12.14-122.189.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849154" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849479" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845861" version="1" comment="kernel-default is &lt;5.3.18-150200.24.175.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849480" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849481" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849482" version="1" comment="kernel-default is &lt;5.3.18-150300.59.147.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849155" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849157" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849158" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849159" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849483" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849162" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849484" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849164" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854069" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854070" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854071" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854072" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854073" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854074" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854075" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854076" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854077" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854078" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854079" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854080" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854081" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849121" version="1" comment="kernel-default is &lt;4.12.14-122.194.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854082" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854083" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854084" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854085" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854086" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849456" version="1" comment="kernel-default is &lt;5.3.18-150200.24.178.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854087" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854088" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854089" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854090" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854091" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852396" version="1" comment="kernel-default is &lt;5.3.18-150300.59.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854713" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854714" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854715" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854838" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854333" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854092" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854093" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854094" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868519" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868520" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868521" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868522" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868523" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868932" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868933" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868934" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868935" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948658" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948659" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948660" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948661" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948662" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878542" version="1" comment="kernel-default is &lt;4.12.14-122.219.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878065" version="1" comment="kernel-default is &lt;5.3.18-150200.24.194.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878068" version="1" comment="kernel-default is &lt;5.3.18-150300.59.164.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878777" version="1" comment="kernel-default is ==6.4.0-150600.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950845" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=6-150600.4.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944115" version="1" comment="kernel-default is ==6.4.0-150600.23.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961319" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944117" version="1" comment="kernel-default is ==6.4.0-150600.23.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961320" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950848" version="1" comment="kernel-default is ==6.4.0-150600.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960539" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=3-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944934" version="1" comment="kernel-default is ==6.4.0-150600.23.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961321" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881324" version="1" comment="kernel-rt is ==6.4.0-150600.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948664" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=5-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881326" version="1" comment="kernel-default is &lt;6.4.0-150600.8.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944114" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=4-150600.1.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881325" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=2-150600.3.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944935" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944936" version="1" comment="kernel-default is &lt;6.4.0-150600.23.7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977138" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976832" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977128" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976885" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043856" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043647" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043648" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043857" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043858" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043859" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043860" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043861" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043862" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043863" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=19-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044016" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043864" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043865" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043866" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043867" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043868" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043869" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044017" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044134" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043978" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043979" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043980" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043981" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043982" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043983" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043984" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=18-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043985" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043986" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037053" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=19-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037054" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=18-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037055" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037056" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037057" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037058" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037059" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037060" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037061" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037062" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037063" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037064" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037065" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037066" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037067" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037068" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037069" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037070" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037071" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037073" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037074" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037075" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037076" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037077" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030688" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=18-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030689" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030690" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030740" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031201" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030741" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031202" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031203" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031204" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031205" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031655" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031206" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031208" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968302" version="1" comment="kernel-default is ==6.4.0-150600.23.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039018" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968304" version="1" comment="kernel-default is ==6.4.0-150600.23.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039019" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986736" version="1" comment="kernel-default is ==6.4.0-150600.23.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038510" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986738" version="1" comment="kernel-default is ==6.4.0-150600.23.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039020" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010060" version="1" comment="kernel-default is ==6.4.0-150600.23.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039021" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012361" version="1" comment="kernel-default is ==6.4.0-150600.23.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039022" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012363" version="1" comment="kernel-default is ==6.4.0-150600.23.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039023" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014544" version="1" comment="kernel-default is ==6.4.0-150600.23.60.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039024" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023342" version="1" comment="kernel-default is ==6.4.0-150600.23.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038224" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023348" version="1" comment="kernel-default is ==6.4.0-150600.23.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038225" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038226" version="1" comment="kernel-default is ==6.4.0-150600.23.73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038227" version="1" comment="kernel-livepatch-6_4_0-150600_23_73-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038228" version="1" comment="kernel-default is &lt;6.4.0-150600.23.73.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014264" version="1" comment="kernel-rt is ==6.4.0-150700.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037826" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=9-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014746" version="1" comment="kernel-default is ==6.4.0-150700.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039025" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=9-150700.3.24.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023034" version="1" comment="kernel-default is ==6.4.0-150700.53.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038229" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023039" version="1" comment="kernel-default is ==6.4.0-150700.53.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038230" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038511" version="1" comment="kernel-default is ==6.4.0-150700.53.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038512" version="1" comment="kernel-livepatch-6_4_0-150700_53_19-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014749" version="1" comment="kernel-default is ==6.4.0-150700.53.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039026" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=9-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014757" version="1" comment="kernel-default is ==6.4.0-150700.53.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039027" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=9-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014759" version="1" comment="kernel-default is &lt;6.4.0-150700.53.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056353" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053077" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056286" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056287" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056288" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056354" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056355" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056356" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056357" version="1" comment="kgraft-patch-4_12_14-122_280-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056358" version="1" comment="kgraft-patch-4_12_14-122_283-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056359" version="1" comment="kgraft-patch-4_12_14-122_290-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050317" version="1" comment="kernel-default is ==4.12.14-122.293.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056360" version="1" comment="kgraft-patch-4_12_14-122_293-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050319" version="1" comment="kernel-default is &lt;4.12.14-122.293.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046293" version="1" comment="kernel-livepatch-5_14_21-150500_55_133-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858925" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858926" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858856" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858857" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855859" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855684" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855685" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855686" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859175" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859176" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859177" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859178" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859626" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859179" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858927" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858867" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859627" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859957" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859374" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859375" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859376" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859377" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859958" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859959" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859628" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859629" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859960" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859630" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859631" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855860" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855687" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855861" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856129" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855688" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855569" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=11-150500.12.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859961" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=11-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855689" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855862" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855690" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855863" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855691" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855692" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845872" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845704" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845705" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845706" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845707" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845708" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845709" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845710" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845711" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845873" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845874" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845875" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845876" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845712" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845713" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845714" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845877" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845878" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845715" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845716" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845717" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846010" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845880" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852392" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852393" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854325" version="1" comment="kernel-default is &lt;5.3.18-150200.24.183.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852394" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852395" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854336" version="1" comment="kernel-default is &lt;5.3.18-150300.59.153.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868524" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868936" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845720" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845881" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845721" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845722" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845723" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845724" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845725" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845726" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845727" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845728" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845729" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845882" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845731" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845732" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845733" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845734" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845735" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845736" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845737" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845883" version="1" comment="kernel-livepatch-4_12_14-150100_197_160-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845738" version="1" comment="kernel-default is &lt;4.12.14-150100.197.165.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846012" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845885" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859180" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858928" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859632" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859378" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858858" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=12-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855693" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855864" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855694" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855695" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855865" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855696" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041352" version="1" comment="cloud-init is &lt;25.1.3-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041353" version="1" comment="cloud-init-config-suse is &lt;25.1.3-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750396" version="1" comment="cockpit is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750397" version="1" comment="cockpit-bridge is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029139" version="1" comment="cockpit-firewalld is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029140" version="1" comment="cockpit-kdump is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750404" version="1" comment="cockpit-networkmanager is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750405" version="1" comment="cockpit-selinux is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750406" version="1" comment="cockpit-storaged is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750399" version="1" comment="cockpit-system is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750400" version="1" comment="cockpit-ws is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029142" version="1" comment="cockpit-ws-selinux is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750402" version="1" comment="cockpit-machines is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750401" version="1" comment="cockpit-podman is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750403" version="1" comment="cockpit-tukit is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050018" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.60.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050019" version="1" comment="librsvg-2-2 is &lt;2.60.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855783" version="1" comment="netavark is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029144" version="1" comment="python313-maturin is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030535" version="1" comment="libtiff6 is &lt;4.7.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047568" version="1" comment="shim is &lt;16.1-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872665" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872666" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872667" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872668" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872669" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872670" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872671" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872672" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872673" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871638" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=15-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873482" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=14-150500.12.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873483" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873484" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873485" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873922" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872674" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872675" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873486" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873487" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050021" version="1" comment="ucode-intel is &lt;20260210-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855866" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019451" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019452" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019453" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019454" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019702" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019455" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019456" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019457" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019458" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019703" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019459" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012374" version="1" comment="kernel-default is &lt;5.14.21-150400.24.167.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012356" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011944" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011824" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=19-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868525" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868528" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868529" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868937" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868938" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868939" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878779" version="1" comment="kernel-default is &lt;6.4.0-150600.21.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961322" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=9-150600.4.19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878547" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878548" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878549" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878550" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878551" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878552" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878553" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878554" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877990" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878069" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877991" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877992" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877993" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877994" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877995" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878070" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878071" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878072" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878073" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878074" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878075" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878076" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878077" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878212" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878555" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878556" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878557" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878558" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878559" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878560" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878561" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878562" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878563" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878564" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878565" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878566" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878567" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878568" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878569" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878570" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045695" version="1" comment="containerized-data-importer-manifests is &lt;1.64.0-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965821" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966032" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966033" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966284" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966285" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966286" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966034" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966035" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966036" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966037" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948623" version="1" comment="kernel-default is &lt;5.14.21-150400.24.122.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966038" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966039" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965822" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966040" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=11-150600.4.25.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965286" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=10-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943402" version="1" comment="kernel-default is &lt;5.14.21-150500.55.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943025" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=3-150600.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947519" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947520" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947521" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947522" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947523" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947524" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947525" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947526" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947527" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947528" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947409" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=4-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948666" version="1" comment="kernel-default is &lt;5.14.21-150400.24.119.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957145" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956863" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956201" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956556" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956558" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=7-150600.4.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955679" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=6-150600.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957241" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=16-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956864" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956865" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957242" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956202" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956203" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956866" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956867" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957146" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957243" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957244" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947531" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947532" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947410" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947533" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947534" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947535" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961323" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961324" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961326" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961302" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961528" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=8-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014214" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=20-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966041" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966042" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960119" version="1" comment="kernel-default is &lt;5.14.21-150400.24.125.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966043" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965823" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965824" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966044" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966045" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014742" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014507" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014671" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014743" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014744" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014745" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014260" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014672" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014508" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014261" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014254" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012377" version="1" comment="kernel-default is &lt;5.3.18-150300.59.207.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014509" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014255" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014262" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014510" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014511" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014263" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014512" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014513" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014514" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014256" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014515" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014516" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014517" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996819" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=19-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996820" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996821" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987645" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=18-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997087" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=18-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987646" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=17-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987906" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=18-150600.4.46.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996822" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987676" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987573" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=17-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956561" version="1" comment="kernel-default is &lt;4.12.14-122.225.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974053" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974054" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974055" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974056" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974057" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974058" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974059" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974060" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974061" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974062" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974063" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974064" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970646" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=13-150600.4.31.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970647" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970648" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970649" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970351" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=12-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011945" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011946" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975054" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975055" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975056" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975031" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975057" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975058" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975059" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975060" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975061" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975062" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975063" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=14-150600.4.34.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975064" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975065" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975032" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=13-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968281" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=12-150600.4.28.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968282" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968283" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968284" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968285" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=11-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008795" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=18-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008796" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=19-150600.4.49.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008797" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008798" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008703" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=18-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742210" version="1" comment="afterburn is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742211" version="1" comment="afterburn-dracut is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956868" version="1" comment="kernel-default is ==5.3.18-150200.24.200.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956869" version="1" comment="kernel-livepatch-5_3_18-150200_24_200-default is &gt;=2-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956870" version="1" comment="kernel-default is &lt;5.3.18-150200.24.200.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982353" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982354" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982355" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982627" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982927" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983055" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982628" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982629" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982928" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982929" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=18-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983056" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=17-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983057" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=15-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982930" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982931" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982932" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=18-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982933" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982934" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982935" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=15-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983058" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=10-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982936" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=16-150600.4.40.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982937" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=14-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982938" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=14-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982939" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=14-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982451" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=15-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963364" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963365" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963366" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963367" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963368" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963369" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963370" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963371" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963297" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960543" version="1" comment="kernel-default is &lt;4.12.14-122.234.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963661" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963373" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963374" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963662" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963663" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963375" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=10-150600.4.22.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963376" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963377" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963378" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960548" version="1" comment="kernel-default is ==6.4.0-150600.23.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963379" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963380" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963163" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=9-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045701" version="1" comment="kubevirt-manifests is &lt;1.7.0-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045713" version="1" comment="kubevirt-virtctl is &lt;1.7.0-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334435" version="1" comment="docker is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953331" version="1" comment="docker-buildx is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968286" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968287" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968289" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018025" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=20-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017977" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018026" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=15-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017332" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=21-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986628" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=17-150600.4.43.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986733" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=15-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986629" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=15-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986630" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=11-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986631" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=10-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986632" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=15-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986107" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=16-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019242" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019406" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019407" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019704" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019705" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987908" version="1" comment="kernel-default is &lt;6.4.0-150600.23.22.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022284" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=19-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022309" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=18-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022333" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022612" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022801" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022802" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023023" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=19-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023024" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996825" version="1" comment="kernel-default is &lt;6.4.0-150600.23.25.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982356" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982358" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982940" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982941" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982942" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960546" version="1" comment="kernel-default is &lt;5.3.18-150300.59.182.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982943" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982944" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982945" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960754" version="1" comment="kernel-default is &lt;5.14.21-150400.24.141.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982946" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=8-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982947" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=8-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982948" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=10-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982949" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=9-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987647" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=12-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997139" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=10-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987648" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=10-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997088" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=16-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987907" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996823" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987649" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996824" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987650" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997089" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020202" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=17-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020204" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020375" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=18-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020741" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020376" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020673" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020674" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020507" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020675" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020676" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020702" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020703" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977139" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977140" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977280" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976833" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976886" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977129" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977141" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977122" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976887" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976888" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976889" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977130" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977281" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977282" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977283" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977284" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977285" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977286" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977287" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008963" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008799" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008800" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008801" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008802" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008803" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960542" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=2-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960545" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=2-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960753" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=2-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960547" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=8-150600.4.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960549" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=2-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960122" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=7-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968290" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968291" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968292" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968293" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968294" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334118" version="1" comment="git is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336075" version="1" comment="git-core is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667224" version="1" comment="perl-Git is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037153" version="1" comment="avahi is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037160" version="1" comment="libavahi-client3 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037161" version="1" comment="libavahi-common3 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037162" version="1" comment="libavahi-core7 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977288" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=15-150600.4.37.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977289" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977290" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977291" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977292" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977293" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976432" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=14-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965287" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965288" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965289" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965290" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966046" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966047" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966287" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965825" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966048" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966289" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966291" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966292" version="1" comment="kernel-default is &lt;5.3.18-150300.59.188.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966049" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966050" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966051" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966052" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966294" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966296" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966297" version="1" comment="kernel-default is &lt;5.14.21-150400.24.147.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965826" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966053" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966054" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966055" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966056" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966057" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011947" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011948" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011949" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011950" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011889" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011951" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011952" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011953" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011890" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011954" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011955" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012373" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011956" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011957" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011958" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012357" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987653" version="1" comment="kernel-default is &lt;5.14.21-150500.55.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011959" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011960" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012358" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030691" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=19-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030651" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976561" version="1" comment="kernel-default is &lt;4.12.14-122.237.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031210" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031656" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031468" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031657" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031469" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031470" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031471" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031472" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020709" version="1" comment="kernel-default is &lt;6.4.0-150600.23.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982951" version="1" comment="kernel-default is &lt;5.3.18-150300.59.185.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977143" version="1" comment="kernel-default is &lt;5.14.21-150400.24.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008804" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008805" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982452" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982950" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982630" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012381" version="1" comment="kernel-default is &lt;5.3.18-150300.59.211.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014754" version="1" comment="kernel-default is &lt;5.14.21-150400.24.170.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025110" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=19-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024668" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=15-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024669" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=15-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019716" version="1" comment="kernel-default is &lt;6.4.0-150600.23.33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025436" version="1" comment="kernel-64kb is &lt;6.12.0-160000.6.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025440" version="1" comment="kernel-default is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031628" version="1" comment="kernel-default-base is &lt;6.12.0-160000.6.1.160000.2.4 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025442" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025850" version="1" comment="kernel-default-livepatch is &lt;6.12.0-160000.6.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040506" version="1" comment="kernel-livepatch-6_12_0-160000_5-default is &lt;5-160000.4.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040513" version="1" comment="kernel-livepatch-6_12_0-160000_5-rt is &lt;4-160000.3.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025451" version="1" comment="kernel-macros is &lt;6.12.0-160000.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025454" version="1" comment="kernel-rt is &lt;6.12.0-160000.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025851" version="1" comment="kernel-rt-livepatch is &lt;6.12.0-160000.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025459" version="1" comment="kernel-source is &lt;6.12.0-160000.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008806" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968301" version="1" comment="kernel-default is &lt;5.14.21-150500.55.91.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020205" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020704" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020308" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020309" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020206" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020310" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011975" version="1" comment="kernel-default is &lt;4.12.14-122.258.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020377" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020508" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020509" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020510" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020511" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020378" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008966" version="1" comment="kernel-default is &lt;5.3.18-150300.59.204.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020512" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020513" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020514" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020515" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020705" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020742" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020677" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008971" version="1" comment="kernel-default is &lt;5.14.21-150400.24.164.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020706" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020707" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020678" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020679" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020680" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020681" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020708" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045754" version="1" comment="kernel-64kb is &lt;6.12.0-160000.26.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045763" version="1" comment="kernel-default is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045764" version="1" comment="kernel-default-base is &lt;6.12.0-160000.26.1.160000.2.7 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045766" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047381" version="1" comment="kernel-default-livepatch is &lt;6.12.0-160000.26.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045775" version="1" comment="kernel-macros is &lt;6.12.0-160000.26.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045778" version="1" comment="kernel-rt is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047432" version="1" comment="kernel-rt-livepatch is &lt;6.12.0-160000.26.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045783" version="1" comment="kernel-source is &lt;6.12.0-160000.26.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334864" version="1" comment="libopenssl-devel is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333942" version="1" comment="openssl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008808" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008965" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008968" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008970" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997090" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=7-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975407" version="1" comment="kernel-default is &lt;4.12.14-122.244.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975033" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975411" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975412" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975413" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975414" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975415" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975066" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975416" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975417" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975418" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975419" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975067" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975068" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975069" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975070" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975071" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987651" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997091" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987652" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997092" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=6-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996826" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968295" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968296" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968298" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968300" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968303" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968305" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976552" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976553" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976554" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976555" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976556" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976558" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976559" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976560" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977294" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976834" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977142" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977131" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977295" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977296" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977297" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977298" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011961" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011962" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011963" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011826" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011964" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011965" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011827" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011966" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012359" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011891" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011967" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011968" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011969" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034125" version="1" comment="grub2 is &lt;2.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034126" version="1" comment="grub2-arm64-efi is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034131" version="1" comment="grub2-common is &lt;2.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034132" version="1" comment="grub2-i386-pc is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034135" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034138" version="1" comment="grub2-s390x-emu is &lt;2.12-160000.3.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034141" version="1" comment="grub2-snapper-plugin is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034143" version="1" comment="grub2-x86_64-efi is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034147" version="1" comment="grub2-x86_64-xen is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008810" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970650" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970651" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970652" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970653" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986634" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986635" version="1" comment="kernel-default is &lt;5.14.21-150400.24.153.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986284" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=2-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986734" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=6-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986735" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=6-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986737" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=2-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986739" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=2-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019723" version="1" comment="kernel-default is &lt;5.14.21-150400.24.173.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855782" version="1" comment="aardvark-dns is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009337725" version="1" comment="gdk-pixbuf-loader-rsvg is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009337726" version="1" comment="librsvg-2-2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016082" version="1" comment="nm-configurator is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029188" version="1" comment="python313-cryptography is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029192" version="1" comment="python313-rpds-py is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855784" version="1" comment="libekmfweb1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855803" version="1" comment="libkmipclient1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855787" version="1" comment="s390-tools is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859140" version="1" comment="s390-tools-genprotimg-data is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855810" version="1" comment="sevctl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010820" version="1" comment="thin-provisioning-tools is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010821" version="1" comment="zram-generator is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041425" version="1" comment="glibc is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041426" version="1" comment="glibc-devel is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041667" version="1" comment="glibc-gconv-modules-extra is &lt;2.40-160000.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041434" version="1" comment="glibc-locale is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041435" version="1" comment="glibc-locale-base is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033339" version="1" comment="binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033369" version="1" comment="libctf-nobfd0 is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033370" version="1" comment="libctf0 is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031702" version="1" comment="curl is &lt;8.14.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031707" version="1" comment="libcurl4 is &lt;8.14.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030512" version="1" comment="libldb2 is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030519" version="1" comment="samba-client-libs is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047326" version="1" comment="libexslt0 is &lt;1.1.43-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047327" version="1" comment="libxml2-2 is &lt;2.13.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047330" version="1" comment="libxml2-tools is &lt;2.13.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047333" version="1" comment="libxslt1 is &lt;1.1.43-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047334" version="1" comment="python313-libxml2 is &lt;2.13.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041474" version="1" comment="libsoup-3_0-0 is &lt;3.6.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041595" version="1" comment="libopenssl-3-devel is &lt;3.5.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041596" version="1" comment="libopenssl-3-fips-provider is &lt;3.5.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041598" version="1" comment="libopenssl3 is &lt;3.5.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041600" version="1" comment="openssl-3 is &lt;3.5.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047375" version="1" comment="openssl-3-livepatches is &lt;0.3-160000.1.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037726" version="1" comment="haproxy is &lt;3.2.0+git0.e134140d2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034877" version="1" comment="qemu is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034878" version="1" comment="qemu-SLOF is &lt;10.0.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034879" version="1" comment="qemu-arm is &lt;10.0.7-160000.1.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034880" version="1" comment="qemu-audio-spice is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034881" version="1" comment="qemu-block-iscsi is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034882" version="1" comment="qemu-block-ssh is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034883" version="1" comment="qemu-chardev-spice is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034884" version="1" comment="qemu-guest-agent is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034885" version="1" comment="qemu-hw-display-qxl is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034886" version="1" comment="qemu-hw-display-virtio-gpu is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034887" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034888" version="1" comment="qemu-hw-display-virtio-vga is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034889" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;10.0.7-160000.1.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034890" version="1" comment="qemu-hw-usb-host is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034891" version="1" comment="qemu-hw-usb-redirect is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034892" version="1" comment="qemu-img is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034893" version="1" comment="qemu-ipxe is &lt;10.0.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034894" version="1" comment="qemu-ksm is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034895" version="1" comment="qemu-lang is &lt;10.0.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034896" version="1" comment="qemu-ppc is &lt;10.0.7-160000.1.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034897" version="1" comment="qemu-pr-helper is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034898" version="1" comment="qemu-s390x is &lt;10.0.7-160000.1.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034899" version="1" comment="qemu-seabios is &lt;10.0.71.16.3_3_g3d33c746-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034900" version="1" comment="qemu-tools is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034901" version="1" comment="qemu-ui-opengl is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034902" version="1" comment="qemu-ui-spice-core is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034903" version="1" comment="qemu-vgabios is &lt;10.0.71.16.3_3_g3d33c746-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034904" version="1" comment="qemu-vmsr-helper is &lt;10.0.7-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034905" version="1" comment="qemu-x86 is &lt;10.0.7-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041456" version="1" comment="libunbound8 is &lt;1.24.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041459" version="1" comment="unbound-anchor is &lt;1.24.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044584" version="1" comment="libpython3_13-1_0 is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044587" version="1" comment="python313 is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044588" version="1" comment="python313-base is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044590" version="1" comment="python313-curses is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035633" version="1" comment="libsss_certmap0 is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035635" version="1" comment="libsss_idmap0 is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035641" version="1" comment="python3-sssd-config is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035642" version="1" comment="sssd is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035643" version="1" comment="sssd-ad is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035645" version="1" comment="sssd-dbus is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035648" version="1" comment="sssd-krb5 is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035649" version="1" comment="sssd-krb5-common is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035650" version="1" comment="sssd-ldap is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035652" version="1" comment="sssd-tools is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030538" version="1" comment="libexslt0 is &lt;1.1.43-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030541" version="1" comment="libxslt1 is &lt;1.1.43-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039640" version="1" comment="libpcap1 is &lt;1.10.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039656" version="1" comment="libpython3_13-1_0 is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039659" version="1" comment="python313 is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039660" version="1" comment="python313-base is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039662" version="1" comment="python313-curses is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050015" version="1" comment="libsoup-3_0-0 is &lt;3.6.6-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032044" version="1" comment="libvirt-client is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032045" version="1" comment="libvirt-client-qemu is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032047" version="1" comment="libvirt-daemon-common is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032048" version="1" comment="libvirt-daemon-config-network is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032049" version="1" comment="libvirt-daemon-config-nwfilter is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032050" version="1" comment="libvirt-daemon-driver-network is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032051" version="1" comment="libvirt-daemon-driver-nodedev is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032052" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032053" version="1" comment="libvirt-daemon-driver-qemu is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032054" version="1" comment="libvirt-daemon-driver-secret is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032055" version="1" comment="libvirt-daemon-driver-storage is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032056" version="1" comment="libvirt-daemon-driver-storage-core is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032057" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032058" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032059" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032060" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032061" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032062" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032063" version="1" comment="libvirt-daemon-hooks is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032064" version="1" comment="libvirt-daemon-lock is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032065" version="1" comment="libvirt-daemon-log is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032066" version="1" comment="libvirt-daemon-plugin-lockd is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032067" version="1" comment="libvirt-daemon-proxy is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032068" version="1" comment="libvirt-daemon-qemu is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032071" version="1" comment="libvirt-libs is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032072" version="1" comment="libvirt-nss is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333977" version="1" comment="curl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335173" version="1" comment="libcurl4 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053369" version="1" comment="libtasn1-6 is &lt;4.21.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044370" version="1" comment="cockpit is &lt;354-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044371" version="1" comment="cockpit-bridge is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044374" version="1" comment="cockpit-firewalld is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044375" version="1" comment="cockpit-kdump is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044376" version="1" comment="cockpit-machines is &lt;346-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044377" version="1" comment="cockpit-networkmanager is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047931" version="1" comment="cockpit-podman is &lt;117-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044577" version="1" comment="cockpit-repos is &lt;4.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044379" version="1" comment="cockpit-selinux is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044380" version="1" comment="cockpit-storaged is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042306" version="1" comment="cockpit-subscriptions is &lt;12.1-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044381" version="1" comment="cockpit-system is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044382" version="1" comment="cockpit-ws is &lt;354-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044383" version="1" comment="cockpit-ws-selinux is &lt;354-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037475" version="1" comment="gio-branding-SLE is &lt;16-160000.2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037198" version="1" comment="glib2-tools is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037199" version="1" comment="libgio-2_0-0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037200" version="1" comment="libgirepository-2_0-0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037201" version="1" comment="libglib-2_0-0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037202" version="1" comment="libgmodule-2_0-0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037203" version="1" comment="libgobject-2_0-0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037206" version="1" comment="typelib-1_0-GLib-2_0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037208" version="1" comment="typelib-1_0-GModule-2_0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037209" version="1" comment="typelib-1_0-GObject-2_0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037210" version="1" comment="typelib-1_0-Gio-2_0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037720" version="1" comment="curl is &lt;8.14.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037725" version="1" comment="libcurl4 is &lt;8.14.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056314" version="1" comment="lastlog2 is &lt;2.41.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056315" version="1" comment="libblkid1 is &lt;2.41.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056316" version="1" comment="libfdisk1 is &lt;2.41.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056317" version="1" comment="liblastlog2-2 is &lt;2.41.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056318" version="1" comment="libmount1 is &lt;2.41.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056319" version="1" comment="libsmartcols1 is &lt;2.41.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056320" version="1" comment="libuuid1 is &lt;2.41.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056321" version="1" comment="util-linux is &lt;2.41.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056322" version="1" comment="util-linux-systemd is &lt;2.41.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335952" version="1" comment="libssh2-1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052615" version="1" comment="gnutls is &lt;3.8.10-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052618" version="1" comment="libgnutls30 is &lt;3.8.10-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048658" version="1" comment="qemu is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048659" version="1" comment="qemu-SLOF is &lt;10.0.8-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049216" version="1" comment="qemu-arm is &lt;10.0.8-160000.1.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048668" version="1" comment="qemu-audio-spice is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048671" version="1" comment="qemu-block-iscsi is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048674" version="1" comment="qemu-block-ssh is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048676" version="1" comment="qemu-chardev-spice is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048679" version="1" comment="qemu-guest-agent is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048681" version="1" comment="qemu-hw-display-qxl is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048682" version="1" comment="qemu-hw-display-virtio-gpu is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048683" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048684" version="1" comment="qemu-hw-display-virtio-vga is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049217" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;10.0.8-160000.1.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048686" version="1" comment="qemu-hw-usb-host is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048687" version="1" comment="qemu-hw-usb-redirect is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048689" version="1" comment="qemu-img is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048690" version="1" comment="qemu-ipxe is &lt;10.0.8-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048692" version="1" comment="qemu-ksm is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048693" version="1" comment="qemu-lang is &lt;10.0.8-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049218" version="1" comment="qemu-ppc is &lt;10.0.8-160000.1.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048697" version="1" comment="qemu-pr-helper is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049219" version="1" comment="qemu-s390x is &lt;10.0.8-160000.1.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048699" version="1" comment="qemu-seabios is &lt;10.0.81.16.3_3_g3d33c746-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048702" version="1" comment="qemu-tools is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048706" version="1" comment="qemu-ui-opengl is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048708" version="1" comment="qemu-ui-spice-core is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048709" version="1" comment="qemu-vgabios is &lt;10.0.81.16.3_3_g3d33c746-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048711" version="1" comment="qemu-vmsr-helper is &lt;10.0.8-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049220" version="1" comment="qemu-x86 is &lt;10.0.8-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037683" version="1" comment="glibc-livepatches is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037673" version="1" comment="linux-glibc-devel is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050020" version="1" comment="libsodium26 is &lt;1.0.20-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941029" version="1" comment="openssl-3-livepatches is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018027" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017978" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017979" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018028" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018016" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=3-150700.3.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014748" version="1" comment="kernel-default is &lt;6.4.0-150700.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020710" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020711" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020712" version="1" comment="kernel-default is &lt;6.4.0-150600.23.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017864" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017865" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017866" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017867" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019706" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011970" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011971" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011828" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011972" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011974" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011976" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011977" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011978" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011829" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012376" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011980" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011982" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011984" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011985" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011986" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011987" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012360" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012378" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012362" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014265" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=2-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014747" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=2-150700.3.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050318" version="1" comment="kgraft-patch-4_12_14-122_293-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050990" version="1" comment="kernel-default is ==5.14.21-150500.55.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050991" version="1" comment="kernel-livepatch-5_14_21-150500_55_136-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019707" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019708" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019709" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019710" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019711" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019712" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019713" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019714" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019744" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019745" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019715" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008704" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008811" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008812" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008813" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008809" version="1" comment="kernel-default is &lt;5.3.18-150300.59.201.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020743" version="1" comment="kernel-default is &lt;5.14.21-150400.24.161.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020713" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020714" version="1" comment="kernel-default is &lt;6.4.0-150600.23.42.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031740" version="1" comment="kernel-64kb is &lt;6.12.0-160000.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031744" version="1" comment="kernel-default is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031746" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032145" version="1" comment="kernel-default-livepatch is &lt;6.12.0-160000.7.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031755" version="1" comment="kernel-macros is &lt;6.12.0-160000.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031758" version="1" comment="kernel-rt is &lt;6.12.0-160000.7.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032146" version="1" comment="kernel-rt-livepatch is &lt;6.12.0-160000.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031763" version="1" comment="kernel-source is &lt;6.12.0-160000.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014541" version="1" comment="kernel-default is &lt;4.12.14-122.261.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022285" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022334" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022310" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022311" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022286" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022287" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022288" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022289" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022312" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022290" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019757" version="1" comment="kernel-default is &lt;5.3.18-150300.59.215.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022613" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022335" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022614" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022803" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022336" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022804" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022805" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022615" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022806" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022616" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022807" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022808" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022809" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022810" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023025" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022811" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022812" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022813" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022814" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023026" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023027" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023028" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023339" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023029" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=6-150700.3.15.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017412" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017413" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017676" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017677" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017980" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020715" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=5-150700.3.12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010061" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047314" version="1" comment="podman is &lt;5.4.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047315" version="1" comment="podman-docker is &lt;5.4.2-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047316" version="1" comment="podman-remote is &lt;5.4.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047317" version="1" comment="podmansh is &lt;5.4.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041418" version="1" comment="elemental-register is &lt;1.8.1-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041419" version="1" comment="elemental-support is &lt;1.8.1-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041666" version="1" comment="elemental-toolkit is &lt;2.3.2-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334349" version="1" comment="cifs-utils is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035147" version="1" comment="wb-cifs-idmap-plugin is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031473" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031474" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031475" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031476" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019719" version="1" comment="kernel-default is &lt;6.4.0-150600.23.47.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030638" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=8-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031906" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=8-150700.3.21.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041563" version="1" comment="dpdk is &lt;24.11.4-160000.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041568" version="1" comment="dpdk-tools is &lt;24.11.4-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041569" version="1" comment="libdpdk-25 is &lt;24.11.4-160000.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852927" version="1" comment="nvidia-open-driver-G06-signed-kmp-64kb is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852928" version="1" comment="nvidia-open-driver-G06-signed-kmp-default is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009337751" version="1" comment="libxml2-2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009337752" version="1" comment="libxml2-tools is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050012" version="1" comment="libpng16-16 is &lt;1.6.44-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030577" version="1" comment="runc is &lt;1.3.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333953" version="1" comment="krb5 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334924" version="1" comment="krb5-client is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012364" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014750" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014751" version="1" comment="kernel-default is &lt;6.4.0-150700.53.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012380" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011989" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017414" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017678" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017233" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=3-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017415" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017416" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017417" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018029" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017981" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018030" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014215" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014267" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014518" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014268" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014269" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014217" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014218" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014219" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014220" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014221" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014520" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014522" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014523" version="1" comment="kernel-default is &lt;4.12.14-122.266.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014673" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014753" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014524" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014525" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014526" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014527" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014528" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014529" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014530" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014531" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014532" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014533" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014534" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014535" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=19-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014536" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=19-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014537" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=15-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014538" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014755" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014539" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014540" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014674" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014675" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014676" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014756" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020716" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020717" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020718" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019749" version="1" comment="kernel-default is &lt;6.4.0-150600.23.53.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020207" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=5-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020719" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019746" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019717" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019718" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019747" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019748" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018809" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=4-150700.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019750" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=4-150700.3.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019751" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023030" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023031" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023032" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022250" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=6-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023340" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=6-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043987" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044018" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043988" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044019" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043989" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044020" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043649" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=10-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044021" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=10-150700.3.27.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044022" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=10-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046340" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046341" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046294" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046342" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046343" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045281" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=11-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046344" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=11-150700.3.30.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046345" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=11-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050992" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=15-150600.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050993" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=14-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050994" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051499" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049627" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=12-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051500" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=12-150700.3.33.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050995" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=12-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019244" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019245" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019246" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019247" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019248" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019249" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019250" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019408" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019409" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019460" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019410" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019752" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019753" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019461" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019462" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019754" version="1" comment="kernel-default is &lt;6.4.0-150600.23.50.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019251" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019411" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019463" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019464" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019720" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023033" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019759" version="1" comment="kernel-default is &lt;6.4.0-150600.23.60.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023341" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=6-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017418" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017419" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017679" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017982" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018031" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019467" version="1" comment="kernel-default is &lt;4.12.14-122.269.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043990" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044023" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=10-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047551" version="1" comment="kernel-livepatch-6_12_0-160000_5-default is &lt;7-160000.4.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047556" version="1" comment="kernel-livepatch-6_12_0-160000_5-rt is &lt;5-160000.3.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024448" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=7-150700.5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025537" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=7-150700.3.18.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025167" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=7-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025111" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=7-150700.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020311" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020208" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020744" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020745" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020746" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020682" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020683" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020720" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020684" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020685" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020721" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020722" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050996" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050997" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050998" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023350" version="1" comment="kernel-default is &lt;6.4.0-150600.23.70.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051501" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=7-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051502" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=7-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051503" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=11-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052000" version="1" comment="kernel-livepatch-6_12_0-160000_5-default is &lt;8-160000.4.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051986" version="1" comment="kernel-livepatch-6_12_0-160000_5-rt is &lt;6-160000.3.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014543" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014545" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014758" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019466" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019756" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019722" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019758" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019760" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022815" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023343" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023344" version="1" comment="kernel-default is &lt;6.4.0-150600.23.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023035" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031658" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031477" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031478" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031479" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031907" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031908" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=8-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031909" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=8-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031659" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031910" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024670" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=10-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024671" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024672" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=9-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024673" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024674" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=8-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024675" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=7-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025538" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=3-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025112" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=3-150700.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024676" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025113" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=3-150700.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023346" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023038" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023349" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023040" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041521" version="1" comment="kernel-64kb is &lt;6.12.0-160000.9.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041530" version="1" comment="kernel-default is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041531" version="1" comment="kernel-default-base is &lt;6.12.0-160000.9.1.160000.2.6 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041533" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042144" version="1" comment="kernel-default-livepatch is &lt;6.12.0-160000.9.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041542" version="1" comment="kernel-macros is &lt;6.12.0-160000.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041545" version="1" comment="kernel-rt is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042145" version="1" comment="kernel-rt-livepatch is &lt;6.12.0-160000.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041550" version="1" comment="kernel-source is &lt;6.12.0-160000.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043991" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043992" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044024" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044025" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=6-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051838" version="1" comment="kernel-64kb is &lt;6.12.0-160000.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051845" version="1" comment="kernel-default is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051846" version="1" comment="kernel-default-base is &lt;6.12.0-160000.27.1.160000.2.8 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051847" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051991" version="1" comment="kernel-default-livepatch is &lt;6.12.0-160000.27.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051854" version="1" comment="kernel-macros is &lt;6.12.0-160000.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051857" version="1" comment="kernel-rt is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051992" version="1" comment="kernel-rt-livepatch is &lt;6.12.0-160000.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051861" version="1" comment="kernel-source is &lt;6.12.0-160000.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041338" version="1" comment="kernel-livepatch-6_12_0-160000_6-default is &lt;3-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040051" version="1" comment="kernel-livepatch-6_12_0-160000_6-rt is &lt;3-160000.1.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056187" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056188" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056189" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053078" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056190" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056289" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053244" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053079" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053245" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056191" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053498" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053499" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053500" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053501" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053080" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053081" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053246" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053502" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053247" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=15-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053248" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053249" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056290" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056192" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053083" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053084" version="1" comment="kernel-livepatch-6_4_0-150600_23_73-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052765" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=13-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056291" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=13-150700.3.36.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056193" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=8-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053503" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=8-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056194" version="1" comment="kernel-livepatch-6_4_0-150700_53_19-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056195" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=13-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056196" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=12-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056309" version="1" comment="kernel-livepatch-6_12_0-160000_5-rt is &lt;7-160000.3.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056310" version="1" comment="kernel-livepatch-6_12_0-160000_6-rt is &lt;6-160000.1.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044026" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044027" version="1" comment="kernel-livepatch-6_4_0-150600_23_73-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044028" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=6-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044029" version="1" comment="kernel-livepatch-6_4_0-150700_53_19-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047325" version="1" comment="kernel-livepatch-6_12_0-160000_6-default is &lt;5-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047324" version="1" comment="kernel-livepatch-6_12_0-160000_7-default is &lt;3-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047337" version="1" comment="kernel-livepatch-6_12_0-160000_8-default is &lt;2-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051000" version="1" comment="kernel-default is ==6.4.0-150600.23.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053504" version="1" comment="kernel-livepatch-6_4_0-150600_23_78-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051005" version="1" comment="kernel-default is &lt;6.4.0-150600.23.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051505" version="1" comment="kernel-default is ==6.4.0-150700.53.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053505" version="1" comment="kernel-livepatch-6_4_0-150700_53_22-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056311" version="1" comment="kernel-livepatch-6_12_0-160000_7-rt is &lt;4-160000.1.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043870" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044578" version="1" comment="kernel-livepatch-6_12_0-160000_6-default is &lt;4-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047301" version="1" comment="kernel-livepatch-6_12_0-160000_6-rt is &lt;4-160000.1.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039724" version="1" comment="kernel-livepatch-6_12_0-160000_7-default is &lt;2-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040024" version="1" comment="kernel-livepatch-6_12_0-160000_7-rt is &lt;2-160000.1.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052001" version="1" comment="kernel-livepatch-6_12_0-160000_6-default is &lt;6-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051990" version="1" comment="kernel-livepatch-6_12_0-160000_6-rt is &lt;5-160000.1.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052002" version="1" comment="kernel-livepatch-6_12_0-160000_7-default is &lt;4-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051985" version="1" comment="kernel-livepatch-6_12_0-160000_7-rt is &lt;3-160000.1.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051998" version="1" comment="kernel-livepatch-6_12_0-160000_8-default is &lt;3-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051984" version="1" comment="kernel-livepatch-6_12_0-160000_8-rt is &lt;2-160000.1.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050999" version="1" comment="kernel-livepatch-6_4_0-150600_23_73-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051001" version="1" comment="kernel-livepatch-6_4_0-150600_23_78-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051002" version="1" comment="kernel-default is ==6.4.0-150600.23.81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051003" version="1" comment="kernel-livepatch-6_4_0-150600_23_81-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051004" version="1" comment="kernel-default is &lt;6.4.0-150600.23.81.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051504" version="1" comment="kernel-livepatch-6_4_0-150700_53_19-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051506" version="1" comment="kernel-livepatch-6_4_0-150700_53_22-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051507" version="1" comment="kernel-default is ==6.4.0-150700.53.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051508" version="1" comment="kernel-livepatch-6_4_0-150700_53_25-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039558" version="1" comment="libvmtools0 is &lt;13.0.5-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039559" version="1" comment="open-vm-tools is &lt;13.0.5-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334115" version="1" comment="u-boot is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053388" version="1" comment="tar is &lt;1.35-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050016" version="1" comment="libprotobuf28_3_0 is &lt;28.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050017" version="1" comment="libutf8_range-28_3_0 is &lt;28.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052277" version="1" comment="net-tools is &lt;2.10-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663792" version="1" comment="containerd is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047570" version="1" comment="helm is &lt;3.19.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047571" version="1" comment="helm-bash-completion is &lt;3.19.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052590" version="1" comment="docker-compose is &lt;2.33.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050022" version="1" comment="vim-data-common is &lt;9.2.0110-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050023" version="1" comment="vim-small is &lt;9.2.0110-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037884" version="1" comment="docker is &lt;28.5.1_ce-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037886" version="1" comment="docker-buildx is &lt;0.29.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047574" version="1" comment="gstreamer is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047584" version="1" comment="gstreamer-plugins-base is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047602" version="1" comment="libgstallocators-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047604" version="1" comment="libgstapp-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047605" version="1" comment="libgstaudio-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047613" version="1" comment="libgstgl-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047618" version="1" comment="libgstpbutils-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047622" version="1" comment="libgstreamer-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047623" version="1" comment="libgstriff-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047629" version="1" comment="libgsttag-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047634" version="1" comment="libgstvideo-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049113" version="1" comment="rust-keylime is &lt;0.2.8+116-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013777" version="1" comment="virtiofsd is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042224" version="1" comment="cups-config is &lt;2.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042227" version="1" comment="libcups2 is &lt;2.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042305" version="1" comment="python313-maturin is &lt;1.8.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044571" version="1" comment="docker is &lt;28.5.1_ce-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044573" version="1" comment="docker-buildx is &lt;0.29.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030544" version="1" comment="libexpat1 is &lt;2.7.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056323" version="1" comment="qemu-ovmf-x86_64 is &lt;202502-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056324" version="1" comment="qemu-uefi-aarch64 is &lt;202502-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037184" version="1" comment="libmicrohttpd12 is &lt;1.0.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859129" version="1" comment="libtiff6 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032319" version="1" comment="openssh is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032322" version="1" comment="openssh-clients is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032323" version="1" comment="openssh-common is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032325" version="1" comment="openssh-server is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032326" version="1" comment="openssh-server-config-rootlogin is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039695" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.42.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039697" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.42.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039698" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.42.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037185" version="1" comment="libpng16-16 is &lt;1.6.44-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041320" version="1" comment="cockpit-subscriptions is &lt;12.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041351" version="1" comment="python313-urllib3 is &lt;2.5.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334069" version="1" comment="binutils is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342534" version="1" comment="libctf-nobfd0 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342535" version="1" comment="libctf0 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037182" version="1" comment="python313-tornado6 is &lt;6.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040025" version="1" comment="avahi is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040032" version="1" comment="libavahi-client3 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040033" version="1" comment="libavahi-common3 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040034" version="1" comment="libavahi-core7 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051006" version="1" comment="kernel-default is ==6.4.0-150600.23.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051007" version="1" comment="kernel-livepatch-6_4_0-150600_23_84-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051008" version="1" comment="kernel-default is &lt;6.4.0-150600.23.84.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051509" version="1" comment="kernel-default is ==6.4.0-150700.53.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051510" version="1" comment="kernel-livepatch-6_4_0-150700_53_28-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050013" version="1" comment="libsnmp40 is &lt;5.9.4-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050014" version="1" comment="snmp-mibs is &lt;5.9.4-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051997" version="1" comment="kernel-livepatch-6_12_0-160000_9-default is &lt;2-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051989" version="1" comment="kernel-livepatch-6_12_0-160000_9-rt is &lt;2-160000.1.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037710" version="1" comment="gpg2 is &lt;2.5.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056197" version="1" comment="kernel-livepatch-5_14_21-150400_24_184-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053250" version="1" comment="kernel-livepatch-5_14_21-150400_24_187-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053507" version="1" comment="kernel-livepatch-5_14_21-150500_55_127-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056198" version="1" comment="kernel-livepatch-5_14_21-150500_55_130-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053508" version="1" comment="kernel-livepatch-5_14_21-150500_55_133-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056199" version="1" comment="kernel-livepatch-6_4_0-150600_23_81-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056200" version="1" comment="kernel-livepatch-6_4_0-150600_23_84-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056292" version="1" comment="kernel-livepatch-6_4_0-150700_53_25-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056201" version="1" comment="kernel-livepatch-6_4_0-150700_53_28-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056308" version="1" comment="kernel-livepatch-6_12_0-160000_8-rt is &lt;3-160000.1.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056330" version="1" comment="kernel-livepatch-6_12_0-160000_9-default is &lt;3-160000.1.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056307" version="1" comment="kernel-livepatch-6_12_0-160000_9-rt is &lt;3-160000.1.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041463" version="1" comment="libudisks2-0 is &lt;2.10.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041465" version="1" comment="libudisks2-0_btrfs is &lt;2.10.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041467" version="1" comment="libudisks2-0_lvm2 is &lt;2.10.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041469" version="1" comment="udisks2 is &lt;2.10.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034150" version="1" comment="libopenssl-3-devel is &lt;3.5.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034151" version="1" comment="libopenssl-3-fips-provider is &lt;3.5.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034153" version="1" comment="libopenssl3 is &lt;3.5.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034155" version="1" comment="openssl-3 is &lt;3.5.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815811" version="1" comment="jq is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815813" version="1" comment="libjq1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012763" version="1" comment="libexslt0 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008347" version="1" comment="libxslt1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047376" version="1" comment="glibc-livepatches is &lt;0.3-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041576" version="1" comment="glib2-tools is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041577" version="1" comment="libgio-2_0-0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041578" version="1" comment="libgirepository-2_0-0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041579" version="1" comment="libglib-2_0-0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041580" version="1" comment="libgmodule-2_0-0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041581" version="1" comment="libgobject-2_0-0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041584" version="1" comment="typelib-1_0-GLib-2_0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041586" version="1" comment="typelib-1_0-GModule-2_0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041587" version="1" comment="typelib-1_0-GObject-2_0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041588" version="1" comment="typelib-1_0-Gio-2_0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042230" version="1" comment="libxml2-2 is &lt;2.13.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042233" version="1" comment="libxml2-tools is &lt;2.13.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042234" version="1" comment="python313-libxml2 is &lt;2.13.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042593" version="1" comment="libsoup-3_0-0 is &lt;3.6.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050024" version="1" comment="curl is &lt;8.14.1-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050025" version="1" comment="libcurl4 is &lt;8.14.1-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039707" version="1" comment="python313-urllib3 is &lt;2.5.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679007" version="1" comment="libz1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679010" version="1" comment="zlib-devel is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052476" version="1" comment="libldap-2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727410" version="1" comment="libldap-data is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050027" version="1" comment="libharfbuzz-gobject0 is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050028" version="1" comment="libharfbuzz0 is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050029" version="1" comment="typelib-1_0-HarfBuzz-0_0 is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039686" version="1" comment="libpng16-16 is &lt;1.6.44-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044105" version="1" comment="openCryptoki is &lt;3.26.0-160000.1.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053509" version="1" comment="kernel-livepatch-5_14_21-150500_55_136-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056202" version="1" comment="kernel-default is ==6.4.0-150600.23.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056203" version="1" comment="kernel-livepatch-6_4_0-150600_23_87-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056204" version="1" comment="kernel-default is &lt;6.4.0-150600.23.87.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053510" version="1" comment="kernel-default is ==6.4.0-150700.53.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053511" version="1" comment="kernel-livepatch-6_4_0-150700_53_31-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056306" version="1" comment="kernel-livepatch-6_12_0-160000_26-rt is &lt;2-160000.1.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053251" version="1" comment="kernel-default is ==5.14.21-150400.24.194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053252" version="1" comment="kernel-livepatch-5_14_21-150400_24_194-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053253" version="1" comment="kernel-default is &lt;5.14.21-150400.24.194.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039708" version="1" comment="python313-pyasn1 is &lt;0.6.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047320" version="1" comment="libexpat1 is &lt;2.7.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019430" version="1" comment="python313 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019431" version="1" comment="python313-curses is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041446" version="1" comment="gpg2 is &lt;2.5.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056333" version="1" comment="cockpit is &lt;354-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056334" version="1" comment="cockpit-bridge is &lt;354-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056335" version="1" comment="cockpit-firewalld is &lt;354-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056336" version="1" comment="cockpit-kdump is &lt;354-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056332" version="1" comment="cockpit-machines is &lt;346-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056337" version="1" comment="cockpit-networkmanager is &lt;354-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056331" version="1" comment="cockpit-podman is &lt;117-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056338" version="1" comment="cockpit-selinux is &lt;354-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056339" version="1" comment="cockpit-storaged is &lt;354-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056340" version="1" comment="cockpit-system is &lt;354-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056341" version="1" comment="cockpit-ws is &lt;354-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056342" version="1" comment="cockpit-ws-selinux is &lt;354-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050011" version="1" comment="python313-maturin is &lt;1.8.7-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047569" version="1" comment="virtiofsd is &lt;1.12.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336147" version="1" comment="qemu-ovmf-x86_64 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336146" version="1" comment="qemu-uefi-aarch64 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056343" version="1" comment="python313-cryptography is &lt;44.0.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046321" version="1" comment="haproxy is &lt;3.2.12+git0.6011f448e-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053188" version="1" comment="cockpit-repos is &lt;4.7-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051784" version="1" comment="libnghttp2-14 is &lt;1.64.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053372" version="1" comment="libsystemd0 is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053373" version="1" comment="libudev1 is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053374" version="1" comment="systemd is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053376" version="1" comment="systemd-container is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053379" version="1" comment="systemd-experimental is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053381" version="1" comment="systemd-journal-remote is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053384" version="1" comment="systemd-portable is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053387" version="1" comment="udev is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051874" version="1" comment="python313-pyasn1 is &lt;0.6.1-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050026" version="1" comment="python313-tornado6 is &lt;6.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052339" version="1" comment="mcphost is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051999" version="1" comment="python313-PyJWT is &lt;2.12.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052635" version="1" comment="libexpat1 is &lt;2.7.1-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053360" version="1" comment="libpng16-16 is &lt;1.6.44-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336434" version="1" comment="libsystemd0 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335309" version="1" comment="libudev1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334001" version="1" comment="systemd is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624596" version="1" comment="systemd-container is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870567" version="1" comment="systemd-experimental is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707100" version="1" comment="systemd-journal-remote is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870568" version="1" comment="systemd-portable is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335314" version="1" comment="udev is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056325" version="1" comment="glibc is &lt;2.40-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056326" version="1" comment="glibc-devel is &lt;2.40-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056327" version="1" comment="glibc-gconv-modules-extra is &lt;2.40-160000.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056328" version="1" comment="glibc-locale is &lt;2.40-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056329" version="1" comment="glibc-locale-base is &lt;2.40-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250311"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_38-44-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_39-47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_43-52_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_48-52_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_49-11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_53-60_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_57-60_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_32-33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_36-38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-84-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_38-93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_62-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_64_8-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_26-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-23-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_73-5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_120-94_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_126-94_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_48-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-195-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_15-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_4-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_131-94_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_132-94_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_138-94_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_140-94_42-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_143-94_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_155-94_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-94_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_77-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_175-94_79-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_176-94_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_178-94_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SL-Micro-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_55-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_58-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_23-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_26-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_48-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_15-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_43-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_53_4-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_77-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_89-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_105-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_96-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_106-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_110-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_113-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_89-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_95-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_105-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_112-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_115-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_126-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_107-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_96-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_43-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_76-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_87-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_70-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_129-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_134-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_162-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_165-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_173-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_176-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_179-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_183-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_186-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_189-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_194-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_201-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_216-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_154-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_157-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_160-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_163-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_166-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_169-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_172-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_175-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_178-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_183-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_188-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_138-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_141-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_158-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_161-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_191-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_194-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_197-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_164-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_167-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_36-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_44-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_59-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_62-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_73-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_100-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_119-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_122-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-manifests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conmon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ignition</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-manifests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virtctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podmansh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suseconnect-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_123-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_126-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_104-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_139-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_131-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_139-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-SLOF</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-chardev-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-qxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-gpu-pci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-vga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-s390x-virtio-gpu-ccw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-redirect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-img</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ksm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ppc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-pr-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390x</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-opengl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-spice-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vmsr-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_142-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_145-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_106-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_109-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_112-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_115-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_159-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_151-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_11-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_219-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_222-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_225-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_228-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_170-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_174-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_128-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_231-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_179-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_234-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_237-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_244-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_247-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_250-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_182-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_185-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_188-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_195-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_198-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_141-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_158-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_94-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_255-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_258-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_261-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_266-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_269-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_272-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_161-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_164-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_167-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_170-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_173-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_176-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_201-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_204-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_207-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_211-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_215-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_218-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_100-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_110-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_113-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-livepatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-livepatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_275-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_179-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_221-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_280-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_283-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_290-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_184-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_187-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_15_11-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_55-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_134-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_156-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_137-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_142-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_145-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_148-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_118-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_157-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_148-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_151-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_154-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_160-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_165-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_168-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-compose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_8-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_42-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_70-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_73-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_5-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_293-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init-config-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-bridge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-storaged</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-system</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-ws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-ws-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-machines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-tukit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netavark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-maturin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>afterburn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>afterburn-dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_200-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-buildx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_12_0-160000_5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_12_0-160000_5-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aardvark-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nm-configurator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-rpds-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libekmfweb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkmipclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>s390-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>s390-tools-genprotimg-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sevctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thin-provisioning-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zram-generator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-gconv-modules-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf-nobfd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexslt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-3-fips-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-3-livepatches</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunbound8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-anchor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_13-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi-direct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-plugin-lockd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-repos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-subscriptions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gio-branding-SLE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgirepository-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GLib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GModule-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GObject-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gio-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lastlog2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblastlog2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-livepatches</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linux-glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsodium26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elemental-register</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elemental-support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elemental-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wb-cifs-idmap-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdpdk-25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_12_0-160000_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_12_0-160000_6-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_12_0-160000_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_12_0-160000_8-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_12_0-160000_7-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_12_0-160000_8-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf28_3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libutf8_range-28_3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-keylime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtiofsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-uefi-aarch64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server-config-rootlogin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-tornado6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_84-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp40</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_12_0-160000_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_12_0-160000_9-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_btrfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjq1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-gobject0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-HarfBuzz-0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_87-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_12_0-160000_26-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_194-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-experimental</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-journal-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-portable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mcphost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-PyJWT</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.38-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.44-52.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.48-52.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-14.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-7.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-8.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-11.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-17.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-20.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-23.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-6.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-6.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-18.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-18.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-21.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-21.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.114-94.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.114-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-18.7.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-11.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.120-94.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.126-94.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-34.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.131-94.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.132-94.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.138-94.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.143-94.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-10.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-25.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.155-94.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-13.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-28.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-7.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-94.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.25.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.162-94.69.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.162-94.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.162-94.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-22.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-16.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.132-94.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-19.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-15.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.176-94.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.22.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009079458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">0</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">6.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-28.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.10.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-18.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-31.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.53.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.89.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.99.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.99.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.124.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.92.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.114.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.115.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.4.12.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.53.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.89.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.4.21.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.4.3.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.186.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.189.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-8.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.216.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.216.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.160.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.175.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.178.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.147.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.153.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.191.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.197.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.197.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.191.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.11.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.11.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.100.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.111.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.122.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150200.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.4.15.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.4.9.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.4.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.4.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.4.24.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.4.18.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.115.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.219.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.222.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.225.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.228.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.228.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.222.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.128.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.133.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.133.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.128.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.231.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.231.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.234.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.237.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.244.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.247.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.250.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.250.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.185.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.198.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.198.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.247.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.255.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.255.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.258.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.261.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.266.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.269.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.272.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.272.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.170.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.204.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.207.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.211.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.215.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.218.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.218.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1.160000.2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.275.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.275.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.221.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.221.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.280.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.283.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.290.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.290.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.184.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.187.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.187.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.130.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.283.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.10.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.15.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009180976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.13.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.120.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.120.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.15.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.160.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.186.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.189.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.175.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.147.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.178.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.219.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.4.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150600.1.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.3.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.60.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150700.3.24.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150700.53.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.293.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.293.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.12.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.153.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1.3-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.60.2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.12.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20260210-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.4.19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.64.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.122.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150600.4.25.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.4.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:20-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.207.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150600.4.46.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.225.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150600.4.31.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150600.4.34.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150600.4.28.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150600.4.49.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.200.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.200.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150600.4.40.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.234.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.4.22.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:20-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:21-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150600.4.43.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.4.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.4.37.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.237.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.185.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.211.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.170.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1.160000.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-160000.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-160000.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.258.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.204.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1.160000.2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.244.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.22.5+git.431.dc5a539f124-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.43-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.8-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0+git0.e134140d2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.71.16.3_3_g3d33c746-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.12-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.43-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.11-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.6-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.4.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.21.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:354-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:354-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:346-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:117-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16-160000.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.84.4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.81.16.3_3_g3d33c746-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150700.3.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150700.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150700.3.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.261.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.215.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150700.3.15.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150700.3.12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150700.3.21.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.11.4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.11.4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150700.53.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.266.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150700.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150700.3.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150700.3.27.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150700.3.30.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150700.3.33.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.60.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.269.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-160000.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-160000.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150700.5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150700.3.18.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150700.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-160000.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-160000.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150700.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1.160000.2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1.160000.2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150700.3.36.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-160000.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.33.1-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.0110-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.0110-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.5.1_ce-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8+116-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.16-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.5.1_ce-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:202502-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0p2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.12-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.4-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.84.4-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.8-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.4.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:354-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:354-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:346-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:117-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:44.0.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.12+git0.6011f448e-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.64.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:257.13-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40-160000.4.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
